NSA Chief: We Protect Cyberspace
Published:
17 October 2000 y., Tuesday
The head of the super-secret U.S. National Security Agency said on Monday that cyberspace had become as important a potential battlefield as any other and held out the prospect of attacking there as well as defending.
"Information is now a place," Air Force Lt. Gen. Michael Hayden told a major computer security conference here. "It is a place where we must ensure American security as surely as ... sea, air and space."
He cited moves to define the "legal structure into which we must fit" before offensive "information operations" -- cyberattacks -- were officially added to the arsenal that U.S. commanders can use against a foe. The NSA is the Defense Department arm that intercepts communications worldwide.
The world of information "has taken on a dimension within which we will conduct operations to ensure American security," Hayden said, adding that the NSA had not been authorized to do "that attack thing," or go on the offensive in cyberspace.
"But as the United States government begins to think about what it should or wants to do when it is under attack, it raises a really interesting question that we all have to work through in the context of our overall democracy," he said.
A year ago, Army Gen. Henry Shelton, chairman of the Joint Chiefs of Staff, disclosed that the United States tried to mount electronic attacks on Serbian computer networks during the NATO air campaign over the province of Kosovo.
Hayden said a key challenge to the NSA today was to protect U.S. telecommunications in a world where the adversaries might be "terrorists, a malicious hacker or even a non-malicious hacker."
Šaltinis:
wired.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.
The most popular articles
Software company announced new structure_ of it_s business.
more »
Moto 360, Motorola's upcoming entry into the smartwatch industry, is rumored to be preparing for a July release.
more »
Unisys Corporation has announced Choreographer, a cloud management platform designed to direct and optimise key IT services and processes. Choreographer automates the lifecycle management of data centre and public infrastructure resources to help more efficiently deploy applications in both private and public cloud environments.
more »
This February 24-27, the world’s largest mobile technology exhibition “Mobile World Congress 2014” shall take place in Barcelona.
more »
Unisys Corporation reported a third-quarter 2013 net loss of $11.6 million, or a loss of 26 cents per diluted share, which included $22.6 million of pension expense. In the third quarter of 2012, the company reported a net loss of $12.4 million, or a loss of 28 cents per diluted share, which included $28.9 million of pension expense and $23.1 million of debt reduction charges.
more »
Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today announced plans for future integration of Akamai Unified Performance technology into the Cisco® ISR-AX series of routers.
more »
Microsoft is to allow independent games developers to self-publish on its Xbox One games console. "Indies" will be able to create their own games, publish to the Xbox when they like, and set their own pricing, the computer giant has confirmed.
more »
Nokia has unveiled the Lumia 625, the largest Lumia Windows Phone yet, with a 4.7-inch screen and 4G.
more »
Unisys Corporation (NYSE: UIS) announced the availability of its Unisys Stealth Solution for Amazon Web Services (AWS) designed to enhance security for clients moving data into the cloud.
more »
The Open IPTV Forum (OIPF) has published a profile of HTML5, CSS, DOM3 and other related web technologies aimed at connected TV services and devices that implement a browser-based application environment.
more »
According to new research conducted by Unisys Corporation (NYSE: UIS), a majority of Americans are concerned about data breaches involving large organizations, but are evenly mixed on whether legislation should require private businesses to share cyber attack information with the government.
more »