বৃহস্পতিবার, ১৩ জুন, ২০১৩

Presidential cyberwar directive gives Pentagon long-awaited marching orders

The 18-page, Top Secret 'Presidential Policy Directive 20' instructs the Pentagon to draw up a cyberwar target list and to protect US infrastructure from foreign cyberattack.

By Mark Clayton,?Staff writer / June 10, 2013

President Barack Obama discusses defense strategic guidance at the Pentagon in Washington, January 2012. The Top Secret 'Presidential Policy Directive 20' instructs the Pentagon to draw up a cyberwar target list and to protect US infrastructure from foreign cyberattack.

Pablo Martinez Monsivais / AP / File

Enlarge

The US Defense Department has been given a bright green light to draw up a global cyberattack target list at which it can deploy digital weapons with ?little or no warning to the adversary or the target,? according to a Top Secret policy document leaked to the press.

Skip to next paragraph

' + google_ads[0].line2 + '
' + google_ads[0].line3 + '

'; } else if (google_ads.length > 1) { ad_unit += ''; } } document.getElementById("ad_unit").innerHTML += ad_unit; google_adnum += google_ads.length; return; } var google_adnum = 0; google_ad_client = "pub-6743622525202572"; google_ad_output = 'js'; google_max_num_ads = '1'; google_feedback = "on"; google_ad_type = "text"; // google_adtest = "on"; google_image_size = '230x105'; google_skip = '0'; // -->

The policy document, dubbed ?Presidential Policy Directive 20? or PPD-20, is an 18-page cyberpolicy roadmap for the Pentagon that directs it to get on with the business of defending the US and its critical infrastructure, such as the power grid and financial sector, from foreign cyberattack.

While the existence of the document and its broad outlines were revealed in news reports last fall, and a ?fact sheet? on PPD-20 was released in January, the detailed policy document leaked at week?s end shows the unleashing of a military juggernaught.

Military use of cyberweapons had been paused for about three years, waiting for the end of an intense policy debate and for orders to move ahead with force into cyberspace, cybersecurity experts say.

?What this document does is lay out authority for the US Cyber Command and Joint Chiefs to use cyberweapons,? says James Lewis, a senior fellow with the Center for Strategic and International Studies in Washington. ?It lays out how and when you would use these weapons, what you would target, and how you would do so in ways consistent with the Laws of Armed Conflict, rather than just shooting at random.?

Couched in legalistic language, the document authorizes development of offensive and defensive cybersystems that are consistent with the US Constitution, US law, and the international Law of Armed Conflict ? and of a target list to hit with them.

For instance, ?Offensive Cyber Effects Operations,? or OCEO, is defined in the document as authorizing digital weapons for ?manipulation, disruption, denial, degradation, or destruction? of? ?physical or virtual? computer systems.

The document says OCEO ?can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging.?

Under the heading "Policy Reviews and Preparation," the document states that: "The secretary of defense, the DNI [Director of National Intelligence], and the director of the CIA ? shall prepare for approval by the president through the National Security Advisor a plan that identifies potential systems, processes and infrastructure against which the United States should establish and maintain OCEO capabilities."

Most cyberattacks must be authorized by the president, but because attacks happen in milliseconds, the document authorizes the military and other agencies to respond to the threat of an imminent attack or an emergency situation.

Protecting critical infrastructure in the US also is outlined in the document.

Despite years of wrangling, Congress has still not approved legislation addressing cybersecurity for the nation?s infrastructure, and the document does not permit the Pentagon to intrude into networks of domestic companies, such as utilities, and install defenses within computer networks that control the power grid.

But it does allow the military to defend the infrastructure from outside those networks ? by identifying and undermining or destroying the attacking system and its key infrastructure. It allows government agencies, not just the military, to take ?anticipatory action ? against imminent threats? to infrastructure or other systems vital to the US or to US foreign policy.

The procedures outlined in the directive are consistent with the US Constitution, including the president?s role as commander-in-chief, and other applicable law and policies, the White House said in a statement.

Source: http://rss.csmonitor.com/~r/feeds/csm/~3/_-CgCju_RYE/Presidential-cyberwar-directive-gives-Pentagon-long-awaited-marching-orders

Christopher Dorner whitney houston Salwa Amin Grammys 2013 2013 Grammy Winners abraham lincoln Chris Dorner

কোন মন্তব্য নেই:

একটি মন্তব্য পোস্ট করুন