Pentagon Boosts Cyber Command To Defend Against Hackers
Hot off the heels of a recent cyberattack on the United States Justice Department, the Pentagon is planning to beef up its computer defense forces.
The Defense Department intends to increase its cybersecurity staff by fivefold, from a paltry 900 people all the way up to 4,900 troops and civilian employees.
According to a report in the Washington Post, the Defense Department's Cyber Command division is requesting the (huge) uptick in personnel in order to increase the Pentagon's abilities. The plan isn't simply to become better at defending important information, but to also train forces to be capable of going on the offensive. There are reportedly three different kinds of forces that the Cyber Command wants to train:
- National Mission Forces
- Combat Mission Forces
- Cyber Protection Forces
National Mission Forces will secure and defend systems that operate electrical grids, nuclear power plants, and other foundations for economic and national security. Cyber Protection Forces would naturally defend the Defense Department's own networks from outside invaders, while Combat Mission Forces would let the U.S. go on the offensive should it be deemed necessary. Apparently the Pentagon is sick of always hearing about Chinese hackers and other rogue organizations always getting into their systems and stealing data.
"Given the malicious actors that are out there and the development of the technology, in my mind, there's little doubt that some adversary is going to attempt a significant cyberattack on the United States at some point," said William J. Lynn III, a former deputy defense secretary who helped create the Pentagon's cybersecurity plan. "The only question is whether we're going to take the necessary steps like this one to deflect the impact of the attack in advance or . . . read about the steps we should have taken in some post-attack commission report."
The Cyber Command was first set up three years ago, but the need to defend its own networks has limited efforts to expand capabilities beyond that. It's unclear whether or not the Pentagon will actually be able to find and properly train the large number of people it's seeking out. Sobered by recent cyberattacks such as the one that deleted data off 30,000 computers in Saudi Arabia, however, the military is placing extra emphasis on carving out a safe niche in the digital world.
Wikileaks' Allegations Against CIA: Should You Be Worried?
A trove of new Wikileaks documents reveal that the CIA is capable of committing “undetectable assassinations” by hacking into the computer systems of autonomous cars. While the CIA has neither confirmed nor debunked the allegations, a number of security experts said they know enough about the CIA to know that the agency could actually murder people by hacking into peoples’ cars. This has raised a number of concerns about the future of autonomous cars and how well they could protect their owners from hackers and malicious programs.
9 Hackers Involved In $17M Banking Theft Plot Arrested By Russian Authorities
It´s well known that Russia has some of the most dangerous and skillful hackers in the world, which has been quite inconvenient for this nation, considering that cyber crimes have been committed.
More Than Half Of The World's Internet Traffic Comes From Bots, Not Humans
According to a published report called Imperva Incapsula Bot Traffic Report, the world's internet traffic is not mainly caused by humans, but from bots.
Apple iPhone Apps Vulnerable To Hackers
It has been reported that more than 40 iPhone apps are vulnerable to attacks from hackers. These hackers can potentially infiltrate these apps and disrupt any transactions and could even copy the user's credentials.
Why Most People Don't Do More To Protect Against Hackers?
Security experts warn on the fact that most people are not taking enough measures to protect against hackers.
MORE IN ITECHPOST
6 Must-Take Steps to Protect Yourself from a Data Breach
A data breach can take place in many ways. Whether it involves gaining physical access to your laptop or a malicious cyberattack on your device, the safety of your data could be easily compromised at any time.
How Do Personal Emergency Response Systems Work?
Personal emergency response systems, known as PERS for short, are systems that help people to raise the alarm and get immediate help when a medical or personal emergency occurs. They are ideal for older people and anyone with a mobility issue or an injury or illness that can cause falls.
Eight Must-Have Tools to Keep Your Car Out of Garage
We all dread taking our car to a garage for repairs. We might just want to avoid the inconvenience of being off the road or maybe the costs associated, which can even lead to knock-on effects on things like our holiday plans.
6 Hacks for Students to Choose a Laptop While on a Budget
The modern world tries to drown us in the sea of choices. One can’t simply buy a laptop - there are hundreds of laptops around and sometimes our budget becomes the only real limitation we can rely on. But how to choose other parameters to get the best laptop possible?