Panetta Warns of Dire Threat of Cyberattack on US - New York Times [dayinformations.blogspot.com]
Question by Emma: What does "backround information" mean? I have to find some "backround information" for a project and I have no idea what it means!!!!!!! Thanks for the help =] Best answer for What does "backround information" mean?:
Answer by PlasticMars
It greatly depends on the context. Consider what the point of reference is, for example; the background information regarding your place of birth and home life vs. the background information regarding your love life, which could also be one and the same depending on how much information one provides. :)
Defense Secretary Leon E. Panetta warned Thursday that the United States was facing the possibility of a âcyber-Pearl Harborâ and was increasingly vulnerable to foreign computer hackers who could dismantle the nationâs power grid, transportation system, financial networks and government.
In a speech at the Intrepid Sea, Air and Space Museum in New York, Mr. Panetta painted a dire picture of how such an attack on the United States might unfold. He said he was reacting to increasing aggressiveness and technological advances by the nationâs adversaries, which officials identified as China, Russia, Iran and militant groups.
âAn aggressor nation or extremist group could use these kinds of cyber tools to gain control of critical switches,â Mr. Panetta said. âThey could derail passenger trains, or even more dangerous, derail passenger trains loaded with lethal chemicals. They could contaminate the water supply in major cities, or shut down the power grid across large parts of the country.â
Defense officials insisted that Mr. Panettaâs words were not hyperbole, and that he was responding to a recent wave of cyberattacks on large American financial institutions. He also cited an attack in August on the state oil company Saudi Aramco, which infected and made useless more than 30,000 computers.
But Pentagon officials acknowledged that Mr. Panetta was also pushing for legislation on Capitol Hill. It would require new standards at critical private-sector infrastructure facilities â" like power plants, water treatment facilities and gas pipelines â" where a computer breach could cause significant casualties or economic damage.
In August, a cybersecurity bill that had been one of the administrationâs national security priorities was blocked by a group of Republicans, led by Senator John McCain of Arizona, who took the side of the U.S. Chamber of Commerce and said it would be too burdensome for corporations.
The most destructive possibilities, Mr. Panetta said, involve âcyber-actors launching several attacks on our critical infrastructure at one time, in combination with a physical attack.â He described the collective result as a âcyber-Pearl Harbor that would cause physical destruction and the loss of life, an attack that would paralyze and shock the nation and create a profound new sense of vulnerability.â
Mr. Panetta also argued against the idea that new legislation would be costly for business. âThe fact is that to fully provide the necessary protection in our democracy, cybersecurity must be passed by the Congress,â he told his audience, Business Executives for National Security. âWithout it, we are and we will be vulnerable.â
With the legislation stalled, Mr. Panetta said President Obama was weighing the option of issuing an executive order that would promote information sharing on cybersecurity between government and private industry. But Mr. Panetta made clear that he saw it as a stopgap measure and that private companies, which are typically reluctant to share internal information with the government, would cooperate fully only if required to by law.
âWeâre not interested in looking at e-mail, weâre not interested in looking at information in computers, Iâm not interested in violating rights or liberties of people,â Mr. Panetta told editors and reporters at The New York Times earlier on Thursday. âBut if there is a code, if thereâs a worm thatâs being inserted, we need to know when thatâs happening.â
He said that with an executive order making cooperation by the private sector only voluntary, âIâm not sure theyâre going to volunteer if they donât feel that theyâre protected legally in terms of sharing information.â
âSo our hope is that ultimately we can get Congress to adopt that kind of legislation,â he added.
Mr. Panettaâs comments, his most extensive to date on cyberwarfare, also sought to increase the level of public debate about the Defense Departmentâs growing capacity not only to defend but also to carry out attacks over computer networks. Even so, he carefully avoided using the words âoffenseâ or âoffensiveâ in the context of American cyberwarfare, instead defining the Pentagonâs capabilities as âaction to defend the nation.â
The United States has nonetheless engaged in its own cyberattacks against adversaries, although it has never publicly admitted it. From his first months in office, Mr. Obama ordered sophisticated attacks on the computer systems that run Iranâs main nuclear enrichment plants, according to participants in the program. He decided to accelerate the attacks, which were begun in the Bush administration and code-named Olympic Games, even after an element of the program accidentally became public in the summer of 2010.
In a part of the speech notable for carefully chosen words, Mr. Panetta warned that the United States âwonât succeed in preventing a cyberattack through improved defenses alone.â
âIf we detect an imminent threat of attack that will cause significant physical destruction in the United States or kill American citizens, we need to have the option to take action against those who would attack us, to defend this nation when directed by the president,â Mr. Panetta said. âFor these kinds of scenarios, the department has developed the capability to conduct effective operations to counter threats to our national interests in cyberspace.â
The comments indicated that the United States might redefine defense in cyberspace as requiring the capacity to reach forward over computer networks if an attack was detected or anticipated, and take pre-emptive action. These same offensive measures also could be used in a punishing retaliation for a first-strike cyberattack on an American target, senior officials said.
Senior Pentagon officials declined to describe specifics of what offensive cyberwarfare abilities the Defense Department has fielded or is developing. And while Mr. Panetta avoided labeling them as âoffensive,â other senior military and Pentagon officials have recently begun acknowledging their growing focus on these tools.
The Defense Department is finalizing ârules of engagementâ that would put the Pentagonâs cyberweapons into play only in case of an attack on American targets that rose to some still unspecified but significant levels. Short of that, the Pentagon shares intelligence and offers technical assistance to the F.B.I. and other agencies within the Department of Homeland Security.
This Week in Startups - Woody Sears, CEO & Founder of FrogDog MediaThis week we have Woody Sears, CEO & Founder of FrogDog Media. For more information, show notes, and an upcoming schedule, go to www.thisweekin.com/startups Please check out our Sponsors: dnamail.com http webspy.com http 00:22 UPDATES Moving to a 2 day format with interview on one day and Ask Jason & Shark Tank on another day To pitch your company email askjason [at] thisweekin [dot] com 02:55 INTERVIEW Woody Sears, CEO & Co-Founder of Frog Dog Media (makers or the iStory Time app) the most popular apps for kids. Woody talks about current apps: How To Train Your Dragon (iTunes file) and Shrek Forever After (iTunes file). Jason poses the question "is there parental resistance in putting an iPad with these apps in front of your child?" Woody goes in depth on how the apps are not there to replace books but to compliment them, more like a "digital pop up book." 07:24 Shrek Forever After -- demo Discussion on how app helps early reading skills. What involvement does Dreamworks have, if any? Is the App on Dreamworks radar? 1st to do a library of children's books in the app store. How difficult is it to get into the Apple Store with your Apps? How did this venture come about? Will you be doing original books? Suggestion for Call of Duty to become a teaching tool. Licensing discussion. How do you get your app to rank? "Content is king." Mommy Bloggers and their clout. Visit iStorytime and the Shrek Forever After is in the iTunes store.





0 comments:
Post a Comment