25.07.2019 Views

International Cyber Terrorism

International Cyber Terrorism

International Cyber Terrorism

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Conti and Surdu reasoned, "Adding an efficient and effective cyber branch alongside<br />

the Army, Navy and Air Force would provide our nation with the capability to defend our<br />

technological infrastructure and conduct offensive operations. Perhaps more important,<br />

the existence of this capability would serve as a strong deterrent for our nation's<br />

enemies."<br />

In response to concerns about the military's right to respond to cyber attacks, General<br />

Alexander stated "The U.S. must fire back against cyber attacks swiftly and strongly and<br />

should act to counter or disable a threat even when the identity of the attacker is<br />

unknown" prior to his confirmation hearings before the United States Congress. This<br />

came in response to incidents such as a 2008 operation to take down a governmentrun<br />

extremist honeypot in Saudi Arabia. "Elite U.S. military computer specialists, over<br />

the objections of the CIA, mounted a cyberattack that dismantled the online forum".<br />

"The new U.S. <strong>Cyber</strong> Command needs to strike a balance between protecting military<br />

assets and personal privacy." stated Alexander, in a Defense Department release. If<br />

confirmed, Alexander said, his main focus will be on building capacity and capability to<br />

secure the networks and educating the public on the command's intent.<br />

"This command is not about an effort to militarize cyber space," he said. "Rather, it's<br />

about safeguarding our military assets."<br />

In July 2011, Deputy Defense Secretary William Lynn announced in a conference that<br />

"We have, within <strong>Cyber</strong> Command, a full spectrum of capabilities, but the thrust of the<br />

strategy is defensive." "The strategy rests on five pillars, he said: treat cyber as a<br />

Page 95 of 174

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!