Home
In this issue

Jonathan Tobin: Defending the Right to a Jewish State

Heather Hale: Compliment your kids without giving them big heads

Megan Shauri: 10 ways you are ruining your own happiness

Carolyn Bigda: 8 Best Dividend Stocks for 2015

Kiplinger's Personal Finance editors: 7 Things You Didn't Know About Paying Off Student Loans

Samantha Olson: The Crucial Mistake 55% Of Parents Are Making At Their Baby's Bedtime

Densie Well, Ph.D., R.D. Open your eyes to yellow vegetables

The Kosher Gourmet by Megan Gordon With its colorful cache of purples and oranges and reds, COLLARD GREEN SLAW is a marvelous mood booster --- not to mention just downright delish
April 18, 2014

Rabbi Yonason Goldson: Clarifying one of the greatest philosophical conundrums in theology

Caroline B. Glick: The disappearance of US will

Megan Wallgren: 10 things I've learned from my teenagers

Lizette Borreli: Green Tea Boosts Brain Power, May Help Treat Dementia

John Ericson: Trying hard to be 'positive' but never succeeding? Blame Your Brain

The Kosher Gourmet by Julie Rothman Almondy, flourless torta del re (Italian king's cake), has royal roots, is simple to make, . . . but devour it because it's simply delicious

April 14, 2014

Rabbi Dr Naftali Brawer: Passover frees us from the tyranny of time

Greg Crosby: Passing Over Religion

Eric Schulzke: First degree: How America really recovered from a murder epidemic

Georgia Lee: When love is not enough: Teaching your kids about the realities of adult relationships

Cameron Huddleston: Freebies for Your Lawn and Garden

Gordon Pape: How you can tell if your financial adviser is setting you up for potential ruin

Dana Dovey: Up to 500,000 people die each year from hepatitis C-related liver disease. New Treatment Has Over 90% Success Rate

Justin Caba: Eating Watermelon Can Help Control High Blood Pressure

The Kosher Gourmet by Joshua E. London and Lou Marmon Don't dare pass over these Pesach picks for Manischewitz!

April 11, 2014

Rabbi Hillel Goldberg: Silence is much more than golden

Caroline B. Glick: Forgetting freedom at Passover

Susan Swann: How to value a child for who he is, not just what he does

Cameron Huddleston: 7 Financial Tasks You Should Tackle Right Now

Sandra Block and Lisa Gerstner: How to Profit From Your Passion

Susan Scutti: A Simple Blood Test Might Soon Diagnose Cancer

Chris Weller: Have A Slow Metabolism? Let Science Speed It Up For You

The Kosher Gourmet by Diane Rossen Worthington Whitefish Terrine: A French take on gefilte fish

April 9, 2014

Jonathan Tobin: Why Did Kerry Lie About Israeli Blame?

Samuel G. Freedman: A resolution 70 years later for a father's unsettling legacy of ashes from Dachau

Jessica Ivins: A resolution 70 years later for a father's unsettling legacy of ashes from Dachau

Kim Giles: Asking for help is not weakness

Kathy Kristof and Barbara Hoch Marcus: 7 Great Growth Israeli Stocks

Matthew Mientka: How Beans, Peas, And Chickpeas Cleanse Bad Cholesterol and Lowers Risk of Heart Disease

Sabrina Bachai: 5 At-Home Treatments For Headaches

The Kosher Gourmet by Daniel Neman Have yourself a matzo ball: The secrets bubby never told you and recipes she could have never imagined

April 8, 2014

Lori Nawyn: At Your Wit's End and Back: Finding Peace

Susan B. Garland and Rachel L. Sheedy: Strategies Married Couples Can Use to Boost Benefits

David Muhlbaum: Smart Tax Deductions Non-Itemizers Can Claim

Jill Weisenberger, M.S., R.D.N., C.D.E : Before You Lose Your Mental Edge

Dana Dovey: Coffee Drinkers Rejoice! Your Cup Of Joe Can Prevent Death From Liver Disease

Chris Weller: Electric 'Thinking Cap' Puts Your Brain Power Into High Gear

The Kosher Gourmet by Marlene Parrish A gift of hazelnuts keeps giving --- for a variety of nutty recipes: Entree, side, soup, dessert

April 4, 2014

Rabbi David Gutterman: The Word for Nothing Means Everything

Charles Krauthammer: Kerry's folly, Chapter 3

Amy Peterson: A life of love: How to build lasting relationships with your children

