Cyber Strategies for a World at War

OPEN SOURCE AGGREGATION & ANALYSIS

Top Hacker Shows Us How It’s Done

Filed under: cyber security, , , , , , , ,

From the streets to The Street — TechCrunch

The past several months have brought a string of terror attacks and violent incidents, which not only claim lives but cause worldwide feelings of fear and vulnerability. It seems that groups of terrorists like ISIS can strike when and where they want. As the authorities ramp up surveillance, such attackers simply adapt and change their tactics. They have learned to be patient and to leave few traces.

via From the streets to The Street — TechCrunch

Filed under: cyber warfare, , , , , , ,

Michael Hayden on Apple’s fight with FBI


 

ADVERTISEMENT

An unprecedented high-level master narrative of America’s intelligence wars, from the only person ever to helm both CIA and NSA, at a time of heinous new threats and wrenching change… [MORE]

Filed under: cyber security, , , , , , , , , , , ,

Cyber review underway

The White House Blog
March 2, 2009

John Brennan, Assistant to the President for Homeland Security and Counterterrorism, passed along this update about the ongoing review of our nation’s communications and information infrastructure.

In response to President Obama’s direction, the National Security Council and Homeland Security Council are presently conducting a 60-day review of the plans, programs, and activities underway throughout the government that address our communications and information infrastructure (i.e., cyberspace). The purpose of the review is to develop a strategic framework to ensure that our initiatives in this area are appropriately integrated, resourced and coordinated both within the Executive Branch and with Congress and the private sector.

Our nation’s security and economic prosperity depend on the security, stability, and integrity of communications and information infrastructure that are largely privately-owned and globally-operated. Safeguarding these important interests will require balanced decision making that integrates and harmonizes our national and economic security objectives with enduring respect for the rule of law. Guided by this principle, the review will build upon existing policies and structures to formulate a new vision for a national public-private partnership and an action plan to: enhance economic prosperity and facilitate market leadership for the U.S. information and communications industry; deter, prevent, detect, defend against, respond to, and remediate disruptions and damage to U.S. communications and information infrastructure; ensure U.S. capabilities to operate in cyberspace in support of national goals; and safeguard the privacy rights and civil liberties of our citizens.

The review will be completed by the end of April 2009. At that time, the review team will present its recommendations to the President regarding an optimal White House organizational construct to address issues related to U.S. and global information and communications infrastructure and capabilities. The recommendations also will include an action plan on identifying and prioritizing further work in this area.

Filed under: Analysis, Biography, Business, cyber security, cyber war, Doctrine, government, History, Intelligence Community, Internet, Life, Military, News, Policy, Politics, Strategy, Technology, Terrorism, Training, War, , , , , , , , , , , , , , , , , , , , , ,

Cyber security tops 2009 agenda for Lockheed and the public sector

By JD Kathuria
January 13th, 2009
ExecutiveBiz Blog

Top defense company Lockheed Martin is taking aim to capture a market share in what is projected to be an $11 billion market for cyber security in the next four years. In 2009 cyber security is expected to be at the top of the agenda for the federal government and major defense companies. By reorganizing existing capabilities in information security assurance Lockheed Martin continues to remain one step ahead of hackers and intruders in order to best serve its government clients.

Continue reading…

Filed under: Business, cyber security, News, , , , , ,

New Way of War

Cyber Attacks Likely in Any Military Conflict: Reports
By william matthews
Published: 26 October 2008
DefenseNews

Cyber attacks like those that accompanied the Russian invasion of Georgia in August are likely to accompany almost any traditional military action in the future, security experts warn in a report on cyber threats published by Georgia Tech University, based in Atlanta.

And even in the absence of overt military action, the United States is expected to be the target. Cyber attacks will “play a more shadowy role in attempts by antagonist nations to subvert the U.S. economy and infrastructure,” the Georgia Tech Information Security Center warns in its “Emerging Cyber Threats Report for 2009.”

