.... The report, a copy of which was obtained by The Washington Times, indicates that a classified CIA briefing of Mrs. Pelosi included specific details of the use of "enhanced interrogation techniques," or EITs, on terrorism suspect Abu Zubaydah. ....
.... Republicans have warned that any investigation of Bush administration officials should also look at the approval of top Democrats in Congress, who they say had been briefed on what the CIA was doing but kept silent until it was politically opportune to denounce the practices.
.... "There are still terrorists around the world who are committed to killing Americans and destroying our way of life. A number of those terrorists are being held at the prison in Guantanamo Bay right now," said House Minority Leader John A. Boehner, Ohio Republican. "If the administration is allowed to proceed, they won't be there for long. In fact, they may be right here, in the United States."
Saturday, May 9, 2009
US threatens military force against hackers
Cyber espionage and attacks from well-funded nations or terror groups are the biggest threats to the military’s computer networks, a top US officer said.
Gen Kevin Chilton, who heads US Strategic Command, said he worries that foes will learn to disable or distort battlefield communications.
Chilton said even as the Pentagon improves its network defences against hackers, he needs more people, training and resources to hone offensive cyber war capacity. At the same time, he asserted that the US would consider using military force against an enemy who attacks and disrupts the nation’s critical networks.
“Our job would be to present options. I don’t think you take anything off the table when you provide options” to the president, in the wake of an attack, whether the weapon is a missile or a computer program, he said.
Chilton’s comments shed the most light to date on the Pentagon’s ongoing debate over how to beef up its abilities to wage and defend against cyber warfare. And they came as the military is planning to set up a new cyber command at Fort Meade not far from Washington that would report to Strategic Command.
Chilton said that his biggest fear is that enemies hack into military battlefield systems, and when an American commander sends out an order that says forces should go left, it is changed to say forces should go right. While most systems are classified and walled off, he said there are often ways to cross into those networks.
The other worry is more internal. When a soldier or sailor sits down at a computer, Chilton said “it’s like he’s stepping to the guard gate at his base,” and can open the digital gate and let adversaries in.
Gen Kevin Chilton, who heads US Strategic Command, said he worries that foes will learn to disable or distort battlefield communications.
Chilton said even as the Pentagon improves its network defences against hackers, he needs more people, training and resources to hone offensive cyber war capacity. At the same time, he asserted that the US would consider using military force against an enemy who attacks and disrupts the nation’s critical networks.
“Our job would be to present options. I don’t think you take anything off the table when you provide options” to the president, in the wake of an attack, whether the weapon is a missile or a computer program, he said.
Chilton’s comments shed the most light to date on the Pentagon’s ongoing debate over how to beef up its abilities to wage and defend against cyber warfare. And they came as the military is planning to set up a new cyber command at Fort Meade not far from Washington that would report to Strategic Command.
Chilton said that his biggest fear is that enemies hack into military battlefield systems, and when an American commander sends out an order that says forces should go left, it is changed to say forces should go right. While most systems are classified and walled off, he said there are often ways to cross into those networks.
The other worry is more internal. When a soldier or sailor sits down at a computer, Chilton said “it’s like he’s stepping to the guard gate at his base,” and can open the digital gate and let adversaries in.
Subscribe to:
Posts (Atom)