John Ericson: Older Women: Save Your Heart, Prevent Stroke Don't Drink Diet

John Ericson: Why 50 million Americans will still have spring allergies after taking meds

Cameron Huddleston: Best and Worst Buys of April 2014

Stacy Rapacon: Great Mutual Funds for Young Investors

Sarah Boesveld: Teacher keeps promise to mail thousands of former students letters written by their past selves

The Kosher Gourmet by Sharon Thompson Anyone can make a salad, you say. But can they make a great salad? (SECRETS, TESTED TECHNIQUES + 4 RECIPES, INCLUDING DRESSINGS)

April 2, 2014

Paul Greenberg: Death and joy in the spring

Dan Barry: Should South Carolina Jews be forced to maintain this chimney built by Germans serving the Nazis?

Mayra Bitsko: Save me! An alien took over my child's personality

Frank Clayton: Get happy: 20 scientifically proven happiness activities

Susan Scutti: It's Genetic! Obesity and the 'Carb Breakdown' Gene

Lecia Bushak: Why Hand Sanitizer May Actually Harm Your Health

Stacy Rapacon: Great Funds You Can Own for $500 or Less

Cameron Huddleston: 7 Ways to Save on Home Decor

The Kosher Gourmet by Steve Petusevsky Exploring ingredients as edible-stuffed containers (TWO RECIPES + TIPS & TECHINQUES)

Jewish World Review

Pentagon unveils its new cyberstrategy. Well, some of it, anyway.

By Mark Clayton

'Strategy for Operating in Cyberspace' outlines belatedly a defensive posture. But it leaves many questions unanswered





JewishWorldReview.com |

mASHINGTON— (TCSM) Land. Air. Sea. Space. And now, officially, Cyber, too.

The Pentagon on Thursday unveiled its first ever "Strategy for Operating in Cyberspace," officially — some say belatedly — staking out its turf in the digital realm of networks and computers, an arena that analysts say has been militarized for years.

The document outlining the strategy emphasized its defensive — albeit proactive — posture, indicating only by omission the presumed offensive capabilities of a nation seen by many cyberwar experts as the world's preeminent cyber superpower.

Some analysts were quick to criticize the unclassified document as shedding little light on the full and true nature of the Pentagon's new cyberstrategy.

Recent leaks of some elements of the policy document led to its early characterization as focusing on circumstances under which the United States would retaliate with bombs, if it came under serious cyber attack.

But this slender 13-page document stresses measures to enhance US cyberdefenses, with nary a mention of offensive cyber weapon deployment, development, or cyberwar strategy other than the broad mandate to make "cyber" a full-fledged "operational domain."


FREE SUBSCRIPTION TO INFLUENTIAL NEWSLETTER

Every weekday JewishWorldReview.com publishes what many in the media and Washington consider "must-reading". HUNDREDS of columnists and cartoonists regularly appear. Sign up for the daily update. It's free. Just click here.


"Far from 'militarizing' cyberspace, our strategy of securing networks to deny the benefit of an attack will help dissuade military actors from using cyberspace for hostile purposes," Deputy Defense Secretary William Lynn said Thursday at the National Defense University in a speech characterizing the new strategy. "Indeed, establishing robust cyberdefenses no more militarizes cyberspace than having a navy militarizes the ocean."

"Peace through preventive defense is at the heart of our DoD cyberstrategy and the administration's overall approach to cyberspace," he said, referring apparently to sensors and other network systems by which the Pentagon hopes to thwart infiltrating hackers — or at least give them less than they had hoped to gain. Amid headlines touting the latest "cyberbattle" and breathless coverage of hackers defacing websites or criminals scooping up credit card and personal information, Mr. Lynn asserted that little of what is characterized in the media as cyberwar or cyberbattles comes close to meriting military attention, much less military action.

"While identifying criminal activity in cyberspace is of concern, this is not the Defense Department's primary concern," he said. "Rather, our concern is specific to activities that threaten our mission to protect the security of the nation."

Lynn's speech — and the new document — outline "five pillars" that characterize the Defense Department's cyberstrategy, including:


  • Operational Domain: The Defense Department will treat cyberspace as an "operational domain," just as it does land, air, sea, and space. What that means is that the military will operate within and defend its networks as well as organize, train and equip US forces for cyber missions.