Meanwhile, a team of investigators probing cyber attacks on the Caucasian country of Georgia concluded that “nationalistic hackers” in Russia carried out the attacks. Despite suspicion that the Russian government was involved in the attacks, the team reported that so far, it has been unable to link the hackers’ activity directly to the Russian military or other government agencies.

Continue reading…

Filed under: cyber war, News, , , , , , ,

A World at War

The world is transforming right before our eyes. Yet, perhaps calling what is happening a transformation is an understatement. A more accurate description may be that the world is undergoing a massive reality shift. Markets are collapsing as tempers rise and then erupt into fevered protests. Ice caps are melting as economies freeze up. The Middle East more and more is becoming the center of everyone’s violent attention. And there is so much more, so many shifts in reality happening all at once that we are barely even noticing, or perhaps we are neglecting to notice, the biggest shift in reality of them all: that a truly global and deadly war has begun.

We are aware, of course, of the many wars and conflicts that are forever being covered in the news: the longstanding war on terror, we see the isolated conflicts and flare ups in places like Africa and South America, the infinite destruction between Israel and Palestine, and we have accepted the fact that some day some where a weapon of mass destruction will be unleashed on an unsuspecting and unprepared population; however, we so not seem to be completely aware of the total global war that is being fought relentlessly on the cyber battle fields that are all converging on the Internet.

The world is truly at war and it is the mission of this site to focus as much attention as possible on the reality and on the of consequences of this war.

Filed under: Analysis, cyber war, , ,

Global Trends

"The nature of conflict is changing. The risk of conflict will increase due to diverging interests among major powers, an expanding terror threat, continued instability in weak states, and the spread of lethal, disruptive technologies. Disrupting societies will become more common, with long-range precision weapons, cyber, and robotic systems to target infrastructure from afar, and more accessible technology to create weapons of mass destruction."
 
Global Trends and Key Implications Through 2035 from the National Intelligence Council Quadrennial Report GLOBAL TRENDS: The Paradox of Power

A World at War

The World is at War. It is a world war that is being fought right now, in real time, virtually everywhere on the planet. It is a world war that is, perhaps, more encompassing and global in nature than any other world war in history because, not only is it being fought by nations and their governments, it is also being fought by non-state actors such as terrorists, organized crime, unorganized crime, and many other known and unknown entities. It is a total world war being fought every day on the hidden and dark battle fields of the cyber domain. It is a war that, according to some intelligence estimates, has the potential to be as nearly as serious and as deadly as a nuclear war... [MORE]

 


 


ADVERTISEMENT

Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real... [MORE]

RSS ODNI News

  • Homeland Security Advisor Tom Bossert Discusses Global Ransomware Attack May 22, 2017
    The President's Homeland Security Advisor, Tom Bossert, briefed the press on 15 May 2017 on the WannaCry ransomware attack that began spreading 12 May and affected computers in more than 150 countries. Bossert highlighted CTIIC's role in keeping the White House informed of unfolding events and discussed US responses and public/private coordination […]
  • Homeland Security Advisor Tom Bossert Discusses Global Ransomware Attack May 22, 2017
    The President's Homeland Security Advisor, Tom Bossert, briefed the press on 15 May 2017 on the WannaCry ransomware attack that began spreading 12 May and affected computers in more than 150 countries. Bossert highlighted CTIIC's role in keeping the White House informed of unfolding events and discussed US responses and public/private coordination […]
  • DS&T AND OUSD(I) Launch “Xpress” Automated Analysis Challenge May 16, 2017
    NEWS RELEASE FOR IMMEDIATE RELEASE ODNI News Release No. 13-17 May 15, 2017   DS&T AND OUSD(I) Launch “Xpress” Automated Analysis Challenge   WASHINGTON – The Intelligence Community is sponsoring a $500,000 prize competition to explore artificial intelligence approaches that would transform the process by which analysts currently support policymakers and […]
  • Presidential Management Fellow Program April 20, 2017
    The Presidential Management Fellow Program is administered by the U.S. Office of Personnel Management (OPM) and matches outstanding graduate students with exciting Federal opportunities. The Office of the Director of National Intelligence actively seeks PMF finalists and provides them with challenging assignments, training, and mentoring, beginning at the GS […]
  • Standards, Guides and Best Practices April 13, 2017
    Structured, standards-driven approaches to technology and enterprise data management are the foundation for responsible information sharing that protects privacy, civil rights, and civil liberties. Standards provide a common lexicon to enable information exchanges.   The ISE Common Information Sharing Standards (CISS) program provides standards for technolog […]

