X
Tech

Military ready to defend and conduct cyberwar

The Pentagon is well-aware of the importance of the computer networks -- known as cyberspace to the media and the "Global Information Grid" to the Defense Dept. -- to national security and is actively working to shore up defenses.
Written by Richard Koman, Contributor

stratcom_seal.jpgThe Pentagon is well-aware of the importance of the computer networks -- known as cyberspace to the media and the "Global Information Grid" to the Defense Dept. -- to national security and is actively working to shore up defenses.

That was the news from Gen. Kevin P. Chilton, head of U.S. Strategic Command, delivered to the Strategic Forces Subcommittee of the House Armed Services Committee last week, according to the Washington Post. Said Chilton:

Our adversaries understand our dependence upon space-based capabilities, and we must be ready to detect, track, characterize, attribute, predict and respond to any threat to our space infrastructure.

In this "emerging war-fighting domain," Chilton said, "potential adversaries recognize the U.S. reliance on . . . [its] use and constantly probe our networks seeking competitive advantage." Michael G. Vickers, assistant secretary of defense for special operations, low-intensity conflict and interdependent capabilities, agreed:

"Threats to our computer networks are real and growing," and attacks and attempted intrusions come "on a daily basis."
But, you say, you want specifics? The war-planners have them.
  • The Joint Task Force for Global Network Operations directs operations and defense of the "worldwide Defense cybernetwork" in real time at strategic, operational and tactical levels.
  • The Joint Functional Component Command for Network Warfare manages cooperative arrangements for defending national computer operations and conducting network warfare against adversaries. Wired profiled these guys in 2005 in an article that discussed the command's offensive tactics:
    [Former Marines intel officer Dan Verton] believes they can destroy networks and penetrate enemy computers to steal or manipulate data. He said they may also be able to set loose a worm to take down command-and-control systems so the enemy is unable to communicate and direct ground forces, or fire surface-to-air missiles, for example.
  • The Joint Information Operations Warfare Command integrates elements of electronic warfare, military deception, operations security and strategic communications to ensure that cyberspace is controlled and available to friendly forces for offensive and defensive uses.

Editorial standards