AdBrite

Your Ad Here

AdBrite

Your Ad Here

Thursday, April 30, 2009

Washington's Cyber Warfare


WASHINGTON — Shrouded in secrecy, the U.S. government’s policies on how and when to wage cyber warfare are ill-formed, lack adequate oversight and require a broad public debate, a new report by the National Research Council says.

The report warns that the "undeveloped and uncertain nature” of the government’s cyber warfare policies could lead to them being used hastily and ill-advisedly during a crisis. That danger is compounded by secrecy and lack of oversight, the report’s authors cautioned Wednesday. "Unsound policy formulated and implemented during crisis may prove difficult to change or reverse when the crisis has passed,” concludes the report, the first to take a comprehensive look at American cyber war capabilities.

The research council is the working arm of the National Academy of Sciences.

Valuable tool
The U.S. government has spoken only broadly about cyber warfare in the past, noting its value
as a national security tool. Officials routinely refuse to talk about computer attacks America has launched.

The 322-page report, prepared by an independent panel of academics and cyber security experts, comes as the Obama administration is on the verge of releasing its own review of the nation’s cyber security.

That review, however, is expected to focus largely on defensive and administrative measures, including who will lead the nation’s cyber effort, and how the government can better manage and use technology to protect everything from the electrical grid to the stock market.

Officials have warned in recent months that the nation’s computer and internet networks are at risk and are repeatedly probed by foreign governments, criminals or other groups.

U.S. offensive cyber war options could range from a more passive cyber intrusion such as listening in on a foe’s communications to an attack that cripples an enemy’s air defense systems to clear the way for a bomber attack.

A key challenge, however, may be determining who the enemy is, particularly if U.S. officials are considering a response to a cyber attack or intrusion against America.


by the associated press

No comments:

Post a Comment