'저는 그들의 땅을 지키기 위하여 싸웠던 인디안들의 이야기를 기억합니다. 백인들이 그들의 신성한 숲에 도로를 만들기 위하여 나무들을 잘랐습니다. 매일밤 인디안들이 나가서 백인들이 만든 그 길을 해체하면 그 다음 날 백인들이 와서 도로를 다시 짓곤 했습니다. 한동안 그 것이 반복되었습니다. 그러던 어느날, 숲에서 가장 큰 나무가 백인들이 일할 동안 그들 머리 위로 떨어져 말과 마차들을 파괴하고 그들 중 몇몇을 죽였습니다. 그러자 백인들은 떠났고 결코 다시 오지 않았습니다….' (브루스 개그논)





For any updates on the struggle against the Jeju naval base, please go to savejejunow.org and facebook no naval base on Jeju. The facebook provides latest updates.

Monday, November 8, 2010

Text Fwd: Pentagon's Cyber Command seeks authority to expand its battlefield 미 국방부 사이버 사령부, 전장을 확산하기 위해 권력 잡으려 함

* Informed at the CLG (Citizens for Legitimate Government) Breaking News on Nov. 8, 2010

Washington Post
Pentagon's Cyber Command seeks authority to expand its battlefield
By Ellen Nakashima
Washington Post Staff Writer
Saturday, November 6, 2010

The Pentagon's new Cyber Command is seeking authority to carry out computer network attacks around the globe to protect U.S. interests, drawing objections from administration lawyers uncertain about the legality of offensive operations.

Cyber Command's chief, Gen. Keith B. Alexander, who also heads the National Security Agency, wants sufficient maneuvering room for his new command to mount what he has called "the full spectrum" of operations in cyberspace.

Offensive actions could include shutting down part of an opponent's computer network to preempt a cyber-attack against a U.S. target or changing a line of code in an adversary's computer to render malicious software harmless. They are operations that destroy, disrupt or degrade targeted computers or networks.

But current and former officials say that senior policymakers and administration lawyers want to limit the military's offensive computer operations to war zones such as Afghanistan, in part because the CIA argues that covert operations outside the battle zone are its responsibility and the State Department is concerned about diplomatic backlash.

The administration debate is part of a larger effort to craft a coherent strategy to guide the government in defending the United States against attacks on computer and information systems that officials say could damage power grids, corrupt financial transactions or disable an Internet provider.

The effort is fraught because of the unpredictability of some cyber-operations. An action against a target in one country could unintentionally disrupt servers in another, as happened when a cyber-warfare unit under Alexander's command disabled a jihadist Web site in 2008. Policymakers are also struggling to delineate Cyber Command's role in defending critical domestic networks in a way that does not violate Americans' privacy.

READ MORE

No comments:

Post a Comment