You have commented 339 times on Rantburg.

Your Name
Your e-mail (optional)
Website (optional)
My Original Nic        Pic-a-Nic        Sorry. Comments have been closed on this article.
Bold Italic Underline Strike Bullet Blockquote Small Big Link Squish Foto Photo
Home Front: WoT
Pentagon Outsources Cyberwarfare
2012-05-30
The Pentagon is turning to the private sector, universities and even computer game companies as part of an ambitious effort to develop technologies to improve its cyberwarfare capabilities, launch effective attacks and withstand the likely retaliation.
Get the Best and the Brightest!
The previously secret unreported effort, which its authors have dubbed Plan X, marks a new phase in the nation's fledgling military operations in cyberspace, which have focused more on protecting the Defense Department's own computer systems than on disrupting or destroying those of enemies. Plan X is a project of the Defense Advanced Research Projects Agency (DARPA).

The five-year, $110 million research program will begin seeking proposals this summer. Among the goals will be the creation of an advanced map that details the entirety of cyberspace -- a global domain that includes tens of billions of computers and other devices -- and updates itself continuously. Such a map would help commanders identify targets and disable them using computer code delivered through the Internet or other means.

Another goal is the creation of a new, robust operating system capable of launching attacks and surviving counterattacks.

Plan X is part of a larger DARPA effort begun several years ago to create breakthrough offensive and defensive cyber capabilities. With a cyber budget of $1.54 billion from 2013 to 2017, the agency will focus increasingly on cyber-offense to meet military needs, officials say.

DARPA's research is designed to foster long-shot successes. In addition to helping create the Internet, the agency's work gave rise to stealth jet technology and portable global-positioning devices.
Al Gore invented the internet - everyone knows that!
A commander wanting to hit a computer that controls a target -- a strategically important drawbridge in enemy territory, for example -- should be able to predict and quantify battle damage while considering the timing or other constraints on a possible attack, said Dan Roelker, Plan X program manager.
Dream on.
Cyberwar experts worry about unintended consequences of attacks that might damage the flow of electricity to civilian homes or hospitals. A targeting system also should allow operators to stop a strike or reroute it before it damages systems that are not targeted -- a fail-safe mechanism that experts say would be very difficult to engineer.
Can't be killing the virtual baby ducks and fluffy bunnies!
Posted by:Bobby

00:00