An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
HOME
LEADERSHIP
Commander
Deputy Commander
Chief of Staff
Senior Enlisted Leader
Leadership
ABOUT USINDOPACOM
History
USINDOPACOM Area of Responsibility
USPACOM Previous Commanders
Organization Chart
Women, Peace and Security
Indo-Pacific Health Security Alliance - IPhsa
About USINDOPACOM
MEDIA
NEWS
Press Releases and Readouts
Photos
Speeches / Testimony
Freedom of Information Act
FOIA - Reading Room
Submit FOIA Request
Request Status
FOIA FAQS
2024 Banner Photos
Media
RESOURCES
Travel Requirements
Useful Theater Information
FAQ
Useful Links
Newcomers
Resources
CONTACT
Media Inquiries
Industry Engagements
Contact
JTF - RED HILL
JTF-MICRONESIA
Search
Home
Media
NEWS
News Article View
Home
Media
NEWS
News Article View
HOME
LEADERSHIP
Commander
Deputy Commander
Chief of Staff
Senior Enlisted Leader
ABOUT USINDOPACOM
History
USINDOPACOM Area of Responsibility
USPACOM Previous Commanders
Organization Chart
Women, Peace and Security
Indo-Pacific Health Security Alliance - IPhsa
MEDIA
NEWS
Press Releases and Readouts
Photos
Speeches / Testimony
Freedom of Information Act
FOIA - Reading Room
Submit FOIA Request
Request Status
FOIA FAQS
2024 Banner Photos
RESOURCES
Travel Requirements
Useful Theater Information
FAQ
Useful Links
Newcomers
CONTACT
Media Inquiries
Industry Engagements
JTF - RED HILL
JTF-MICRONESIA
DOD Works to Increase Cybersecurity for U.S., Allies
18 September 2020
From David Vergun
Download
WASHINGTON -- Open and reliable access to the Internet is essential for global security and prosperity. However, growing cyber threats from state and non-state actors threaten those values, the Defense Department's principal director for Cyber Policy said.
Madeline Mortelmans, spoke today at an event hosted by the Association of European Journalists in Madrid, Spain.
Adversaries China, Russia, Iran and North Korea are increasingly taking malicious cyber activities in the gray zone, which is below the threshold of armed conflict, to undermine U.S. and allies' security, she said.
China is using cyber espionage for military and economic advantages, Mortelmans said. In 2018, the Justice Department estimated that more than 90% of economic espionage cases involved China and more than two-thirds of the cases involved in the theft of trade secrets were connected to China; this in spite of their 2015 pledge not to use espionage for their economic benefit.
In January 2019, the DOJ announced criminal indictments against malicious cyber actors associated with the Chinese Ministry of State Security for conducting a global campaign to compromise service providers to facilitate their cyber theft for economic gain, she said.
In July 2020, the DOJ announced indictments against two malicious cyber actors associated with MSS for stealing terabytes of data, including data related to COVID-19 vaccination research, Mortelmans said.
Russia is conducting cyber espionage that has the potential to disrupt critical infrastructure and erode confidence in America's democratic system, she said. For example, they've made attempts to interfere in the 2016, 2018 and now 2020 U.S. elections, as well as elections of allies and partners.
North Korea has hacked financial networks and cryptocurrency to generate funds to support their weapons development program, she said.
Iran has conducted disruptive cyberattacks against U.S. and allies' companies, along with information operations to push their own narrative across the Middle East, Mortelmans said.
Violent extremist organizations use cyber to recruit terrorists, raise funds, direct attacks and distribute gruesome propaganda online, she mentioned.
There are also cyber criminals who pose a growing threat from their use of ransomware to extort money from local and state governments as well as the commercial sector, she said.
In response to these threats, U.S. Cyber Command has taken a comprehensive and proactive approach, she said, that involves being able to defend forward anywhere in the world, in order to respond to cyber and other threats before they reach the homeland, Mortelmans said.
Defending forward includes understanding what adversaries are trying to do and what the threat looks like. This effort includes working with allies and partners, she noted.
Besides having an understanding of adversaries' intention, Cybercom has the tools and expertise to conduct defensive and offensive cyber operations, she said.
A cyber operation can constitute an act of war or use of force, she pointed out. An attack is based on the effects that are caused, rather than the means by which they are achieved. An example would be an attack on critical infrastructure such as the power grid.
A cyberattack does not necessarily require a cyber response, she added.
Guidance-Card-Icon
Dept-Exclusive-Card-Icon