Cybersecurity Poses Unprecedented Challenge to National Security, Lynn Says

By John J. Kruzel
American Forces Press Service
WASHINGTON, June 15, 2009 – Threats to U.S.-based computer networks — posed by the intelligence branches of foreign countries and teenage hackers alike — represent an unprecedented national security challenge, the Pentagon’s No. 2 official said today.  Making cyber warfare unique is the breadth of potential sources, plus the speed and scope of such attacks, Deputy Defense Secretary William J. Lynn III said.  “Once the province of nations, the ability to destroy via cyber means now also rests in the hands of small groups and individuals: from terrorist groups to organized crime, hackers to industrial spies to foreign intelligence services,” he told the Center for Strategic and International Studies here.   Lynn said the common thread among three marquee reviews of U.S. cybersecurity is the need for greater public awareness of both the threat to the country and how it’s prepared to defend against digital attacks. He cautioned that cyber warfare is not an emerging or distant risk.   “This is not some future threat. The cyber threat is here today; it is here now,” said Lynn, whose remarks today come several weeks after President Barack Obama announced plans to appoint a cyber security coordinator to oversee the government’s effort.   The 21st century U.S. military, like American society at large, is dependent on modern technology that is subject to vulnerabilities, Lynn said.   “Just like our national dependence, there is simply no exaggerating our military dependence on our information networks: the command and control of our forces, the intelligence and logistics on which they depend, the weapons technologies we develop and field – they all depend on our computer systems and networks,” he said. “Indeed, our 21st century military simply cannot function without them.”   Lynn said the government’s roughly 15,000 networks – connecting 7 million computers, information technology devices and servers – all make for tempting targets.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: