Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
US military not ready to wage digital attack: official
by Staff Writers
Washington (AFP) April 14, 2015


US 'aggressively' raising cybersecurity with China: official
Beijing (AFP) April 14, 2015 - Washington is "aggressively" warning Beijing over the repercussions of its demand that US tech firms should hand over their encryption keys if they want to do business in China, a top US official said Tuesday.

The statement by US Commerce Secretary Penny Pritzker comes one month after President Obama rebuked Beijing over a new anti-terror law that would require companies to give Beijing details of their encryption methods or be denied access to the Chinese market.

The law, recently drafted by Chinese lawmakers, is expected to be adopted this year.

"The approach that we've taken with the Chinese government is, one, to first of all aggressively talk about the challenges that some of the regulations might do to impede trade," said Pritzker, who is leading a clean energy trade mission to China with executives from 24 US companies.

She added that she had had "pointed conversations" with Chinese leaders about the issue on Monday.

China operates a vast security and surveillance apparatus, with the ruling Communist Party maintaining a resolute grip on power, while Washington and Beijing frequently trade accusations of state-sponsored cyber-spying.

Beijing is tightening its grip on information after a series of deadly attacks which authorities have blamed on separatists from the far-western, mainly Muslim region of Xinjiang.

The foreign ministry in Beijing says China is a victim of hacking and has defended the law as purely internal and "a requirement for the Chinese government to prevent and combat terrorism".

Yet the measure has alarmed some US-based tech companies and has drawn criticism from Obama, who said last month that he had raised the issue directly with Chinese President Xi Jinping.

The row comes amid reports that Beijing has expanded its Internet censorship efforts beyond its borders with a new strategy, dubbed the "Great Cannon", that attacks websites across the globe.

In a roundtable with Chinese and foreign media, Pritzker said that Washington wants to ensure US firms in China can "keep the promises they've made to their customers".

"What we talked about is having a dialogue -- a dialogue being where two governments come together to really seriously have a conversation about how to address these issues," she said. "And there seemed to be some receptivity to doing that."

The US military is well equipped to defend the country against cyberattacks but is not yet ready to wage digital warfare, a senior defense official told lawmakers on Tuesday.

The military's cyber command, created in 2009, lacks the means to lead an offensive campaign in a fast-moving digital conflict, said Eric Rosenbach, the Pentagon's principal adviser on cyber security.

Asked by Senator Bill Nelson if the command lacks the computer network infrastructure to carry out a cyber offensive "effectively," Rosenbach said: "Yes, they currently do not have a robust capability."

But when it comes to defending US networks, "we are in good shape," he told a Senate Armed Services subcommittee on emerging threats.

His comments were unusual because officials previously have suggested the military was ready to lead an offensive digital campaign if necessary.

Rosenbach told senators there was no shortage of resources or funding for cyber command but there were technical and manpower problems that had to be tackled.

Pentagon chief Ashton Carter was following the issue closely and was ready to support more investment in cyber command as needed, he added.

Carter is reviewing a new cyber strategy for the military that is due to be released next week, he said.

Cyber command, in preparing options for offensive digital operations, was prepared to go after some civilian targets, Rosenbach said, "but in a very precise and confined way."

Any offensive action would adhere to the laws of war and seek to avoid causing civilian casualties, he said.

But in response to questions from lawmakers on what a possible offensive operation might entail, Rosenbach said he would prefer to discuss the subject in a closed door, classified hearing.

Experts and former officials have cited the computer worm Stuxnet that disrupted Iran's nuclear program in 2010 as an example of a suspected joint US-Israeli digital operation.

US cyber command is supposed to create a force of about 6,000 personnel for all the branches of the armed forces.

The Pentagon recently said it hoped to reach that by 2016 but Rosenbach said the military will not meet that objective until 2018. He blamed automatic budget cuts in recent years that had undermined training efforts.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
Chinese hackers targeted SE Asia, India for last decade: report
Singapore (AFP) April 13, 2015
A cyber espionage group most likely sponsored by China has been snooping on governments and businesses in Southeast Asia and India undetected for the last 10 years, Internet security company FireEye said Monday. FireEye said the hackers, dubbed APT30, have been systematically stealing "sensitive information" since 2005, targeting governments, corporations and journalists with interests invol ... read more


CYBER WARS
Moon formed when young Earth and little sister collided

Will the moon's first inhabitants live in giant lava tubes?

Soft Landing on the Moon an Extraordinary Challenge

Stop blaming the moon

CYBER WARS
Team Returning Orbiter to Duty After Computer Swap

More evidence for groundwater on Mars

Scars on Mars from 2012 Rover Landing Fade - Usually

Bill Nye and others discussing taking humans to Mars by 2033

CYBER WARS
Plants Use Sixth Sense for Growth Aboard the Space Station

How To Train Your Astronauts

Air Scrubber Plus Brings Space Age Technology Down To Earth

NASA Announces New Partnerships with Industry for Deep-Space Skills

CYBER WARS
Chinese scientists mull power station in space

China completes second test on new carrier rocket's power system

China's Yutu rover reveals Moon's "complex" geological history

China's Space Laboratory Still Cloaked

CYBER WARS
Special 3-D delivery from space to Marshall Space Flight Center

NASA Extends Lockheed Martin Contract To Prepare Critical Cargo For ISS

NASA drives future discoveries with new ISS information system

Cosmonauts Take Tablet Computer Into Space

CYBER WARS
SpaceX bid to recycle rocket fails again

Soyuz Installed at Baikonur, Expected to Launch Wednesday

THOR 7 encapsulation as next Ariane 5 campaigns proceeds

Russia to Launch Nine Rockets Into Space in April-June

CYBER WARS
Earthlike 'Star Wars' Tatooines may be common

Planets in the habitable zone around most stars, calculate researchers

Our Solar System May Have Once Harbored Super-Earths

SOFIA Finds Missing Link Between Supernovae and Planet Formation

CYBER WARS
Scientists create invisible objects without metamaterial cloaking

Solution-grown nanowires make the best lasers

Intel lifted by data centers, as PC market flounders

Largest database of elastic properties accelerates material science




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.