January 13, 2010

American Cyber-Security

Computer-savvy crooks constantly probe America’s premier financial institutions. The new generation of safecrackers doesn’t need dynamite or drills, but uses digital tricks that include breaking encrypted codes (like passwords) or inserting Trojan horses, worms and other computer viruses into the information systems of banks and investment firms.

American defense systems are also vulnerable. Given America’s reliance on computers and digital data links, this means weapons, weapons delivery platforms (e.g., airplanes), intelligence systems (satellites) and communications systems, from tactical radios to global strategic systems, face a digital threat.

Filching video from American Predator unmanned aerial vehicles (UAVs) operating over Iraq and elsewhere serves as an example of a type of cyber-theft. StrategyPage.com pointed out last Dec. 18 why Predator video feeds could be intercepted using off-the-shelf programs for stealing commercial television satellite transmission. “(S)ometimes, you take a chance,” StrategyPage observed. “And then you get caught. For years, the video from UAV was unencrypted. This was to save communications capacity ("bandwidth”), which was always in short supply. To encrypt the video would require more bandwidth, and specialized equipment on the UAVs and ground receivers. … This was not a secret, it was known to people in the business. Now everyone knows, and encryption, and all its costs, will be added to UAV video broadcasts.“

StrategyPage noted this was not a "hack” to the Predator’s digital controls, but akin to electronic eavesdropping or tapping a telephone. However, the prospect of taking over the computers running an aircraft or commo system – or, in the civilian sector, a city’s electrical grid – concerns cyber-warriors.

The U.S. military believes digital communications systems capable of creating “shared situational awareness” are critical to 21st century modernization. “Shared situational awareness” is Pentagonese for letting soldiers know where they are located, where friendly forces are positioned and what the enemy is doing. A digital system connecting infantrymen, tanks, helicopters, aircraft and ships would permit soldiers to share real-time intelligence, find the best defensive position or select the best available weapon to strike the enemy.

A reliable system passing accurate locations and weapons effects data would greatly lower the risk of “friendly fire” striking friendly units. However, can cyber security protecting such a complex “battlefield wi-fi” fend off enemy hackers employing armies of digital worms and Trojan horses?

“App mania” (use of computer applications in digital devices) afflicts every community on the planet with a cell tower and Internet connection. People download billions of applications each year. Despite antivirus software, each download risks viral infection. According to thetechherald.com, in September 2009 the Zeus Trojan “family of Malware” infected 3.6 million personal computers in the U.S., and Zeus viruses target “banking related information.”

A calculated cyber-attack that disrupts or destroys the civilian Internet would have immense financial consequences. Disrupting military digital communications and targeting systems at a critical moment in war could be catastrophic.

Cyber-security experts I have interviewed on background tell me they fear that America’s ability to protect its digital systems from cyber-assault has deteriorated, despite spending hundreds of billions for digital defense (to include “hard defense” like protected cabling for fiber optics networks and sophisticated firewalls).

There are a number of reasons. China and other potential adversaries employ cyber-warfare battalions – the hackers’ techniques have improved. Modern software itself is complex and sometimes difficult to troubleshoot. Constant patching and updating creates vulnerabilities. Attacks can also be launched from inside an organization, by a “cyber-saboteur.” Defense and intelligence agencies take the cyber-traitor scenario quite seriously.

Last month, the Obama administration appointed Howard Schmidt as “cyber-czar.” Schmidt has an impressive resume, with civilian and governmental cyber-security experience. His portfolio could extend through all federal civilian, intelligence and military agencies – and perhaps it should. He will coordinate both Pentagon and Homeland Security cyber-operations.

Schmidt must use his clout to develop new security tools and systems that will protect America’s digital devices and networks. The challenge, however, is immense. The Center for Strategic and International Studies report “Securing Cyberspace for the 44th Presidency” (dated December 2008) said the U.S. needs a “comprehensive national security strategy for cyber-space.” Achieving that goal should be on Schmidt’s agenda.

COPYRIGHT 2010 CREATORS.COM

Who We Are

The Patriot Post is a highly acclaimed weekday digest of news analysis, policy and opinion written from the heartland — as opposed to the MSM’s ubiquitous Beltway echo chambers — for grassroots leaders nationwide. More

What We Offer

On the Web

We provide solid conservative perspective on the most important issues, including analysis, opinion columns, headline summaries, memes, cartoons and much more.

Via Email

Choose our full-length Digest or our quick-reading Snapshot for a summary of important news. We also offer Cartoons & Memes on Monday and Alexander’s column on Wednesday.

Our Mission

The Patriot Post is steadfast in our mission to extend the endowment of Liberty to the next generation by advocating for individual rights and responsibilities, supporting the restoration of constitutional limits on government and the judiciary, and promoting free enterprise, national defense and traditional American values. We are a rock-solid conservative touchstone for the expanding ranks of grassroots Americans Patriots from all walks of life. Our mission and operation budgets are not financed by any political or special interest groups, and to protect our editorial integrity, we accept no advertising. We are sustained solely by you. Please support The Patriot Fund today!


The Patriot Post and Patriot Foundation Trust, in keeping with our Military Mission of Service to our uniformed service members and veterans, are proud to support and promote the National Medal of Honor Heritage Center, the Congressional Medal of Honor Society, both the Honoring the Sacrifice and Warrior Freedom Service Dogs aiding wounded veterans, the National Veterans Entrepreneurship Program, the Folds of Honor outreach, and Officer Christian Fellowship, the Air University Foundation, and Naval War College Foundation, and the Naval Aviation Museum Foundation. "Greater love has no one than this, to lay down one's life for his friends." (John 15:13)

★ PUBLIUS ★

“Our cause is noble; it is the cause of mankind!” —George Washington

Please join us in prayer for our nation — that righteous leaders would rise and prevail and we would be united as Americans. Pray also for the protection of our Military Patriots, Veterans, First Responders, and their families. Please lift up your Patriot team and our mission to support and defend our Republic's Founding Principle of Liberty, that the fires of freedom would be ignited in the hearts and minds of our countrymen.

The Patriot Post is protected speech, as enumerated in the First Amendment and enforced by the Second Amendment of the Constitution of the United States of America, in accordance with the endowed and unalienable Rights of All Mankind.

Copyright © 2024 The Patriot Post. All Rights Reserved.

The Patriot Post does not support Internet Explorer. We recommend installing the latest version of Microsoft Edge, Mozilla Firefox, or Google Chrome.