. Medical and Hospital News .




CYBER WARS
US Army reviews rules of engagement over cyber threat
by Staff Writers
Washington (AFP) June 27, 2013


The US military is reviewing its rules of engagement to deal with the growing threat of cyber crime, military chief Martin Dempsey said Thursday.

Dempsey, the Chairman of the Joint Chiefs of Staff, the highest-ranking officer in the US military, said the review was in response to soaring cyber attacks.

"The Department of Defense has developed emergency procedures to guide our response to imminent, significant cyber threats," Dempsey said in a speech at the Brookings Institution, a Washington-based think tank.

"We are updating our rules of engagement - the first update for cyber in seven years - and improving command and control for cyber forces."

Dempsey said that since his appointment as head of the Joint Chiefs in 2011 "intrusions into our critical infrastructure have increased 17-fold."

Some 4,000 cyber-security experts would join the ranks over the next four years, while some $23 billion would be spent on tackling the threat.

Dempsey said Cybercom -- the US command responsible for combatting cyber-crime -- was now organized in three divisions.

One team was in charge of countering enemy attacks, another was tasked with offering regional support while a third was responsible for protecting some 15,000 US military computer networks.

In addition following a presidential directive, the military now had a manual which allowed it to cooperate with the Department of Homeland Security and the FBI in the event of attacks on civilian networks.

Dempsey meanwhile lamented what he described as inadequate safeguards by the private sector.

"Our nation's effort to protect civilian critical infrastructure is lagging," he said. "Too few companies have invested adequately in cyber security."

In a reference to concerns over the levels of government surveillance on private individuals since the revelations by leaker Edward Snowden, Dempsey said he believed a balance could be struck.

"I understand that the country is debating the proper purpose, and limits, of intelligence collection for national security," he said.

"Let me be clear -- these are two different things. One is collecting intelligence to locate foreign terrorists and their domestic co-conspirators; the other is sharing information about malware to protect our critical infrastructure from a different kind of attack."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review

Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News

Get Our Free Newsletters
Space - Defense - Environment - Energy - Solar - Nuclear

...





CYBER WARS
Obama says no 'wheeling and dealing' over Snowden
Dakar (AFP) June 27, 2013
US President Barack Obama insisted Thursday he would not let the fate of fugitive intelligence leaker Edward Snowden ruin ties with Russia and China as Washington bluntly warned Ecuador not to give him asylum. Snowden, wanted by the US authorities for leaking sensational details of vast US surveillance programmes, is said by the Kremlin to have been in the transit zone of Moscow's Sheremetye ... read more


CYBER WARS
RESCUE Consortium Demonstrates Technologies for First Responders

India chopper crash kills 20 as flood rescue forges on

India rescue chopper crash death toll rises to 20

WIN-T Increment 1 Enables National Guard to Restore Vital Network Communications Following a Disaster

CYBER WARS
Beidou's second trial held in Yangtze Delta

The next batch of Galileo satellites

Raytheon's latest air traffic management systems go into continuous operation

Raytheon's Satellite Air Navigation System marks 10 years of continuous service in the US

CYBER WARS
What Is the Fastest Articulated Motion a Human Can Execute?

Lessons at home and homework at school in US

Skull find challenges claim about first white man in eastern Australia

Gulf lovers use smartphones to beat segregation

CYBER WARS
Nearly 21,000 species at risk of extinction: conservationists

Lion on the loose in South Africa

Mapping Out How to Save Species

Researchers discover human activity threatens Sumatran tiger population

CYBER WARS
Patents making new AIDS drugs expensive: MSF

Six-year-old Cambodian girl dies from bird flu: WHO

China reports another H7N9 bird flu death

Ten million more people advised to take HIV drugs: UN

CYBER WARS
Taiwan urged to keep radio broadcasts into China

China denies changing policy on Dalai Lama: official

China law 'forcing' children to visit parents ridiculed

Police block site of deadly China Xinjiang riot

CYBER WARS
Mexicans turn to social media to report on drug war

Sydney customs officers ran drugs ring, report says

New Moldova P.M. Leanca says country remains on pro-EU course

Global cybercrime ring targeted by Microsoft and FBI

CYBER WARS
Japan's factory output rises in May

Japan manufacturer sentiment jumps: BoJ

GDP growth slows, Fed between rock and hard place

Walker's World: A British revolution?




The content herein, unless otherwise known to be public domain, are Copyright 1995-2012 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement