Éditoriaux Défense Sécurité Terrorisme Zones de conflits Logistique Livres de référence Liens
Terre Air Mer Gendarmerie Renseignement Infoguerre Cyber Recherche

Cyber Defense Requires Teamwork

Cyber Defense Requires Teamwork, Agility, Alexander Says

By Donna Miles, American Forces Press Service.

Washington D.C. -- (AFPS) -- October 27, 2011 – The commander of U.S. Cyber Command called for increased collaboration among the government, industry and America’s allies in developing more defensible networks to confront escalating global cyber threats.

Current network security protections aren’t nimble enough to defend against the exploding number of threats, Army Gen. Keith B. Alexander told government, academic and private-sector professionals yesterday at the Security Innovation Network’s Showcase 2011 conference here.

Firewalls, routers, antivirus software and intrusion detection systems are designed to identify and block specific cyber-intruder signatures, Alexander said. The problem, he noted, is that adversaries have the ability to scan the networks, exploit vulnerabilities and use them to gain access.

“It’s like the Maginot Line,” Alexander explained, referring to the fortifications France built along its border with Germany after World War I with hopes of preventing another cross-border attack. Germany responded during World War II by doing the unexpected: attacking instead through the Ardennes Forest.

“That’s the same thing that happens in your network,” Alexander said, noting in cyberspace adversaries have “all the advantages.” They can scan networks, he said, and identify what software is being run, and pounce when they identify a vulnerability.

“That’s the dynamic we have to change,” Alexander said. “We are the guys who helped create the Internet. We are the ones that built that. We ought to be the first ones to secure it.”

The White House’s International Strategy for Cyberspace and Defense Department strategy represent a start in that direction, Alexander said. But he emphasized that developing more defensible systems isn’t something the Defense Department or any other entity can do alone.

It requires government agencies working as a team, he said, while also working with industry and U.S. allies and partners.

“When we talk cyber, we talk a team sport,” Alexander said. “It’s all of us operating as a team to defend the country in cyberspace, with the right legal authorities.”

Alexander cited the explosion of network communications around the world. As of March 31, 30 percent of the world population had access to the Internet. During 2010, 107 trillion emails were sent -- that’s 294 billion per day. By 2015, he said, it’s predicted that there will be twice as many Internet devices as people on the planet.

Such growth, the general said, has created vulnerabilities which leave no sector immune -- from hackings at well-respected companies such as Nasdaq, RSA Security and Booz Allen Hamilton to denial-of-service attacks in Estonia, Georgia and elsewhere.

For every company that recognizes it has been hacked, Alexander said, hundreds more don’t.

Among the costs is a huge loss of intellectual property through what Alexander called “the greatest transfer of wealth in history.” But the bigger fear, he said, is that disruptive attacks will turn destructive.

Alexander noted initiatives under way that show promise in countering these growing threats. For example, he said, “cloud” computing delivers shared resources and software through virtual routers, machines and networks [and] enables faster server updates and more agile responses than legacy databases.

Meanwhile, a pilot program in which the Defense Department shares classified threat intelligence with industry is helping to increase military cyber defenses and preventing enemy intrusions into other sensitive government networks.

Alexander called the Defense Industrial Base Cyber Pilot, launched in partnership with the Homeland Security Department, “a huge step” that’s blocked intrusions and identified signatures that hadn’t been previously seen.

“The intent is to push signatures to the Internet service providers and protect vulnerabilities,” he said. “We are having success with that.”

Lauding progress in network protections, Alexander emphasized that they can’t come at the cost of civil liberties and privacy rights.

“We should demand that we get both,” he said. “In my opinion, we can do that. We can protect civil liberties and privacy and come up with a defensive program that we can defend this country and our companies in cyberspace.”

Army Gen. Keith B. Alexander

Related Sites:
U.S. Cyber Command
Special Report: Cybersecurity

See also :

The Pentagon's Cyberstrategy One Year Later : defending Against Next Cyberattack by William J. Lynn III, U.S. Deputy Secretary of Defense, in Foreign Affairs, September 28. 2011. More destructive cyberweapons are being created every day, and an increasingly sophisticated technology black market virtually guarantees that they will eventually land in the hands of the United States' enemies. Robust defenses are no longer a luxury, they are a necessity.

