- Want to solve a complex problem? Applied math can help
- Inadequate compensation for lost or downgraded protected areas threatens global biodiversity: Study
- Only 5 women have won the Nobel Prize in physics—recent winners share advice for young women in the field
- Madagascar's mining rush has caused no more deforestation than farming, study finds
- Scientists explore microbial diversity in sourdough starters
Reply to comment
More Wars
Submitted by Varun Sharma (not verified) on Thu, 06/25/2009 - 00:17
I don't think anyone would have predicted the Defense Department creating a new military command dedicated to cyber security (well other than the usual techno-damuses). Yet despite the little press this event generated it is a big, big deal.
Even if you don't subscribe to the belief that the future is the matrix, information technology is an undeniably huge part of our lives. Everyday IT grows national economies, magnifies communications, and brings food to the table. However due to their versatility, computers store for very sensitive intelligence of relevance to national security.
Earlier this year, there were alleged security breaches of both the national electric grid and classified data regarding information about the new F-35's (Lockheed Martin and the DoD both deny these allegations). What's more, it was further alleged that foreign cyberspies had done the deed. China was among the accused, however, they have denied allegations as well.
Simply put, whether it was China or not, there is much information to be guarded. The announcement of the new "Cyber Command" heralds the beginning of information reality. It is also important to note that these 'attacks' did not occur in 2009. These reports were leaked, yet they certaintly helped the Obama Administration make a case for cybersecurity.
This is a good thing because this is an issue that should be at the forefront of our debates on national security. While our Middle Eastern "adventure" often highlights the war against insurgency, so too must we pay heed to technological security.
Albeit late, it's a start.