Top Defense commander hints at taking offensive actions in space, cyberspace

The chief of the Strategic Command hinted Wednesday during a Senate hearing that the Pentagon has plans to conduct warfare in space as well as in cyberspace, strategies the Defense Department has been reluctant to discuss openly in the past.

Air Force Gen. Kevin Chilton, commander of the U.S. Strategic Command, testified before the Senate Armed Services Committee that cyberspace has emerged as "a unique global domain in which the United States must maintain freedom of action."

STRATCOM oversees the Joint Task Force-Global Network Operations, which directs the operation and protection of global defense networks. Chilton told the Senate hearing that his command will continue to define the capabilities to not only defend networks but to "exploit and attack in cyberspace" those who threaten those systems. Chilton said he envisions the day when STRATCOM has assigned brigades, battalions, wings and groups "to conduct network warfare."

Chilton said STRATCOM is reacting to the changing nature of threats. Potential adversaries recognize U.S. reliance on cyberspace and constantly probe networks to gain an edge, he said. Last week, the Pentagon reported that it appeared that China was behind a series of attacks against computer systems and networks operated by Defense and other government agencies as well as those operated by governments worldwide.

Defensive measures already in place to protect networks and technology assets must be improved, Chilton said.

Adversaries also threaten Defense's assets, namely satellites, he said. The "global commons" of space has become vitally important to life in the United States, with civil, military and economic activities dependent on access to cyberspace and space-based capabilities, he told the committee. "We can expect future adversaries to attack these dependencies. Our dependence on these capabilities and their associated vulnerabilities require us to focus our efforts to ensure U.S. freedom of action in these domains."

Chilton said the Chinese anti-satellite test in January 2007 "made it clear that space is no longer a sanctuary [and] we can expect similar challenges in the future." He told the senators that Defense is ready to "respond" to perceived threats. U.S. adversaries understand "our dependence on space-based capabilities, and we must be ready to detect, track, characterize and respond to any threat to our space infrastructure," he told the panel.

The United States faces threats against its networks and information systems from terrorist organizations as well as other countries, Chilton told the hearing. "These new adversaries are distributed, networked and fleeting. Enabled by information technology and financial support, they are able to maintain a global presence by recruiting, training, inciting and directing attacks in a variety of ways, including through cyberspace."

Last June, the Defense Science Board released a report that recommended that attacks against U.S. information systems should be countered with "disproportionate response." The report added that "every potential adversary, from nation states to rogue individuals, could be targets of an integrated offensive capability."

Last August, the Air Force Space Command released a request for proposals for a space control contract, which the service intends to use to develop forces that can attack communication, surveillance and Global Positioning System satellites, according to the procurement documents.

Threats to space systems, especially communications satellites, also are the result of internal Defense problems, Adm. Timothy Keating, commander of the U.S. Pacific Command, told the committee Tuesday. The Pacific Command requires secure, reliable communications systems, Keating said, but satellite failures, as well as funding cuts and delays in military satellite programs, have reduced the availability of these systems.

The Government Accountability Office reported last week that Defense satellite programs are plagued by cost overruns and delays that have pushed back development and deployment of some military systems by years.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by Brocade

    Best of 2016 Federal Forum eBook

    Earlier this summer, Federal and tech industry leaders convened to talk security, machine learning, network modernization, DevOps, and much more at the 2016 Federal Forum. This eBook includes a useful summary highlighting the best content shared at the 2016 Federal Forum to help agencies modernize their network infrastructure.

    Download
  • Sponsored by CDW-G

    GBC Flash Poll Series: Merger & Acquisitions

    Download this GBC Flash Poll to learn more about federal perspectives on the impact of industry consolidation.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by Aquilent

    A DevOps Roadmap for the Federal Government

    This GBC Report discusses how DevOps is steadily gaining traction among some of government's leading IT developers and agencies.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download
  • Sponsored by CDW-G

    Joint Enterprise Licensing Agreements

    Read this eBook to learn how defense agencies can achieve savings and efficiencies with an Enterprise Software Agreement.

    Download
  • Sponsored by Cloudera

    Government Forum Content Library

    Get all the essential resources needed for effective technology strategies in the federal landscape.

    Download

When you download a report, your information may be shared with the underwriters of that document.