. Military Space News .
The Virtual Fog Of Internet Warfare

disclaimer: image is for illustration purposes only
by Loren B. Thompson
Arlington, Va. (UPI) Dec 24, 2008
Digital networks are the nervous system of our modern technological civilization, essential to commerce and culture. The entire global economy, from banking to utilities to manufacturing to healthcare, relies on Internet-style communications. Even the U.S. military has reorganized for what it calls "network-centric warfare."

But the Internet empowers everybody, including criminals and foreign governments intent on weakening the United States of America. As digital networks have proliferated, so has malicious software designed to exploit the networks for destructive purposes. Internet predators are increasingly capable and sophisticated.

Cyber threats are now so common that they pose a real danger to U.S. national security. Networks must be secured against intrusion, otherwise the United States risks severe economic damage and potential defeat at the hands of other countries. But the anonymity of the Internet impedes efforts to deter and destroy threats.

The U.S. government has taken a number of steps aimed at combating threats to digital networks, including a Comprehensive National Cybersecurity Initiative launched in 2008. However, the current federal framework for dealing with cyber threats is fragmented, and it cannot keep up with emerging dangers.

The new Obama administration will have to determine whether current cybersecurity efforts are sufficient or if additional resources are required. The Obama administration will also have to decide whether the current federal framework for addressing cyber threats can do the job, and if not how to tap more agile sources of expertise in the marketplace.

In the 20 years since the Cold War ended, the world has become connected in ways it never was before. A breakthrough called the Internet has integrated previously isolated networks into a single global web that anyone with a computer can enter. The technology that made this possible, called Internet Protocol communications, has torn down the barriers that once impeded interaction among diverse and scattered users.

As a result, the world has become a more open and productive place. People who once had little say in how their society operated have been empowered, and opportunities for enrichment of every kind have multiplied.

But the paradox of the Internet is that in delivering power to the edges, it has also delivered power to the fringes. Predators of every persuasion now have access and options they never would have enjoyed in the past.

Some are agents of foreign governments seeking to subvert democracy or steal its secrets. Others are criminals, cult members, transnational terrorists or nihilistic vandals. All have discovered that the Internet provides a potential pathway to their goals. And increasingly, it is information networks themselves -- the nervous system of our civilization -- that such actors seek to target.

Outside View: Internet threats -- Part 2
Most Internet users have some awareness of the problem of threats to the entire system from criminals, terrorists and potentially hostile nations, since they encounter it in the form of spyware, viruses and other online nuisances.

However, the most disturbing "cyber" threats are largely invisible to the general public, because they involve attacks on specialized networks used by the armed forces, healthcare professionals, air traffic controllers, financial institutions, public utilities and heavy industry.

Each of these vital components of modern society now relies on Internet Protocol communications to run efficiently, and in most cases the new technology was assimilated without a careful assessment of its vulnerability to attack by outsiders.

A report from the Lexington Institute titled "Hidden Danger: The Threat to America's Networks" provides an overview of the threat to U.S. information networks, especially the networks operated by the federal government.

The report begins by explaining the spectrum of cyber threats the United States nation currently faces and then details the potential consequences for military, civil and commercial networks, the available remedies for dealing with the danger, and the steps the government has taken to date in implementing said remedies. It concludes with a series of recommendations, the most important of which is that government recognize its limitations and turn to the private sector for most of the expertise needed in defeating cyber threats.

Networks of one sort or another have existed since the dawn of civilization. Digital networks, though, are a relatively new thing. Whether wired or wireless, digital networks all operate using binary computer code -- the language of ones and zeros that is the foundation for software. The basic architecture of the Information Age consists of computer nodes where digital information is stored and used, and links that convey that information between nodes. When a group of nodes and links are organized to accomplish some shared purpose, they become a network.

The Internet codes digital information so it can traverse many different networks as if they were a single unified web. Originally conceived to maintain connectivity in wartime, it grew into a worldwide phenomenon when tools became available that made it easy for people to use Internet Protocol communications to send or access information anywhere a network connection existed.

Unfortunately, predators quickly learned how to employ the new tools for their own purposes. Thus, from the earliest days of the Information Age, there has been concern about securing the Internet against those who would misuse it.

Concern about cybersecurity grew as Internet-style communications became the preferred means of conducting commerce, governance and other forms of social interaction.

(Loren B. Thompson is chief executive officer of the Lexington Institute, an Arlington, Va.-based think tank that supports democracy and the free market.)

(United Press International's "Outside View" commentaries are written by outside contributors who specialize in a variety of important issues. The views expressed do not necessarily reflect those of United Press International. In the interests of creating an open forum, original submissions are invited.)

Share This Article With Planet Earth
del.icio.usdel.icio.us DiggDigg RedditReddit
YahooMyWebYahooMyWeb GoogleGoogle FacebookFacebook



Related Links
Cyberwar - Internet Security News - Systems and Policy Issues



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Microsoft releases emergency patch for perilous IE flaw
San Francisco (AFP) Dec 17, 2008
Microsoft on Wednesday released an emergency patch to fix a perilous software flaw allowing hackers to hijack Internet Explorer browsers and take over computers.







  • 50 years of intrigue in US-Cuba ties
  • US confirms 'bilateral charter' with Georgia being negotiated
  • Russia optimistic on US ties under Obama: deputy minister
  • Rice to visit China in last scheduled trip

  • Pakistan, India can't afford war: analysts
  • Russia orders 70 strategic nuclear missiles by 2011: report
  • Russia may place nuclear missiles in Belarus: report
  • Swiss engineer in nuclear secrets probe freed on bail: report

  • Russia selling surface-to-air missiles to Libya, Syria: report
  • Lebanese army finds seven missiles pointed at Israel
  • Russia denies delivering S-300 missiles to Iran
  • Six killed in suspected US missile strike in Pakistan: official

  • BMD Focus: Russia's S-300s boost Iran
  • LM Reports SBIRS Progress But Much Remains
  • The S-300 Mystery Deepens Part One
  • Atlantic Eye: Lockerbie to missile defense

  • Britain's environment minister concerned by Heathrow plan
  • Climate protesters cause chaos at British airport
  • Thompson Files: Protect U.S. aerospace
  • NASA studies pilot cognition

  • Russia mulls unprecedented Israel drones purchase
  • Raven UAS Certified By Italian Ministry Of Defense
  • Successful Autoland Of The F-16 Fighting Falcon
  • Navy Targets Unmanned Aircraft

  • Iraqi presidency approves non-US foreign troops resolution
  • Romanian parliament votes to keep troops in Iraq in 2009
  • El Salvador announces Iraq pull out
  • Military Matters: New strategies -- Part 2

  • Docs to learn battlefield acupuncture
  • Thompson Files: Save the F-22
  • Dutch ministry favours Joint Strike Fighter
  • Amnesty warns against 'potentially lethal' Tasers

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement