US Army reviews cyber threat rules

2013-06-27 21:59


Multimedia   ·   User Galleries   ·   News in Pictures Send us your pictures  ·  Send us your stories

Washington - The US military is reviewing its rules of engagement to deal with the growing threat of cybercrime, military chief Martin Dempsey said on Thursday.

Dempsey, the Chair of the Joint Chiefs of Staff, the highest-ranking officer in the US military, said the review was in response to soaring cyber attacks.

"The Department of Defence has developed emergency procedures to guide our response to imminent, significant cyber threats," Dempsey said in a speech at the Brookings Institution, a Washington-based think tank.

"We are updating our rules of engagement - the first update for cyber in seven years - and improving command and control for cyber forces."

Dempsey said that since his appointment as head of the Joint Chiefs in 2011 "intrusions into our critical infrastructure have increased 17-fold."

Some 4 000 cyber-security experts would join the ranks over the next four years, while some $23bn would be spent on tackling the threat.

Dempsey said Cybercom - the US command responsible for combatting cybercrime - was now organised in three divisions.

One team was in charge of countering enemy attacks, another was tasked with offering regional support while a third was responsible for protecting some 15 000 US military computer networks.

Companies lag behind

In addition following a presidential directive, the military now had a manual which allowed it to co-operate with the Department of Homeland Security and the FBI in the event of attacks on civilian networks.

Dempsey meanwhile lamented what he described as inadequate safeguards by the private sector.

"Our nation's effort to protect civilian critical infrastructure is lagging," he said. "Too few companies have invested adequately in cyber security."

In a reference to concerns over the levels of government surveillance on private individuals since the revelations by leaker Edward Snowden, Dempsey said he believed a balance could be struck.

"I understand that the country is debating the proper purpose, and limits, of intelligence collection for national security," he said.

"Let me be clear - these are two different things. One is collecting intelligence to locate foreign terrorists and their domestic co-conspirators; the other is sharing information about malware to protect our critical infrastructure from a different kind of attack."

Read more on:    us army  |  us  |  internet security

Join the conversation! encourages commentary submitted via MyNews24. Contributions of 200 words or more will be considered for publication.

We reserve editorial discretion to decide what will be published.
Read our comments policy for guidelines on contributions.
NEXT ON NEWS24X publishes all comments posted on articles provided that they adhere to our Comments Policy. Should you wish to report a comment for editorial review, please do so by clicking the 'Report Comment' button to the right of each comment.

Comment on this story
Comments have been closed for this article.

Inside News24


Book flights

Compare, Book, Fly

Traffic Alerts
There are new stories on the homepage. Click here to see them.


Create Profile

Creating your profile will enable you to submit photos and stories to get published on News24.

Please provide a username for your profile page:

This username must be unique, cannot be edited and will be used in the URL to your profile page across the entire network.


Location Settings

News24 allows you to edit the display of certain components based on a location. If you wish to personalise the page based on your preferences, please select a location for each component and click "Submit" in order for the changes to take affect.

Facebook Sign-In

Hi News addict,

Join the News24 Community to be involved in breaking the news.

Log in with Facebook to comment and personalise news, weather and listings.