  • Active Defenses. The US is deploying for the first time new "active defenses" that employ "sensors, software, and signatures" aimed at detecting and stopping malicious code before it affects military networks and operations — thereby denying the benefit of an attack.

  • Critical Infrastructure Defense. Here, the Pentagon describes its role helping defend critical infrastructure and nonmilitary networks that undergird key military functions, including the power grid, financial sector, and transportation system.


Because the US military is restricted from certain domestic operations, it is working in partnership with the Department of Homeland Security and private sector partners to lend its expertise to protect US critical infrastructure — providing to both the signatures and systems that help identify malicious software. Punctuating that point, Mr. Lynn noted in his speech a serious, previously unknown intrusion in March into a defense contractor's network that netted 24,000 files.

International Defense Building. This fourth pillar lays out expectations that the US will build "collective cyberdefenses" with international partners and allies, including NATO, expanding awareness of malicious software attacks.

Training and Technology. The fifth pillar aims to ramp up training of defense personnel. The idea is to weaken the advantage cyberattackers enjoy due to anonymity on the Internet and generally porous defenses in society.

With DoD operating more than 15,000 networks and seven million computing devises in installations around the world, the target is huge. So the Pentagon is seeking some technological fixes to shift the field away from attackers, the strategy document indicates.

Though not in the document, the Defense Advanced Research Projects Agency (DARPA) recently announced work on new computer systems that adapt on the fly to attacks to increase resilience. Add to that new encryption technology that prevents data from becoming visible or vulnerable to an attacker.

Alan Paller, research director for the Sans Institute, a Washington-based cybersecurity education organization, says he especially likes pillars two and five — protecting critical infrastructure and ramping up procurement.

"This is the first time the nation has fully and publicly committed to continuous monitoring and active defense that will allow the federal government to raise the bar in securing existing systems," he says in an email interview.

But for others the document was missing too many major elements, offensive cyberweapons strategy, for one.

Shrouded in secrecy, the development of weaponized cyber is being conducted in the US — as in many other nations — outside public view and with little debate about their impact on international treaties and on conventional theories of war — such as deterrence — that have governed nations for decades, cyber warfare experts say.

Weapons like Stuxnet, the world's first-publicly confirmed piece of weaponized software that some have called a "digital guided missile" was discovered last year to have hammered Iran's nuclear facilities. Nobody knows who developed Stuxnet, even though the US and Israel are high on the list of suspects, many say. The new document doesn't reference US offensive cyber weapons capability or development, or when such weapons might be used against an adversary. Yet, doctrine and policy regarding such use is a major issue within the cyberpolicy community, some arguing the president should be involved in many, if not most, decisions to deploy such weapons. Still, it's possible such questions are more directly addressed in a classified version of the cyber document that observers presume exists.

"I didn't see a single new thing here," says a member of the 2009 National Research Council study of the legality and ethics of using offensive cyberweapons, who asked not to be named. "This so-called strategy is so broadly written that not only is there nothing new in it, parts of this could have been written in the mid-90s — stuff about active defenses, better training, better procurement — it's the same old stuff. It's hard to see how this constitutes a strategy."

Others agreed there were obvious omissions with no reference to "information operations" — the deployment of digital disinformation — or a new generation of cyberweapons that could take out computer-controlled power grids, refineries, chemical factories and other computer controlled infrastructure, says Dan Kuehl, a professor of information operations at National Defense University, who attended Lynn's speech.

"The reality is this is really a document focused on cybersecurity efforts, which are not unimportant, but it's only one or two slices of the pizza," Dr. Kuehl says. "Where's the DoD's strategy for the use of cyberspace to influence operations?" he asks, referring to the use of disinformation.

Still, he thought Lynn's speech and the document are unambiguous about the major issue: the military's key role in cyberspace.

"There's been some unhappiness emerging about the idea of militarizing cyberspace," he says. "But I thought Lynn's speech and the strategy document are right on the mark in trying to just normalize it — driving a gentle stake through the heart of all this concern.

"I mean, give me a break, it has been militarized for two decades just like space. We're just catching up with it."

Interested in a private Judaic studies instructor — for free? Let us know by clicking here.

Every weekday JewishWorldReview.com publishes inspiring articles. Sign up for our daily update. It's free. Just click here.

Comment by clicking here.






© 2011, The Christian Science Monitor. All rights reserved.