U.S. Wants Five Times More Contacts in War on Cyber Terror

By

Reports from the Defense Department's chief information officer on Tuesday said that the U.S. government is working to finalize a new set of rules to expand its contacts in the face of threats of cyber warfare, and once completed, those rules will allow the government to expand the number of companies it swaps data with about cyber attacks from the current 37 all the way up to 200.

Speaking at a forum in Arlington, Virginia, the Defense Department's chief information officer, Teri Takai, spelled out plans to expand the number of contact firms, and to start doing so following the necessary changes in the rule-making process to allow such steps to go forward. Takai described a world in which the United States government, as well as various tech firms, were under “mounting cyber threats” and thus required the new abilities to share data.

There is also, reportedly, a waiting list of companies who want to get in on the data sharing program, though all companies involved will have to agree on a protocol for sharing that information between themselves and the Defense Department. The Defense Department will, in turn, serve as the coordinator for what's being called the Defense Industrial Base Cyber Security and Information Assurance program.

Considering the wide number of hackings we've heard about in recent months, and reports that China and Russia are regularly mounting electronic attacks on United States businesses, it's safe to see why such a move is currently in vogue. Add to this reports that President Barack Obama requested a budget of $3.4 billion to augment the Defense Department's cyber attacks defensive systems and the Department of Homeland Security is looking to join in with the Defense Department's augmentations of the Joint Cybersecurity Services pilot program, and it's especially clear that the United States government figures the next war will be fought largely on computer screens as opposed to on actual dirt battlefields.

War is never a comforting thought, but the idea that it could be waged on systems we depend on every day is even more disturbing than usual.






Edited by Jennifer Russell
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Contributing TechZone360 Writer

SHARE THIS ARTICLE
Related Articles

Can Science Outsmart Deepfake Deceivers? Klick Labs Proposes an Emerging Solution

By: Alex Passett    3/25/2024

Researchers at Klick Labs were able to identify audio deepfakes from authentic audio recordings via new vocal biomarker technology (alongside AI model…

Read More

Top 5 Best Ways to Integrate Technology for Successful Project-Based Learning

By: Contributing Writer    3/19/2024

Project-based learning, also popularly known as the PBL curriculum, emphasizes using and integrating technology with classroom teaching. This approach…

Read More

How to Protect Your Website From LDAP Injection Attacks

By: Contributing Writer    3/12/2024

Prevent LDAP injection attacks with regular testing, limiting access privileges, sanitizing user input, and applying the proper encoding functions.

Read More

Azure Cost Optimization: 5 Things You Can Do to Save on Azure

By: Contributing Writer    3/7/2024

Azure cost optimization is the process of managing and reducing the overall cost of using Azure. It involves understanding the resources you're using,…

Read More

Massive Meta Apps and Services Outage Impacts Users Worldwide

By: Alex Passett    3/5/2024

Meta's suite of apps and services are experiencing major global outages on Super Tuesday 2024.

Read More