Subscribe free to our newsletters via your
. GPS News .




CYBER WARS
US military not ready to wage digital attack: official
by Staff Writers
Washington (AFP) April 14, 2015


US 'aggressively' raising cybersecurity with China: official
Beijing (AFP) April 14, 2015 - Washington is "aggressively" warning Beijing over the repercussions of its demand that US tech firms should hand over their encryption keys if they want to do business in China, a top US official said Tuesday.

The statement by US Commerce Secretary Penny Pritzker comes one month after President Obama rebuked Beijing over a new anti-terror law that would require companies to give Beijing details of their encryption methods or be denied access to the Chinese market.

The law, recently drafted by Chinese lawmakers, is expected to be adopted this year.

"The approach that we've taken with the Chinese government is, one, to first of all aggressively talk about the challenges that some of the regulations might do to impede trade," said Pritzker, who is leading a clean energy trade mission to China with executives from 24 US companies.

She added that she had had "pointed conversations" with Chinese leaders about the issue on Monday.

China operates a vast security and surveillance apparatus, with the ruling Communist Party maintaining a resolute grip on power, while Washington and Beijing frequently trade accusations of state-sponsored cyber-spying.

Beijing is tightening its grip on information after a series of deadly attacks which authorities have blamed on separatists from the far-western, mainly Muslim region of Xinjiang.

The foreign ministry in Beijing says China is a victim of hacking and has defended the law as purely internal and "a requirement for the Chinese government to prevent and combat terrorism".

Yet the measure has alarmed some US-based tech companies and has drawn criticism from Obama, who said last month that he had raised the issue directly with Chinese President Xi Jinping.

The row comes amid reports that Beijing has expanded its Internet censorship efforts beyond its borders with a new strategy, dubbed the "Great Cannon", that attacks websites across the globe.

In a roundtable with Chinese and foreign media, Pritzker said that Washington wants to ensure US firms in China can "keep the promises they've made to their customers".

"What we talked about is having a dialogue -- a dialogue being where two governments come together to really seriously have a conversation about how to address these issues," she said. "And there seemed to be some receptivity to doing that."

The US military is well equipped to defend the country against cyberattacks but is not yet ready to wage digital warfare, a senior defense official told lawmakers on Tuesday.

The military's cyber command, created in 2009, lacks the means to lead an offensive campaign in a fast-moving digital conflict, said Eric Rosenbach, the Pentagon's principal adviser on cyber security.

Asked by Senator Bill Nelson if the command lacks the computer network infrastructure to carry out a cyber offensive "effectively," Rosenbach said: "Yes, they currently do not have a robust capability."

But when it comes to defending US networks, "we are in good shape," he told a Senate Armed Services subcommittee on emerging threats.

His comments were unusual because officials previously have suggested the military was ready to lead an offensive digital campaign if necessary.

Rosenbach told senators there was no shortage of resources or funding for cyber command but there were technical and manpower problems that had to be tackled.

Pentagon chief Ashton Carter was following the issue closely and was ready to support more investment in cyber command as needed, he added.

Carter is reviewing a new cyber strategy for the military that is due to be released next week, he said.

Cyber command, in preparing options for offensive digital operations, was prepared to go after some civilian targets, Rosenbach said, "but in a very precise and confined way."

Any offensive action would adhere to the laws of war and seek to avoid causing civilian casualties, he said.

But in response to questions from lawmakers on what a possible offensive operation might entail, Rosenbach said he would prefer to discuss the subject in a closed door, classified hearing.

Experts and former officials have cited the computer worm Stuxnet that disrupted Iran's nuclear program in 2010 as an example of a suspected joint US-Israeli digital operation.

US cyber command is supposed to create a force of about 6,000 personnel for all the branches of the armed forces.

The Pentagon recently said it hoped to reach that by 2016 but Rosenbach said the military will not meet that objective until 2018. He blamed automatic budget cuts in recent years that had undermined training efforts.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
Chinese hackers targeted SE Asia, India for last decade: report
Singapore (AFP) April 13, 2015
A cyber espionage group most likely sponsored by China has been snooping on governments and businesses in Southeast Asia and India undetected for the last 10 years, Internet security company FireEye said Monday. FireEye said the hackers, dubbed APT30, have been systematically stealing "sensitive information" since 2005, targeting governments, corporations and journalists with interests invol ... read more


CYBER WARS
Nitrogen deposition reduces Swiss plant diversity

Warming seas may spell end to Britain's fish and chips

In parched California, Beverly Hills may go greener by going brown

Scientists track fertilizer's effects on Ohio algae bloom

CYBER WARS
On the road to spin-orbitronics

NIST tightens the bounds on the quantum information 'speed limit'

Computers that mimic the function of the brain

Researchers observe new charge transport phenomenon

CYBER WARS
India's Modi visits French aviation hub Toulouse

KUKA Systems Aerospace opens French facility

Terma, BAE Systems team for noise-reduced pilot communications

Australia to boost fleet of C-17 airlifters

CYBER WARS
China 'Segway copycat' buys Segway company

Discovery by Virginia Tech may be breakthrough for hydrogen cars

Toyota to build plant in China in investment splurge

China auto sales up 3.3% in March: industry group

CYBER WARS
'Civil war' divides families in row over Greek goldmine

China March exports dive as economy seen slowing further

Hong Kong defends US dollar peg as stocks surge

World Bank welcomes China's new bank in poverty fight

CYBER WARS
Citizen scientists map global forests

Researchers map seasonal greening in US forests, fields, and urban areas

Deforestation is messing with our weather and our food

Mild winters not fueling all pine beetle outbreaks in western US

CYBER WARS
Scientists Take Aim at Four Corners Methane Mystery

TRMM rainfall mission comes to an end after 17 years

NASA Joins Forces to Put Satellite Eyes on Threat to U.S. Freshwater

Conservation from 5,000 feet

CYBER WARS
Optics, nanotechnology combined to create low-cost sensor for gases

Water makes wires even more nano

Light-powered gyroscope is world's smallest

Nanoscale worms provide new route to nano-necklace structures




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.