Pentagon to publish strategy for cyberspace wars

Jul 14, 2011 By LOLITA C. BALDOR , Associated Press

(AP) -- Facing escalating risks of cyberattacks by hackers, criminals and other nations, the Pentagon is developing more resilient computer networks so the military can continue to operate if critical systems are breached or taken down.

In a broad new cybersecurity strategy to be released Thursday, the Defense Department lays out its vulnerabilities to attack from both outside and within its own workforce. Formally declaring cyberspace a new warfare domain, much like air, land and sea, the new strategy stresses the need for the military to continue to operate if its computer systems are attacked and degraded.

The Associated Press reviewed a draft copy of the 12-page, unclassified summary of the strategy to be released by The Pentagon.

The strategy is the final step in the administration's effort to map out how to handle the escalating threat of destructive cyberattacks, including potential assaults on such as the , financial networks or .

Details about how the military would respond to a cyberattack or discussion of any offensive cyberspace operations by the U.S. are not included in the summary. That information is in classified documents and directives. The classified version of the Pentagon strategy is about 40 pages.

Earlier this year, President signed executive orders that lay out how far military commanders around the globe can go in using cyberattacks and other computer-based operations against enemies and as part of routine espionage in other countries.

The orders detail when the military must seek presidential approval for a specific on an enemy, defense officials and cybersecurity experts told the AP.

The orders and the new strategy cap a two-year Pentagon effort to draft U.S. rules of the road for cyberspace warfare, and come as the U.S. begins to work with allies on global ground rules.

Noting that Defense Department systems are vulnerable to attack, the strategy says the Pentagon must develop resilient networks that can detect and fend off attacks. At the same time, the must have multiple networks and be able to shift its operations from one system to another in order to keep operating in the event of an attack.

That research is ongoing.

The strategy also warns that theft of intellectual property is the "most pervasive cyber threat." And it calls for more significant efforts to insure the integrity of the supply chain, so that software does not come with vulnerabilities that allow hackers to infiltrate.

Explore further: Turkey still hopes Twitter will open local office

not rated yet
add to favorites email to friend print save as pdf

Related Stories

Pentagon spends $100 million to fix cyber attacks

Apr 07, 2009

(AP) -- The Pentagon spent more than $100 million in the last six months responding to and repairing damage from cyber attacks and other computer network problems, military leaders said Tuesday.

Sources: Pentagon planning new cybercommand

Apr 22, 2009

(AP) -- The Pentagon is planning to create a new military command to focus on cyberspace and protect its computer networks from cyberattacks, U.S. officials said Wednesday.

Recommended for you

Researchers uncover likely creator of Bitcoin

4 hours ago

The primary author of the celebrated Bitcoin paper, and therefore probable creator of Bitcoin, is most likely Nick Szabo, a blogger and former George Washington University law professor, according to students ...

White House updating online privacy policy

8 hours ago

A new Obama administration privacy policy out Friday explains how the government will gather the user data of online visitors to WhiteHouse.gov, mobile apps and social media sites. It also clarifies that ...

Net neutrality balancing act

Apr 17, 2014

Researchers in Italy, writing in the International Journal of Technology, Policy and Management have demonstrated that net neutrality benefits content creator and consumers without compromising provider innovation nor pr ...

User comments : 0

More news stories

Under some LED bulbs whites aren't 'whiter than white'

For years, companies have been adding whiteners to laundry detergent, paints, plastics, paper and fabrics to make whites look "whiter than white," but now, with a switch away from incandescent and fluorescent lighting, different ...

Hackathon team's GoogolPlex gives Siri extra powers

(Phys.org) —Four freshmen at the University of Pennsylvania have taken Apple's personal assistant Siri to behave as a graduate-level executive assistant which, when asked, is capable of adjusting the temperature ...

Researchers uncover likely creator of Bitcoin

The primary author of the celebrated Bitcoin paper, and therefore probable creator of Bitcoin, is most likely Nick Szabo, a blogger and former George Washington University law professor, according to students ...

Continents may be a key feature of Super-Earths

Huge Earth-like planets that have both continents and oceans may be better at harboring extraterrestrial life than those that are water-only worlds. A new study gives hope for the possibility that many super-Earth ...

Researchers successfully clone adult human stem cells

(Phys.org) —An international team of researchers, led by Robert Lanza, of Advanced Cell Technology, has announced that they have performed the first successful cloning of adult human skin cells into stem ...