US cyberwarfare prep includes offense

(Agencies)
Updated: 2008-04-07 07:13

NEW YORK -- US military officials seeking to boost the nation's cyberwarfare capabilities are looking beyond defending the Internet: They are developing ways to launch virtual attacks on enemies.

But first the military will have to figure out the proper boundaries.

"What do we consider to be an act of war in cyberspace?" asked Lt. Gen. Robert J. Elder Jr., who heads the Air Force's cyberoperations command. "The military is not going to tend to do that (use virtual strike capabilities) until you cross some line that constitutes an act of war."

Elder said initial uses likely would be limited to diverting or killing data packets that threaten the nation's systems, the way the military may intercept a foreign ship carrying arms in international waters.

The remarks came late Friday during a New York chapter meeting of the Association For Intelligence Officers, a nonprofit group for current and former intelligence agents and their supporters.

In an interview afterward, Elder said that in the future, the military might rely upon network warfare to disrupt an enemy's communications system, replacing the need for conventional weapons like bombs.

In any such scenario, Elder said the military would be restricted by the same rules of engagement -- such as requirements for a formal declaration of war -- that apply to conventional attacks.

Elder said that during the early days of the Iraq war, rudimentary forms of cyberattacks were used by the United States, including electronically jamming Iraqi military systems and using network attacks to hinder Iraqi ground units from communicating with one another.

The military's offensive capabilities have improved since then, he said.

As the military increasingly relies on networks and computer systems to communicate and coordinate conventional operations, the US Air Force is planning to establish by October a Cyber Command for waging a future war that is fought not only by land, sea and air but also in cyberspace.

Hackers with a foreign government or terrorist group potentially could bring down military and civilian Web sites using what's known as a denial-of-service attack -- flooding the computer servers with fake traffic such that legitimate visitors can't get through.

Enemies also could look for security vulnerabilities to break into key systems that run power plants, refineries and other infrastructure.

Already, the Chinese government has been suspected of using the Web to break into computers at the Defense Department and other US agencies in what was dubbed Operation Titan Rain. Since 2001, Chinese "hacktivists" have organized attacks on and defaced US Web sites to oppose what they call the imperialism of the United States and Japan.

Elder outlined several defensive initiatives aimed at deterring cyberattacks on the United States.

The military, for instance, needs to demonstrate that its conventional operations still could function even if the network is disrupted. To do that, he said, the military has been identifying "what if" loss scenarios and figuring out the backup capabilities needed to overcome them.

Forensics capabilities also are being developed, he said, to identify who is attacking, even if the attacker tries to hide by spoofing the identity of packets and rerouting them through intermediary computer servers. That way, the United States can make a credible threat of retribution.



Top World News  
Today's Top News  
Most Commented/Read Stories in 48 Hours
主站蜘蛛池模板: 全免费a级毛片免费**视频| 国产精品美女久久久久| 乱人伦人妻中文字幕在线入口| 真实国产乱视频国语| 国产在线a不卡免费视频| 99久久精品全部| 我们离婚了第二季韩国综艺在线观看| 亚洲亚洲人成综合网络| 男女男精品视频| 国产一级黄色片子| 日本免费网站视频www区| 大胆gogo高清在线观看| 中文字幕在线视频精品| 最近中文字幕高清中文字幕无 | 亚洲丰满熟女一区二区v| 男人桶女人羞羞漫画全集 | 一线在线观看全集免费高清中文| 日韩精品久久不卡中文字幕| 亚洲最新中文字幕| 男女一进一出无遮挡黄| 国产XXX69麻豆国语对白| 97成人在线视频| 国产精品漂亮美女在线观看| jux-222椎名由奈在线观看| 揄拍自拍日韩精品| 久久综合亚洲鲁鲁五月天| 欧美特黄三级在线观看| 伊人久久青草青青综合| 老马的春天顾晓婷5| 国产成人免费A在线视频| 最新jizz欧美| 图片区亚洲色图| gogo少妇无码肉肉视频| 成人动漫在线观看免费| 久久久久无码精品国产H动漫| 最近的中文字幕视频完整| 亚洲最大看欧美片网站| 狠狠综合久久久久尤物丿| 内射白浆一区二区在线观看| 草草久久久无码国产专区| 国产大秀视频在线一区二区|