Wednesday, March 25, 2026
  • About us
    • Write for us
    • Disclaimer
    • Terms of use
    • Privacy Policy
  • RSS Feeds
  • Advertise with us
  • Contact us
DefenceTalk
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
DefenceTalk
No Result
View All Result
Home Defence & Military News Technology News

IoT attacks threaten national security, say cyber experts

by Army News Service
April 28, 2016
in Technology News
3 min read
0
IoT attacks threaten national security, say cyber experts
14
VIEWS

Dams, the power grid and other such infrastructure were once closed network systems. Then they were added to the Internet.

“We still thought of them as closed networks — but they’re not,” said Lt. Gen. Edward Cardon, commander of U.S. Army Cyber Command and Second Army.

“Other systems touch them and that starts to create some problems,” such as vulnerabilities to being hacked, he said.

Cardon spoke at the Army Cyber Institute and Palo Alto Networks-sponsored Joint Service Academy Cyber Security Summit, at the U.S. Military Academy, April 20 and 21.

It has been demonstrated that cars too, can be hacked, with each containing millions of lines of code, Cardon said.

In fact everything with lines of code on the Internet can be hacked and that’s a problem for national security, he said.

INTERNET OF THINGS
Mark Bristow, chief of Incident Response, Department of Homeland Security, Industrial Control Systems-Cyber Emergency Response Team, said there are in the U.S. 84,000 devices running buildings, power plants and other infrastructure, all connected to and part of the “Internet of things,” or IoT.

Another example, Bristow said, are Nest Learning Thermostats, which are replacing traditional thermostats in ever-increasing numbers.

Nest is connected to the Internet, so it’s part of the IoT sphere and it knows when people are home and when they’re not in order to save energy by switching off power to appliances like the air conditioner, he said. It even has a hidden camera to detect occupants using a motion sensor.

If someone hacked into this system on a large scale, there would be lots of unintended consequences from the design perspective, he added.

Mark McLaughlin, chairman of the board, Palo Alto Networks, said there’s been a big uptick in ransom attacks at hospitals, where hackers demand ransom money or else they threaten to shut down life-support equipment the hospitals use that’s connected to the IoT.

McLaughlin added that trust in the IoT “is bleeding out” and that there’s a “razor-thin margin between chaos and order” in this IoT-driven society that touches everyone’s lives.

IOT ATTACK PREVENTION STRATEGIES
Cardon pointed out several ways to limit these types of problems.

One of the biggest ways, he said, is through public-private partnerships. Industry, military and government are all in this together as far as wanting to reduce risk. The Army is already partnering with Silicon Valley to make this happen, he said.

Retired Army Chief of Staff Gen. Ray Odierno, senior advisor at JP MorganChase, said a big thing he learned from being a commander in Iraq and elsewhere is that a whole of government approach is needed to go after the problem.

Odierno said synergy can be built by partnering, and that one of the important missions of the Army Cyber Institute, which was stood up at West Point two years ago, is to advise on how do just that, both stateside and internationally.

Cardon said the culture too must change. He said he’s trying to create a “culture of compliance,” where cyber security is taken a lot more seriously than it has been.

Another approach is tighter controls over architecture, he said. For example, Cardon said he recently toured a Boeing production factory where they had extreme control over their flight control architecture.

Nothing was allowed to touch it, he said, meaning no device and no Internet connection. That’s how much attention was being paid to safety.

Getting the authorities right should be another priority, Cardon said.

Regarding authorities, Odierno said there should be protocols in place to get private-sector help from the military and government if they need it regarding cyber defense, offense and best practices. It should be set up with a comprehensive approach in mind.

McLaughlin said cyber protection needs to become more automated. Now, a lot of people are manually responding to attacks. But those attacks will never abate, so a better technology is needed for detection and remediation of attacks. People need to focus on the less common and unusual attacks.

Odierno said leadership is key. “Unless commanders and CEOs decide this is an important problem, it won’t get solved.”

Tags: cyber attackscyber securityinternet of thingsIoTnetwork securitysecurity
Previous Post

US Army testing air defense system integration

Next Post

US Deploys 3 More Destroyers to Western Pacific

Related Posts

US needs top cyber coordinator, better hacker ‘deterrence’

‘Digital fog of war’ around Iranian cyberattacks

March 13, 2026

Hostilities on the digital front have intensified since the outbreak of war between the US, Israel and Iran, with many...

US moves closer to retaliation over hacking as cyber woes grow

Cyberattack Disrupts Operations at MedTech Giant Stryker

March 11, 2026

A cybersecurity incident affecting Stryker Corporation—one of the world’s largest manufacturers of medical devices—has drawn renewed attention to the growing...

Next Post
US Deploys 3 More Destroyers to Western Pacific

US Deploys 3 More Destroyers to Western Pacific

Latest Defense News

US needs top cyber coordinator, better hacker ‘deterrence’

‘Digital fog of war’ around Iranian cyberattacks

March 13, 2026
US military says aircraft crash in Iraq killed 4 crew members

US military says aircraft crash in Iraq killed 4 crew members

March 13, 2026
Northrop Grumman moves to boost B-21 Raider output

Northrop Grumman moves to boost B-21 Raider output

March 13, 2026
US Navy evacuates virus-struck aircraft carrier Roosevelt

US military ‘not ready’ to escort tankers through Hormuz Strait

March 12, 2026
Israel cancels leave for combat units after Iran consulate strike

US says Iran campaign cost $11 billion in six days

March 12, 2026
US moves closer to retaliation over hacking as cyber woes grow

Cyberattack Disrupts Operations at MedTech Giant Stryker

March 11, 2026

Defense Forum Discussions

  • Middle East Defence & Security
  • The Russian-Ukrainian War Thread
  • European Union, member states and Agencies
  • Royal Canadian Navy Discussions and updates
  • Royal Australian Navy Discussions and Updates 2.0
  • Indonesia: 'green water navy'
  • International Army News Thread
  • Royal Australian Air Force [RAAF] News, Discussions and Updates
  • USAF News and Discussion
  • Indonesian Aero News
DefenceTalk

© 2003-2020 DefenceTalk.com

Navigate Site

  • Defence Forum
  • Military Photos
  • RSS Feeds
  • About us
  • Advertise with us
  • Contact us

Follow Us

No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports

© 2003-2020 DefenceTalk.com