Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
DOD Declares Open Policy of OFFENSIVE measures in Cyberspace v. 'potential' adversaries
#1
The Pentagon said Thursday it is reviving a plan to expand its anti-cyberattack program to include securing privately-owned Internet servers and using counteroffensive tactic instead of just defending computer networks against hackers.

The move of the Department of Defense and Department of Homeland Security to relaunch the strategy of hunting and stopping malicious codes before they reach U.S. servers, aims to prevent a repeat of the March hacking of a defense contractor's server by a foreign government it did not identify. The contractor lost 24,000 military files from the hacking.

Speaking at the National Defense University in Washington, D.C., William Lynn, the deputy secretary of defense, assured that Pentagon will not militarize cyberspace and will remain committed to preserving the peaceful use of the Internet.

Lynn added that the government will not monitor, intercept or store private sector communications. Instead, it will provide private companies and their ISPs threat intelligence to be able to stop malicious activities in their networks.

A newly-created Cyber Command will carry out the military's offensive operations in cyberspace.

Lynn said military action to a cyberattack will deter a nation from hacking U.S. servers.
------------------------------------
Pentagon Unveils Defensive [and Offensive] Cyberwar Strategy
Mark Thompson Thursday, July 14, 2011 at 2:25 pm

The new cyber strategy

The Pentagon rolled out its new cyber-defense strategy Thursday, hyping it with the news that foreign hackers (from an unidentified country) invaded the computers of one of its (unidentified) contractors in March and pilfered 24,000 sensitive documents in one fell swoop.

Cyber-security is a Pentagon growth area, make no mistake about. Lord knows, I've contributed to the deluge. But it's one of those arcane areas where progress is hard to measure. Is the threat as dire as sometimes portrayed? It's important to realize that the Pentagon doesn't store real secrets on networks linked to the Internet. Nonetheless, the press can't resist stories about offensive cyber warfare.

Deputy Defense Secretary William Lynn, who unveiled the new cyber strategy, told an audience at the National Defense University in Washington that "crucial" files -- not "secret" or "top secret" -- have been stolen in recent years. Much taken was of little value, he said: "But a great deal of it concerns our most sensitive systems, including aircraft avionics, surveillance technologies, satellite communications systems and network security protocols."

Over breakfast Thursday, Marine General James Cartwright, the vice chairman of the Joint Chiefs, said the Pentagon's current emphasis on cyber defense needs to change. It's currently 90% defensive and 10% offensive; he said those numbers need to be swapped. "This strategy talks more about how we are going to defend the networks," he said. "The next iteration will have to start to talk about here's a strategy that says to the attacker, If you do this, the price to you is going to go up.'"
"Let me issue and control a nation's money and I care not who writes the laws. - Mayer Rothschild
"Civil disobedience is not our problem. Our problem is civil obedience! People are obedient in the face of poverty, starvation, stupidity, war, and cruelty. Our problem is that grand thieves are running the country. That's our problem!" - Howard Zinn
"If there is no struggle there is no progress. Power concedes nothing without a demand. It never did and never will" - Frederick Douglass
Reply
#2
U.S. Defense Department to do battle with social media
23
07
2011
[The Internet is officially the new battlefield.]

U.S. Defense Department to do battle with social media

Calcutta News.Net

The Pentagon is asking experts to help figure out how to detect and counter propaganda on social media networks in the aftermath of theArab uprising.

The US military's high-tech research wing, the Defense Advanced Research Projects Agency (DARPA), has sent a request for experts to look at a new science of social networks' that would attempt to get ahead of the curve of events unfolding on new media.

The program aims to track purposeful or deceptive messaging and misinformation" in social networks and to pursue'. According to DARPA's request for proposals issued on July 14, the program will also help counter messaging of detected adversary influence operations', The Telegraph reports.

Some senior US officials have spoken of the need to better track unrest revealed in social networks and to look for ways to shape outcomes in the Arab world through Twitter, Facebook or YouTube.

"Events of strategic as well as tactical importance to our Armed Forces are increasingly taking place in social media space. We must, therefore, be aware of these events as they are happening and be in a position to defend ourselves within that space against adverse outcomes," an announcement by DARPA said.

"Changes to the nature of conflict resulting from the use of social media are likely to be as profound as those resulting from previous communications revolutions," it added.

DARPA has planned to spend 42 million dollars on the Social Media in Strategic Communication (SMISC) program, with prospective contractors asked to test algorithms through experiments with social media. (ANI)

Share this:
Digg
Facebook
Reddit
StumbleUpon

http://therearenosunglasses.wordpress.co...ial-media/

####

DARPA Looking for Facebook Warriors
23
07
2011
Social Media in Strategic Communication (SMISC)

Solicitation Number: DARPA-BAA-11-64
Agency: Other Defense Agencies
Office: Defense Advanced Research Projects Agency
Location: Contracts Management Office
Solicitation Number:
DARPA-BAA-11-64
Notice Type:
Presolicitation
Synopsis:
Added: Jul 14, 2011 2:48 pm

DARPA is soliciting innovative research proposals in the area of social media in strategic communication. Proposed research should investigate innovative approaches that enable revolutionary advances in science, devices, or systems. Specifically excluded is research that primarily results in evolutionary improvements to the existing state of practice. See the full DARPA-BAA-11-64 document attached.
Important Dates
Posting Date: see announcement at http://www.fbo.gov
Proposal Due Date
Initial Closing: August 30, 2011, 12:00 noon (ET)
Final Closing: October 11, 2011, 12:00 noon (ET)
Industry Day: Tuesday, August 2, 2011

http://therearenosunglasses.wordpress.co...-warriors/
"Where is the intersection between the world's deep hunger and your deep gladness?"
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Open Seeds: Biopiracy and the Patenting of Life (14:53 GR TV) Ed Jewett 0 2,549 21-02-2012, 05:00 AM
Last Post: Ed Jewett
  Weaponization of the Internet... (US Policy to Address Internet Freedom) Ed Jewett 2 3,019 06-11-2011, 07:04 PM
Last Post: Ed Jewett
  End of the open, free universal net. Up go the walls. Coming soon: to each nation, its own internet Magda Hassan 0 2,384 12-03-2011, 02:44 PM
Last Post: Magda Hassan
  The thrilling potential of SixthSense technology Susan Grant 0 3,017 07-03-2010, 12:28 PM
Last Post: Susan Grant
  Open Source Connections toward Progress Erik Bellar 1 2,874 20-02-2010, 10:53 AM
Last Post: Ed Jewett
  Crypto-Eugenics Population Control: Policy and Propaganda Magda Hassan 1 3,422 10-08-2009, 10:51 AM
Last Post: Magda Hassan
  Furture of open internet 0 721 Less than 1 minute ago
Last Post:

Forum Jump:


Users browsing this thread: 1 Guest(s)