Originally published: August 1, 2011
Last updated: August 1, 2011 - 8:45pm
The U.S. military's computer systems are probed by outsiders millions of times a day, while insiders, like a soldier who allegedly extracted heaps of classified files for public consumption on the WikiLeaks website, also pose threats.
In mid-July, the Pentagon released an unprecedented cybersecurity strategy that formally branded cyberspace as a domain of warfare, akin to land, sea, air and space. But, instead of outlining offensive measures, the framework focuses on how to deter the enemy from ever attempting an attack. As part of this plan, the military is employing "active cyber defense" -- an amalgamation of sensors, software and intelligence reports aimed at instantly blocking malicious activity. Active cyber defense will build off existing methods of tracking vulnerabilities, according to the strategy. Perhaps an Army model under development, commonly known as continuous monitoring, will be one such building block.
- US Tries to Build Case for Conspiracy by WikiLeaks
- Major update to government-wide cyber manual takes on WikiLeaks
- Cyberattack downs WikiLeaks website
- Aftermath Of WikiLeaks Flap Underscores Vulnerabilities Of The Cloud
- DHS secret network at the forefront of nationwide intelligence sharing
- White House Orders New Computer Security Rules (Updated)
- Pentagon Sees a Threat From Online Muckrakers
- Feds work out the bugs in top secret telework
- Twitter is subpoenaed in Wikileaks affair
- Web's identity crisis: Tool of freedom or repression?
- CIA launches task force to assess impact of U.S. cables' exposure by WikiLeaks
- WikiLeaks, free speech and Twitter come together in Va. court case
- WikiLeaks founder could be charged under Espionage Act
- FBI arrests 14 in connection with PayPal attacks
- US Military Hunts for Safe Smartphones for Soldiers