Feds Hire ISPs and Defense Firms to Combat Cyber Threats

The United States Department of Defense and The Department of Homeland Security have engineered a pilot program (DIB Cyber Pilot) to help investigate and police cyberspace.  With the assistance of multiple private contractors and their ISPs (Internet Service Providers), the collaboration will build knowledge on cyber security risks and help better protect against the growing propensity for malicious cyber attacks to important private and governmental systems.  This move correlates with the flux of hacks and phishing scams that have recieved noticeable attention of late.

Deputy Secretary of Defense William J. Lynn spoke at the Annual International Workshop on Global Security stating, “We learned this lesson in 2008 when a foreign intelligence agency used a thumb drive to penetrate our classified computer systems—something we thought was impossible. It was our worst fear: a rogue program operating silently on our system, poised to deliver operational plans into the hands of an enemy”.  With technology continuing to evolve, the move by the DOD and DHS to create an oversight program will help manage these sort of problems.  The pace at which technology evolves is a frantic one, so keeping as up-to-date as possible is incredibly important to security.

The DIB Cyber Pilot program is not intended to monitor, intercept of store private sector communications.  Rather, according to William J. Lynn, the program will serve to protect against three distinct types of cyber threats.  The first is suspected government-backed hacks of private and military networks.  Secondly, more frequent and currently popular disruptive attacks by hacking groups like Lulzsec or Anonymous. The final threat are ones that target critical infrastructure and military networks.

Though it has been admitted that most of the attacks are unsophisticated, others remain viably catastrophic.  The spectrum of cyber attacks is a diverse one–ranging in their maliciousness.  The DIB Cyber Pilot program will help expand our ability to respond and prevent.

SOURCEwww.pcmag.com       

Login

Comments

There are no comments yet, be the first!

Login

Reply

Your email address will not be published.

Name
Email
Comments

You may use these HTML tags and attributes: