Thursday, March 14, 2013

NSA Director Alexander: US Building Cyberattack Teams

 

NSA Director Alexander: US Building Cyberattack Teams

http://threatpost.com/en_us/blogs/nsa-director-alexander-us-building-cyberattack-teams-031313

 

 

by Michael Mimoso

 

NSAMore rhetoric is coming out of Washington regarding the use of malware as

an auxiliary weapon to bombs and bullets. National Security Agency leader

Gen. Keith Alexander told a House Armed Services Committee yesterday that

his new Cyber Command will be ready to retaliate should the United States

critical infrastructure come under cyberattack.

 

"I would like to be clear that this team, this defend-the-nation team, is

not a defensive team," Alexander said.

 

The proclamation that the United States will be prepared to go on the

offensive comes less than two months after the announcement that the

Pentagon will bolster the Department of Defense's Cyber Command to nearly

5,000; the group currently stands at around 900. The Pentagon's strategy

includes the formation of national mission forces that will secure critical

infrastructure systems, combat mission forces that will help field

commanders strategize and execute in cyberspace, and cyber protection forces

that will concentrate their efforts on the DOD's networks, a Washington Post

report said.

Editor's Pick

 

    Report: Obama Administration Considered Libyan Cyber-Offensive

    Ten Years After, the Attackers Have Taken the Lead

    Anup Ghosh on Cyberespionage, Attribution and APTs

 

Threatpost Newsletter Sign-up

 

Alexander, bolstered by a spate of recent attacks on the nation's leading

banks on top of the attacks on Saudi oil producer Aramco last summer,

painted a dire picture for the committee yesterday.

 

"If you look at industry, especially the antivirus community and others,

they believe it's going to grow more in 2013," Alexander said of the threat.

"And there's a lot that we need to do to prepare for this."

 

The Aramco attack did not impact oil production for the Saudi company, but

it did damage more than 30,000 workstations. Alexander's remarks were

another shot across the bow of Iran, China and other nations implicated in

cyberattacks against American interests. In October, former defense

secretary Leon Panetta identified the same aggressors by name in a speech,

in addition to calling for legislation that would force private critical

infrastructure operators to overhaul their security initiatives, as well as

a cry for better information sharing between the public and private sectors.

 

Panetta's declaratory policy also put the U.S. on the record with a public

statement by a senior official that sanction and economic threats would

inevitably run their course.

 

Alexander's plan, laid out before the committee yesterday, called for the

formation of 13 teams capable of carrying out attacks against foreign

aggressors.

 

"This is an offensive team that the Defense Department would use to defend

the nation if it were attacked in cyberspace," Alexander said. "Thirteen of

the teams that we're creating are for that mission alone."

 

He also called for more intelligence on attacks from Internet service

providers to provide visibility into network-based attacks, a move that

would require the liability protection in order to share attack data.

 

This week, Chinese officials said they'd be willing to discuss recent

attacks against American companies attributed to China.

 

Reuters quoted China Foreign Ministry spokeswoman Hua Chuying: "China is

willing, on the basis of the principles of mutual respect and mutual trust,

to have constructive dialogue and cooperation on this issue with the

international community including the United States to maintain the

security, openness and peace of the Internet. In fact, China is a

marginalized group in this regard, and one of the biggest victims of hacking

attacks."

 

China, meanwhile, accused the United States of hacking into a pair of

Chinese military websites and other strategic interests. The U.S. and Israel

are also accused of being behind the Stuxnet attacks against an Iranian

uranium enrichment facility.

 

==========================================

(F)AIR USE NOTICE: All original content and/or articles and graphics in this

message are copyrighted, unless specifically noted otherwise. All rights to

these copyrighted items are reserved. Articles and graphics have been placed

within for educational and discussion purposes only, in compliance with

"Fair Use" criteria established in Section 107 of the Copyright Act of 1976.

The principle of "Fair Use" was established as law by Section 107 of The

Copyright Act of 1976. "Fair Use" legally eliminates the need to obtain

permission or pay royalties for the use of previously copyrighted materials

if the purposes of display include "criticism, comment, news reporting,

teaching, scholarship, and research." Section 107 establishes four criteria

for determining whether the use of a work in any particular case qualifies

as a "fair use". A work used does not necessarily have to satisfy all four

criteria to qualify as an instance of "fair use". Rather, "fair use" is

determined by the overall extent to which the cited work does or does not

substantially satisfy the criteria in their totality. If you wish to use

copyrighted material for purposes of your own that go beyond 'fair use,' you

must obtain permission from the copyright owner. For more information go to:

http://www.law.cornell.edu/uscode/17/107.shtml

 

THIS DOCUMENT MAY CONTAIN COPYRIGHTED MATERIAL. COPYING AND DISSEMINATION IS

PROHIBITED WITHOUT PERMISSION OF THE COPYRIGHT OWNERS.

 

 

 

 

 

 

 

No comments:

Post a Comment