Defending a New Domain : The Pentagon's Cyberstrategy, by William J. Lynn III, U.S. Deputy Secretary of Defense, and Nicholas Thompson, in Foreign Affairs, September 28. 2011. Deputy Secretary of Defense William Lynn discusses the various new strategies used by the Pentagon to identify information technology threats, combat cyber warfare, and protect U.S. infrastructure.

Derniers articles

Verdun 2016 : La légende de la « tranchée des baïonnettes »
Eyes in the Dark: Navy Dive Helmet Display Emerges as Game-Changer
OIR Official: Captured Info Describes ISIL Operations in Manbij
Cyber, Space, Middle East Join Nuclear Triad Topics at Deterrence Meeting
Carter Opens Second DoD Innovation Hub in Boston
Triomphe de St-Cyr : le Vietnam sur les rangs
Dwight D. Eisenhower Conducts First OIR Missions from Arabian Gulf
L’amiral Prazuck prend la manœuvre de la Marine
Airmen Practice Rescuing Downed Pilots in Pacific Thunder 16-2
On ne lutte pas contre les moustiques avec une Kalachnikov...
Enemy Mine: Underwater Drones Hunt Buried Targets, Save Lives
Daesh Publications Are Translated Into Eleven Languages
Opération Chammal : 10 000 heures de vol en opération pour les Mirage 2000 basés en Jordanie
Le Drian : Daech : une réponse à plusieurs niveaux
Carter: Defense Ministers Agree on Next Steps in Counter-ISIL Fight
Carter Convenes Counter-ISIL Coalition Meeting at Andrews
Carter Welcomes France’s Increased Counter-ISIL Support
100-Plus Aircraft Fly in for Exercise Red Flag 16-3
Growlers Soar With B-1s Around Ellsworth AFB
A-10s Deploy to Slovakia for Cross-Border Training
We Don’t Fight Against Mosquitoes With a Kalashnikov
Bug-Hunting Computers to Compete in DARPA Cyber Grand Challenge
Chiefs of US and Chinese Navies Agree on Need for Cooperation
DoD Cyber Strategy Defines How Officials Discern Cyber Incidents from Armed Attacks
Vice Adm. Tighe Takes Charge of Information Warfare, Naval Intelligence
Truman Strike Group Completes Eight-Month Deployment
KC-46 Completes Milestone by Refueling Fighter Jet, Cargo Plane
Air Dominance and the Critical Role of Fifth Generation Fighters
Une nation est une âme
The Challenges of Ungoverned Spaces
Carter Salutes Iraqi Forces, Announces 560 U.S. Troops to Deploy to Iraq
Obama: U.S. Commitment to European Security is Unwavering in Pivotal Time for NATO
International Court to Decide Sovereignty Issue in South China Sea
La SPA 75 est centenaire !
U.S. to Deploy THAAD Missile Battery to South Korea
Maintien en condition des matériels : reprendre l’initiative
La veste « léopard », premier uniforme militaire de camouflage
Océan Indien 2016 : Opérations & Coopération
Truman Transits Strait of Gibraltar
Navy Unveils National Museum of the American Sailor
New Navy, Old Tar
Marcel Dassault parrain de la nouvelle promotion d’officiers de l’École de l’Air
RIMPAC 2016 : Ravitaillement à la mer pour le Prairial avant l’arrivée à Hawaii
Bataille de la Somme, l’oubliée
U.S., Iceland Sign Security Cooperation Agreement
Cléopatra : la frégate Jean Bart entre dans l’histoire du BPC Gamal Abdel Nasser
Surveiller l’espace maritime français aussi par satellite
America's Navy-Marine Corps Team Fuse for RIMPAC 2016
Stratégie France : Plaidoyer pour une véritable coopération franco-allemande
La lumière du Droit rayonne au bout du chemin

Directeur de la publication : Joël-François Dumont
Comité de rédaction : Jacques de Lestapis, Hugues Dumont, François de Vries (Bruxelles), Hans-Ulrich Helfer (Suisse), Michael Hellerforth (Allemagne).
Comité militaire : VAE Guy Labouérie (†), GAA François Mermet (2S), CF Patrice Théry (Asie).