Éditoriaux Défense Sécurité Terrorisme Zones de conflits Logistique Livres de référence Liens
Terre Air Mer Gendarmerie Renseignement Infoguerre Cyber Recherche


U.S. Should Lead Cybersecurity Efforts, NSA Director Says

By Amaani Lyle, American Forces Press Service.

Washington D.C. – (AFPS) – October 4, 2012 – Analyzing and solving the challenge of cybersecurity is critical to the global economy, the National Security Agency director said during the U.S. Chamber of Commerce Cybersecurity Summit here today.

U.S. Army Gen. Keith Alexander, who also heads U.S. Cyber Command and the Central Security Service, discussed the costs and consequences of cybersecurity issues on commerce during his keynote address at the summit.

Well-known, seemingly invulnerable companies such as Symantec, L3, Sony, Google, Visa and even the U.S. Chamber of Commerce itself have been hacked, Alexander said, noting that even the military and government agencies have fallen prey to hackers.

“Either you know you’ve been hacked, or you’ve been hacked and you don’t know you’ve been hacked,” Alexander said. The greatest threats stem from theft of intellectual property, and disruptive attacks, Alexander said, citing examples since May 2007 that include attacks against Estonia, Georgia, Latvia and Lithuania. “Distributed denial of service attacks … are gaining in momentum, intensity and frequency,” he said, emphasizing the urgency of defending the United States from attacks and exploitation.

Industry partnership with government agencies such as the Defense Department, Department of Homeland Security, and Federal Bureau of Investigation to counter threats will be a critical component of fortifying cybersecurity, Alexander said, noting that U.S. should develop the solution.

“Our country … built this Internet and all the stuff that goes with it, and it is absolutely superb,” Alexander said. “We’re the nation that developed the Internet; we ought to be the first to secure it.”

According to Alexander, last year, the average number of emails sent per day was 419,000 billion, or about 70 emails per person. Additionally, there were 4.7 billion Google searches per day and still billions of steadily increasing bytes of global traffic, the general explained.

From a commerce perspective, the growth of new major companies in less than a decade demonstrates the importance of protecting intellectual property and proprietary information, Alexander said. The general offered compelling examples of growth and how quickly it could have been stymied if privileged information had been compromised.

In 2002, he said, Amazon was worth $851 million, compared to $12.83 billion today. Apple, worth $5.7 billion in 2002, is now worth a staggering $148 billion today. Google, worth $3.1 billion in 2004, is now valued at $43 billion in 2012, he said. “The value … is extraordinary,” Alexander said, adding that the government depends on similar networks to defend the country.

“If we’ve all been hacked, that means that we can all be attacked, and if we can be attacked, we have a vulnerability that … is critical to the operation of this country,” the general said.

Education, training and a defensible architecture such as cloud computing, however, can help steel government networks from such vulnerabilities, Alexander explained. “The cloud … has tremendous opportunities for a more defensible architecture,” Alexander said. “So … the Defense Department and the [intelligence] community moving to a thin, virtual client approach makes a lot of sense.”

Alexander also noted the importance of military, government and industry developing a common view of cyberspace issues and their solutions. “We have to have that understanding, especially when you talk to your [chief executive officers] and others about the solutions that you’re trying to put in there,” he said.

Army Gen. Keith B. Alexander

Related Sites:
National Security Agency
Central Security Service
Special Report: Cybersecurity

Derniers articles

Verdun 2016 : La légende de la « tranchée des baïonnettes »
Eyes in the Dark: Navy Dive Helmet Display Emerges as Game-Changer
OIR Official: Captured Info Describes ISIL Operations in Manbij
Cyber, Space, Middle East Join Nuclear Triad Topics at Deterrence Meeting
Carter Opens Second DoD Innovation Hub in Boston
Triomphe de St-Cyr : le Vietnam sur les rangs
Dwight D. Eisenhower Conducts First OIR Missions from Arabian Gulf
L’amiral Prazuck prend la manœuvre de la Marine
Airmen Practice Rescuing Downed Pilots in Pacific Thunder 16-2
On ne lutte pas contre les moustiques avec une Kalachnikov...
Enemy Mine: Underwater Drones Hunt Buried Targets, Save Lives
Daesh Publications Are Translated Into Eleven Languages
Opération Chammal : 10 000 heures de vol en opération pour les Mirage 2000 basés en Jordanie
Le Drian : Daech : une réponse à plusieurs niveaux
Carter: Defense Ministers Agree on Next Steps in Counter-ISIL Fight
Carter Convenes Counter-ISIL Coalition Meeting at Andrews
Carter Welcomes France’s Increased Counter-ISIL Support
100-Plus Aircraft Fly in for Exercise Red Flag 16-3
Growlers Soar With B-1s Around Ellsworth AFB
A-10s Deploy to Slovakia for Cross-Border Training
We Don’t Fight Against Mosquitoes With a Kalashnikov
Bug-Hunting Computers to Compete in DARPA Cyber Grand Challenge
Chiefs of US and Chinese Navies Agree on Need for Cooperation
DoD Cyber Strategy Defines How Officials Discern Cyber Incidents from Armed Attacks
Vice Adm. Tighe Takes Charge of Information Warfare, Naval Intelligence
Truman Strike Group Completes Eight-Month Deployment
KC-46 Completes Milestone by Refueling Fighter Jet, Cargo Plane
Air Dominance and the Critical Role of Fifth Generation Fighters
Une nation est une âme
The Challenges of Ungoverned Spaces
Carter Salutes Iraqi Forces, Announces 560 U.S. Troops to Deploy to Iraq
Obama: U.S. Commitment to European Security is Unwavering in Pivotal Time for NATO
International Court to Decide Sovereignty Issue in South China Sea
La SPA 75 est centenaire !
U.S. to Deploy THAAD Missile Battery to South Korea
Maintien en condition des matériels : reprendre l’initiative
La veste « léopard », premier uniforme militaire de camouflage
Océan Indien 2016 : Opérations & Coopération
Truman Transits Strait of Gibraltar
Navy Unveils National Museum of the American Sailor
New Navy, Old Tar
Marcel Dassault parrain de la nouvelle promotion d’officiers de l’École de l’Air
RIMPAC 2016 : Ravitaillement à la mer pour le Prairial avant l’arrivée à Hawaii
Bataille de la Somme, l’oubliée
U.S., Iceland Sign Security Cooperation Agreement
Cléopatra : la frégate Jean Bart entre dans l’histoire du BPC Gamal Abdel Nasser
Surveiller l’espace maritime français aussi par satellite
America's Navy-Marine Corps Team Fuse for RIMPAC 2016
Stratégie France : Plaidoyer pour une véritable coopération franco-allemande
La lumière du Droit rayonne au bout du chemin

Directeur de la publication : Joël-François Dumont
Comité de rédaction : Jacques de Lestapis, Hugues Dumont, François de Vries (Bruxelles), Hans-Ulrich Helfer (Suisse), Michael Hellerforth (Allemagne).
Comité militaire : VAE Guy Labouérie (†), GAA François Mermet (2S), CF Patrice Théry (Asie).