The US military’s computer networks are probed thousands of time a day, but so far these intrusions have been “espionage” to siphon off information and have not been denial-of-service attempts, which would be considered outright “attacks,” US Strategic Command head Air Force Gen. Kevin Chilton, told defense reporters May 7 in Washington, D.C. Despite the staggering amounts of hacker activity, Chilton said the US military is getting continually better at defending its networks, which means that a hacker now requires more sophistication to succeed. And this, in turn, means that a hacker would need more resources to carry out the job, making state sponsorship or the involvement of more established and financed entities more likely. Stealing data, even when it is just on the military’s unclassified networks is still disconcerting because of what the intruder may glean by piecing the information together, Chilton said. But more troubling is the prospect that someone would succeed with a denial-of-service effort because these types of intrusions could render networks slower or entirely non functional, thereby affecting military operations, he said. In the next five years the US military needs to add about an additional 2,000 to 4,000 personnel to work in the cyberspace domain, Chilton said. The most acute need is for a dedicated force to prepare cyber attacks and carry them out when directed, he said. (Also read Cyber Synergy on STRATCOM’s plan for a cyber command.)
The Air Force and Boeing agreed to a nearly $2.4 billion contract for a new lot of KC-46 aerial tankers on Nov. 21. The deal, announced by the Pentagon, is for 15 new aircraft in Lot 11 at a cost of $2.389 billion—some $159 million per tail.