U.S. Wants Five Times More Contacts in War on Cyber Terror


Reports from the Defense Department's chief information officer on Tuesday said that the U.S. government is working to finalize a new set of rules to expand its contacts in the face of threats of cyber warfare, and once completed, those rules will allow the government to expand the number of companies it swaps data with about cyber attacks from the current 37 all the way up to 200.

Speaking at a forum in Arlington, Virginia, the Defense Department's chief information officer, Teri Takai, spelled out plans to expand the number of contact firms, and to start doing so following the necessary changes in the rule-making process to allow such steps to go forward. Takai described a world in which the United States government, as well as various tech firms, were under “mounting cyber threats” and thus required the new abilities to share data.

There is also, reportedly, a waiting list of companies who want to get in on the data sharing program, though all companies involved will have to agree on a protocol for sharing that information between themselves and the Defense Department. The Defense Department will, in turn, serve as the coordinator for what's being called the Defense Industrial Base Cyber Security and Information Assurance program.

Considering the wide number of hackings we've heard about in recent months, and reports that China and Russia are regularly mounting electronic attacks on United States businesses, it's safe to see why such a move is currently in vogue. Add to this reports that President Barack Obama requested a budget of $3.4 billion to augment the Defense Department's cyber attacks defensive systems and the Department of Homeland Security is looking to join in with the Defense Department's augmentations of the Joint Cybersecurity Services pilot program, and it's especially clear that the United States government figures the next war will be fought largely on computer screens as opposed to on actual dirt battlefields.

War is never a comforting thought, but the idea that it could be waged on systems we depend on every day is even more disturbing than usual.

Edited by Jennifer Russell

Contributing TechZone360 Writer

Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More