by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : September 15, 2016
Large numbers of computers acces- sible via Milnet had also been com- promised, he said, including domains serving the Joint Chiefs of Staff and the Defense Logistics Agency. Such depredations gave rise to changes in the ways agencies con- fronted hacking groups, including a focus on sharing information between the defense and intelligence communi- ties and the creation of military cyber commands to put government cyber defenses on a wartime footing. In a 1996 information-sharing effort, then-CIA director John Deutch pro- posed working with DOD to create an Information Warfare Technology Center staffed with 1,000 people and located at the National Security Agency at Fort Meade, Md. The center would produce assess- ment tools for civilian, military and intelligence agencies “to deal with the emerging threat.” Following suit, the Air Force announced plans to create a cyber command to bring the tactics of war to the cybersecurity theater, pledg- ing “to fly and fight in air, space and cyberspace.” “Cyberspace is a domain for project- ing and protecting national power for both strategic and tactical operations,” Air Force Secretary Michael Wynne said in announcing the new command in November 2006. Although the measures have strengthened the government’s hand, the jockeying for control of the cyber commands continues. Adm. Michael Rogers, who leads both U.S. Cyber Command and NSA, told legislators in April that Cybercom should be elevated to a full unified combatant command. Some in Congress have even called for creating a separate military service to focus on cyber (something Rogers has said he opposes). Also ongoing is the sense that cyber- threats might be outpacing defensive efforts. “I don’t know whether we will face an electronic Pearl Harbor,” Deutch said in 2006. “But we will have, I’m sure, some very unpleasant circumstances in this area.” Those remarks echoed through the years until June 2015, when the Office of Personnel Management revealed that it had been hit by a double breach of near-Pearl Harbor proportions: a hack that compromised 4.2 million Social Security numbers. A second hack two months later compromised 21 million SSNs. Both intrusions were traced to China in what has become a war for digital dominance among the superpowers. n September 15, 2016 FCW.COM 17 JULY 1994 HACKERS STORM DOD NETWORKS By the mid-1990s, the hacking of government computers had evolved from being mostly an illicit pastime of hobbyists to an organized crime carried out by teams of “info assassins,” in the words of a Defense Department official. On any given day, former Director of Defense Information Paul Strassmann said in 1996, DOD did not have control of five or six of its computer systems — “the hackers do.” LOPHT.COM In 1998, members of the hacker collective L0pht testified before Congress about how easy it would be to take down the internet. 0915fcw_014-022.indd 17 8/23/16 9:33 AM
August 30, 2016
September 30, 2016