Tuesday, April 28, 2026
  • About us
    • Write for us
    • Disclaimer
    • Terms of use
    • Privacy Policy
  • RSS Feeds
  • Advertise with us
  • Contact us
DefenceTalk
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports
No Result
View All Result
DefenceTalk
No Result
View All Result
Home Defence & Military News Defense Geopolitics News

General Lays Out Challenges of Defending Cyberspace

by Editor
March 18, 2008
in Defense Geopolitics News
3 min read
0
14
VIEWS

US Air Force, OFFUTT AIR FORCE BASE, Neb: Air Force Minuteman and Navy Trident missiles stand outside the headquarters of U.S. Strategic Command here as reminders of the command’s mission of strategic deterrence and nuclear operations. 
 
But walking past the missiles are servicemembers using cell phones and other wireless devices. And that, too, represents a mission of the command: cyberspace operations. 
 
Air Force Gen. Kevin P. Chilton, commander of U.S. Strategic Command, said defense networks see more than a million suspicious “hits” a day. 
 
“These are pings where someone is coming in and trying to open something or access information from someone within our military networks,” Chilton said during an interview March 11. “This could be everything from some curious citizens, to people who maybe are trying to hack for sport, to people who are trying to collect information.” 
 
He said what concerns the command is what some people call data mining. This is where analysts use computers to shift through enormous quantities of data to glean information. It is the new form of espionage. 
 
“The way I think of it is various organizations are coming in and doing espionage work,” the general said. “You can imagine the downloading of files from personnel agencies or other branches of government.” 
 
In the past, to get that information “you would hire someone to break in with a flashlight in their teeth and go through the drawer and photograph the files,” Chilton said. Now, all this information is stored on discs or on computers. Spies don’t have to leave a computer terminal in their own countries to try to get this information. 
 
China has written openly of cyber warfare, and U.S. officials write in the current “Military Power of the Peoples’ Republic of China” assessment that Chinese officials see cyber warfare as an asymmetric brand of warfare. 
 
“China’s current thinking on asymmetric warfare is encapsulated by a military theory termed ‘non-contact,’ which seeks to attain a political goal by looking for auxiliary means beyond military boundaries or limits,” the publication says. “Examples include: cyber warfare against civilian and military networks – especially against communications and logistics nodes; fifth column attacks, including sabotage and subversion, attacks on financial infrastructure; and, information operations.” 
 
There have been a number of “intrusions” against DoD computers from China, but the United States has not attributed these to any country. “The thing about China that gives us pause is they have written openly about their emphasis in particular areas: space, cyber,” Chilton said. 
 
In the cyber world it is tough to figure out who is attacking. In April 2007, Estonia came under cyber attack. The denial-of-service attack targeted the government, banks, newspapers and other computer dependent businesses. Estonian officials immediately charged Russia with initiating the attacks, but to date, a computer hacker in Estonia has been the only person charged in the attack. 
 
“The kind of attack that you would worry about is the kinds of things we saw in Estonia last year — a denial-of-service attack, where they flood the system with so many e-mail ‘botnets’ you don’t shut the system down, but you slow it down to the point that it’s unusable,” the general said. 
 
STRATCOM and the rest of the military are more aware than ever of intrusions of their networks, reporting on them and taking actions. 
 
“A big step forward for us was unity of effort,” the general said. Joint Task Force Global Network Operations is part of the command tasked with defending the military and classified systems. The task force put in place guidelines and restrictions for the way the services operate in the cyber world. This includes security measures, firewalls and what people shouldn’t be doing, the general said. 
 
“We have a lot of work in front of us in training people in our military, because defense of the network goes from high-end technical solutions to the very low-end, which is making sure the very newest and youngest person on the network understands that their actions can create vulnerability that is significant and teach them what to watch out for and what they should and shouldn’t do,” Chilton said. 
 
All computer defenders must be worried about the whole range of attacks or intrusions, Chilton said. 
 
“You have to be worried about it all — I mean, we can have a bored 16-year-old do damage to our networks,” he noted. “It’s not just a nation-state that you worry about. It can be from any organization like al Qaeda.” 

Previous Post

New Milan ADT Firing Post Successfully Completes First Troop Trials

Next Post

State Aid: Commission Endorses Aid to Rolls-Royce Germany

Related Posts

Israel cancels leave for combat units after Iran consulate strike

US says Iran campaign cost $11 billion in six days

March 12, 2026

The opening week of the war against Iran cost the United States more than $11.3 billion, lawmakers were told in...

Lebanon says Israeli strike kills 3 journalists

Israel strikes central Beirut as Lebanon death toll tops 630

March 11, 2026

Israel carried out a strike in the heart of Beirut on Wednesday for a second time since Lebanon was dragged...

Next Post

State Aid: Commission Endorses Aid to Rolls-Royce Germany

Latest Defense News

US needs top cyber coordinator, better hacker ‘deterrence’

‘Digital fog of war’ around Iranian cyberattacks

March 13, 2026
US military says aircraft crash in Iraq killed 4 crew members

US military says aircraft crash in Iraq killed 4 crew members

March 13, 2026
Northrop Grumman moves to boost B-21 Raider output

Northrop Grumman moves to boost B-21 Raider output

March 13, 2026
US Navy evacuates virus-struck aircraft carrier Roosevelt

US military ‘not ready’ to escort tankers through Hormuz Strait

March 12, 2026
Israel cancels leave for combat units after Iran consulate strike

US says Iran campaign cost $11 billion in six days

March 12, 2026
US moves closer to retaliation over hacking as cyber woes grow

Cyberattack Disrupts Operations at MedTech Giant Stryker

March 11, 2026

Defense Forum Discussions

  • Middle East Defence & Security
  • ADF General discussion thread
  • Australian Army Discussions and Updates
  • Russia - General Discussion.
  • Russian Navy Discussions and Updates
  • NZDF General discussion thread
  • The Russian-Ukrainian War Thread
  • US Navy News and updates
  • Indo Pacific strategy
  • Marine Nationale (French Navy)
DefenceTalk

© 2003-2020 DefenceTalk.com

Navigate Site

  • Defence Forum
  • Military Photos
  • RSS Feeds
  • About us
  • Advertise with us
  • Contact us

Follow Us

No Result
View All Result
  • Home
  • Defense News
    • Defense & Geopolitics News
    • War Conflicts News
    • Army News
    • Air Force News
    • Navy News
    • Missiles Systems News
    • Nuclear Weapons
    • Defense Technology
    • Cybersecurity News
  • Military Photos
  • Defense Forum
  • Military Videos
  • Military Weapon Systems
    • Weapon Systems
    • Reports

© 2003-2020 DefenceTalk.com