Note: The following text is a quote:
http://www.defenselink.mil/news/newsarticle.aspx?id=49282
General Lays Out Challenges of Defending Cyberspace
By Jim Garamone
American Forces Press Service
OFFUTT AIR FORCE BASE, Neb., March 14, 2008 Air Force Minuteman and Navy Trident missiles stand outside the headquarters of U.S. Strategic Command here as reminders of the commands mission of strategic deterrence and nuclear operations.
But walking past the missiles are servicemembers using cell phones and other wireless devices. And that, too, represents a mission of the command: cyberspace operations.
Air Force Gen. Kevin P. Chilton, commander of U.S. Strategic Command, said defense networks see more than a million suspicious hits a day.
These are pings where someone is coming in and trying to open something or access information from someone within our military networks, Chilton said during an interview March 11. This could be everything from some curious citizens, to people who maybe are trying to hack for sport, to people who are trying to collect information.
He said what concerns the command is what some people call data mining. This is where analysts use computers to shift through enormous quantities of data to glean information. It is the new form of espionage.
The way I think of it is various organizations are coming in and doing espionage work, the general said. You can imagine the downloading of files from personnel agencies or other branches of government.
In the past, to get that information you would hire someone to break in with a flashlight in their teeth and go through the drawer and photograph the files, Chilton said. Now, all this information is stored on discs or on computers. Spies dont have to leave a computer terminal in their own countries to try to get this information.
China has written openly of cyber warfare, and U.S. officials write in the current Military Power of the Peoples Republic of China assessment that Chinese officials see cyber warfare as an asymmetric brand of warfare.
Chinas current thinking on asymmetric warfare is encapsulated by a military theory termed non-contact, which seeks to attain a political goal by looking for auxiliary means beyond military boundaries or limits, the publication says. Examples include: cyber warfare against civilian and military networks especially against communications and logistics nodes; fifth column attacks, including sabotage and subversion, attacks on financial infrastructure; and, information operations.
There have been a number of intrusions against DoD computers from China, but the United States has not attributed these to any country. The thing about China that gives us pause is they have written openly about their emphasis in particular areas: space, cyber, Chilton said.
In the cyber world it is tough to figure out who is attacking. In April 2007, Estonia came under cyber attack. The denial-of-service attack targeted the government, banks, newspapers and other computer dependent businesses. Estonian officials immediately charged Russia with initiating the attacks, but to date, a computer hacker in Estonia has been the only person charged in the attack.
The kind of attack that you would worry about is the kinds of things we saw in Estonia last year — a denial-of-service attack, where they flood the system with so many e-mail botnets you dont shut the system down, but you slow it down to the point that its unusable, the general said.
STRATCOM and the rest of the military are more aware than ever of intrusions of their networks, reporting on them and taking actions.
A big step forward for us was unity of effort, the general said. Joint Task Force Global Network Operations is part of the command tasked with defending the military and classified systems. The task force put in place guidelines and restrictions for the way the services operate in the cyber world. This includes security measures, firewalls and what people shouldnt be doing, the general said.
We have a lot of work in front of us in training people in our military, because defense of the network goes from high-end technical solutions to the very low-end, which is making sure the very newest and youngest person on the network understands that their actions can create vulnerability that is significant and teach them what to watch out for and what they should and shouldnt do, Chilton said.
All computer defenders must be worried about the whole range of attacks or intrusions, Chilton said.
You have to be worried about it all — I mean, we can have a bored 16-year-old do damage to our networks, he noted. Its not just a nation-state that you worry about. It can be from any organization like al Qaeda.
Note: The following text is a quote:
http://www.defenselink.mil/news/newsarticle.aspx?id=49280
Coalition Forces in Iraq Detain Insurgent, Foil Ambush
American Forces Press Service
WASHINGTON, March 14, 2008 Coalition troops in Iraq captured a suspected bomb maker and thwarted an insurgent ambush during operations in Baghdad over the past few days, military officials said.
U.S. soldiers detained a suspected improvised explosive device maker March 12 in the Jadida area of the Karadah security district in eastern Baghdad, officials said.
Soldiers with the 10th Infantry Divisions 4th Brigade Combat Team detained the suspected terrorist, who tested positive for explosive materials. Intelligence officials believe the detention of the suspect will result in reduced roadside-bomb attacks on Iraqi and coalition security forces in the area.
U.S. soldiers in Baghdad also foiled an attempted ambush in the northern portion of the citys Adhamiya district March 11. Soldiers with the 4th Infantry Divisions 3rd Brigade Combat Team were attacked by enemy small-arms fire after theyd entered the area in response to reports of mortar activity.
An air-weapons team identified and engaged the suspected attackers, who were in three vehicles. One suspect was wounded and all three vehicles were disabled during the exchange.
The injured suspect was detained and taken to a coalition outpost for medical treatment. Three other suspects also were detained.
Local Iraqi residents then alerted the U.S. soldiers about a possible enemy munitions cache in the area. Following the tip, the soldiers seized 85 mm rockets, rocket launchers, mortars, a 122 mm projectile and 40 mm grenades.
Also, over the past week in Anbar province, Iraqi police discovered two huge weapons caches that contained rockets, rocket-propelled-grenade launchers, rifles, machine guns, radios, hand grenades, mortars and mortar rounds, small-arms and machine-gun ammunition and more, officials said.
In Fallujah, Iraqi police found a large weapons cache hidden inside a city residence March 11. Numerous hand grenades, small-arms ammunition, rocket-propelled-grenade launchers, rifle scopes, blasting caps and more ordnance were discovered inside a hidden room that had been concealed by a false wall, officials said.
Eight other massive weapons caches were discovered March 7 on a farm located near Rawah, officials said. The Rawah caches included more than 8,800 items that in total weighed more than 2,600 pounds. Much of the buried ordnance was found to be unserviceable.
(Compiled from Multinational Force Iraq and Multinational Corps Iraq news releases.)