http://www.businessweek.com/idg/2010-08-26/u-s-military-wants-to-exert-influence-over-private-cyber-infrastructure.htmlU.S. military wants to exert influence over private cyber infrastructure
By Tim Greene
The U.S. military wants to exert more influence over the protection of power grids, transportation networks and financial network systems, a Pentagon official says in a broad-ranging essay published in Foreign Affairs. To do so the Pentagon is urging that its defense expertise be put in play beyond the .mil domain to include .gov and .com and wants policy makers to figure out how best to do that.
The reasons are that the military relies on these networks to deal with suppliers and that these networks could become military targets, says William J. Lynn III, undersecretary of defense, in the essay called "Defending a New Domain." "Protecting those networks and the networks that undergird critical U.S. infrastructure must be part of Washington's national security and homeland defense missions," Lynn says...
"The best-laid plans for defending military networks will matter little if civilian infrastructure -- which could be directly targeted in a military conflict or held hostage and used as a bargaining chip against the U.S. government -- is not secure," he says. "The Defense Department depends on the overall information technology infrastructure of the United States... The Pentagon is therefore working with the Department of Homeland Security and the private sector to look for innovative ways to use the military's cyberdefense capabilities to protect the defense industry."
Some of these defenses are being developed by the National Security Agency and include blending U.S. intelligence capabilities with network security so that networks can react to threats detected by other means than network intrusion-detection tools. "The National Security Agency has pioneered systems that, using warnings provided by U.S. intelligence capabilities, automatically deploy defenses to counter intrusions in real time," Lynn says. "They work by placing scanning technology at the interface of military networks and the open Internet to detect and stop malicious code before it passes into military networks."...