男女羞羞视频在线观看,国产精品黄色免费,麻豆91在线视频,美女被羞羞免费软件下载,国产的一级片,亚洲熟色妇,天天操夜夜摸,一区二区三区在线电影
   

US cyberwarfare prep includes offense

(Agencies)
Updated: 2008-04-07 07:13

NEW YORK -- US military officials seeking to boost the nation's cyberwarfare capabilities are looking beyond defending the Internet: They are developing ways to launch virtual attacks on enemies.

But first the military will have to figure out the proper boundaries.

"What do we consider to be an act of war in cyberspace?" asked Lt. Gen. Robert J. Elder Jr., who heads the Air Force's cyberoperations command. "The military is not going to tend to do that (use virtual strike capabilities) until you cross some line that constitutes an act of war."

Elder said initial uses likely would be limited to diverting or killing data packets that threaten the nation's systems, the way the military may intercept a foreign ship carrying arms in international waters.

The remarks came late Friday during a New York chapter meeting of the Association For Intelligence Officers, a nonprofit group for current and former intelligence agents and their supporters.

In an interview afterward, Elder said that in the future, the military might rely upon network warfare to disrupt an enemy's communications system, replacing the need for conventional weapons like bombs.

In any such scenario, Elder said the military would be restricted by the same rules of engagement -- such as requirements for a formal declaration of war -- that apply to conventional attacks.

Elder said that during the early days of the Iraq war, rudimentary forms of cyberattacks were used by the United States, including electronically jamming Iraqi military systems and using network attacks to hinder Iraqi ground units from communicating with one another.

The military's offensive capabilities have improved since then, he said.

As the military increasingly relies on networks and computer systems to communicate and coordinate conventional operations, the US Air Force is planning to establish by October a Cyber Command for waging a future war that is fought not only by land, sea and air but also in cyberspace.

Hackers with a foreign government or terrorist group potentially could bring down military and civilian Web sites using what's known as a denial-of-service attack -- flooding the computer servers with fake traffic such that legitimate visitors can't get through.

Enemies also could look for security vulnerabilities to break into key systems that run power plants, refineries and other infrastructure.

Already, the Chinese government has been suspected of using the Web to break into computers at the Defense Department and other US agencies in what was dubbed Operation Titan Rain. Since 2001, Chinese "hacktivists" have organized attacks on and defaced US Web sites to oppose what they call the imperialism of the United States and Japan.

Elder outlined several defensive initiatives aimed at deterring cyberattacks on the United States.

The military, for instance, needs to demonstrate that its conventional operations still could function even if the network is disrupted. To do that, he said, the military has been identifying "what if" loss scenarios and figuring out the backup capabilities needed to overcome them.

Forensics capabilities also are being developed, he said, to identify who is attacking, even if the attacker tries to hide by spoofing the identity of packets and rerouting them through intermediary computer servers. That way, the United States can make a credible threat of retribution.



Top World News  
Today's Top News  
Most Commented/Read Stories in 48 Hours
主站蜘蛛池模板: 长岛县| 嘉义市| 黄浦区| 乐清市| 龙山县| 策勒县| 天水市| 积石山| 荔波县| 盘山县| 神农架林区| 泸溪县| 钟祥市| 龙胜| 镇康县| 察隅县| 弥渡县| 安岳县| 大理市| 新干县| 永靖县| 迁安市| 武宣县| 泾阳县| 庄河市| 宁南县| 南平市| 灌阳县| 崇礼县| 双鸭山市| 汪清县| 淅川县| 通化县| 安吉县| 缙云县| 东阳市| 宣威市| 长沙县| 泸定县| 灌阳县| 论坛| 青冈县| 甘南县| 靖江市| 纳雍县| 汕头市| 白银市| 寿阳县| 涿鹿县| 拜城县| 双牌县| 汪清县| 内江市| 文化| 江阴市| 贵州省| 福建省| 合阳县| 佳木斯市| 乌拉特前旗| 滨州市| 汕头市| 罗山县| 湖北省| 原阳县| 东丰县| 桦甸市| 渭源县| 鹤山市| 湖南省| 盘山县| 长泰县| 华亭县| 巴林左旗| 柞水县| 曲麻莱县| 襄汾县| 黄平县| 石狮市| 房产| 昌乐县| 鄯善县|