Posted on 11/21/2008 3:24:04 PM PST by SandRat
WASHINGTON, Nov. 21, 2008 Cyberspace is a warfighting domain, and the Defense Department is taking steps to defend this crucial capability, a Pentagon spokesman said today.
We are aware of a global virus for which there are some public alerts, and weve seen some of these on our networks, and we are taking steps to identify and mitigate the virus, Bryan Whitman said. We do aggressively monitor our networks for intrusions and take adequate steps to protect them.
Public alerts on this global virus threat urge all computer users to take precautions. Users should have current anti-viral software programs and anti-spyware installed in their computers, and information technology specialists should ensure that no infected hardware can breach DoD systems, Whitman said.
Whitman would not go into specifics about what the department is doing about the virus. We dont discuss any specific defensive measures that we are taking or may be taking to protect and defend our networks, he said.
DoDs global information grid includes more than 15,000 networks and about 7 million information technology devices, Pentagon officials said.
Grid defenders regularly send guidance to commands about current threats and measures for users to take to ensure information systems remain secure. It's the responsibility of every user to help protect the network, Whitman said. This is something that requires us to have constant vigilance.
The threat comes from a variety of sources, the spokesman said. It includes everything from recreational hackers to the self-styled cyber-vigilantes, Whitman said. It also emanates from various groups with nationalistic or ideological agendas, as well as transnational actors or transnational states, he added.
This is not a Defense Department issue. Its not even a government issue. It is an international issue a world issue, Whitman said. Anyone who uses computers and is on a network is susceptible.
U.S. Strategic Command is the lead agency for DoDs computer network defense effort. Under Stratcom, the Joint Task Force Global Network Operations handles protection. That group interfaces with other agencies.
Get Macs and use them.... :-)
See the following, for an example...
http://www.forbes.com/2007/12/20/apple-army-hackers-tech-security-cx_ag_1221army.html
Wallington, a division chief in the Army’s office of enterprise information systems, says the military is quietly working to integrate Macintosh computers into its systems to make them harder to hack. That’s because fewer attacks have been designed to infiltrate Mac computers, and adding more Macs to the military’s computer mix makes it tougher to destabilize a group of military computers with a single attack, Wallington says.
“Be all you can be...” Go Macs... LOL...
m m m m m....... sounds like another one of those generated crisis that Joe mentioned in a speech. Look at all thats going around lately, hate to be a conspiracy theory kook but it does sound a bit strange. Possible excuse to control internet?
Who generated this crisis and how would they go about controlling the internet?
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.