ADVERTISEMENT

Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity... [MORE]


ADVERTISEMENT

Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications... [MORE]

RSS NSA News


ADVERTISEMENT

“When it comes to what government and business are doing together and separately with personal data scooped up from the ether, Mr. Schneier is as knowledgeable as it gets…. Mr. Schneier’s use of concrete examples of bad behavior with data will make even skeptics queasy and potentially push the already paranoid over the edge.” (Jonathan A. Knee - New York Times)... [MORE]

RSS CIA News


ADVERTISEMENT

The Blue Team Handbook is a zero fluff reference guide for cyber security incident responders and InfoSec pros alike. The BTHb includes essential information in a condensed handbook format about the incident response process, how attackers work, common tools, a methodology for network analysis developed over 12 years, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, and numerous other topics... [MORE]

RSS Defense Advanced Research Projects Agency (DARPA)

  • 2017/06/23 DARPA to Host “Sync with STO” Event June 23, 2017
    DARPA's Strategic Technology Office (STO) is hosting a "Sync with STO" event on August 2 - 3, 2017, designed to familiarize attendees with STO's mission, problem spaces, program managers (PMs), and technology interests. The event aims to facilitate technical discussion between STO PMs and attendees that explore innovative and revolutionar […]
  • 2017/06/15 Transforming How Troops Fight in Coastal Urban Environments June 15, 2017
    As nation-state and non-state adversaries adapt and apply commercially available state-of-the-art technology in urban conflict, expeditionary U.S. forces face a shrinking operational advantage. To address this challenge, a new DARPA program is aiming to create powerful, digital tools for exploring novel expeditionary urban operations concepts-with a special […]
  • 2017/06/02 New ways of representing information could transform digital technology June 2, 2017
    Many people who use computers and other digital devices are aware that all the words and images displayed on their monitors boil down to a sequence of ones and zeros. But few likely appreciate what is behind those ones and zeros: microscopic arrays of "magnetic moments" (imagine tiny bar magnets with positive and negative poles). When aligned in pa […]
  • 2017/06/02 Extracting Insight from the Data Deluge Is a Hard-to-Do Must-Do June 2, 2017
    A mantra of these data-rife times is that within the vast and growing volumes of diverse data types, such as sensor feeds, economic indicators, and scientific and environmental measurements, are dots of significance that can tell important stories, if only those dots could be identified and connected in authentically meaningful ways. Getting good at that exe […]
  • 2017/06/01 Beyond Scaling: An Electronics Resurgence Initiative June 1, 2017
    The Department of Defense's proposed FY 2018 budget includes a $75 million allocation for DARPA in support of a new, public-private "electronics resurgence" initiative. The initiative seeks to undergird a new era of electronics in which advances in performance will be catalyzed not just by continued component miniaturization but also by radica […]

ADVERTISEMENT

RSS Cyber News (Google)

  • Under pressure, Western tech firms bow to Russian demands to share cyber secrets - Reuters June 24, 2017
    ReutersUnder pressure, Western tech firms bow to Russian demands to share cyber secretsReutersThe demands are being made by Russia's Federal Security Service (FSB), which the U.S. government says took part in the cyber attacks on Hillary Clinton's 2016 presidential campaign and the 2014 hack of 500 million Yahoo email accounts. The FSB, which ...RE […]
  • Report: Obama authorized a secret cyber operation against Russia - Engadget June 24, 2017
    EngadgetReport: Obama authorized a secret cyber operation against RussiaEngadgetApparently, one of the covert programs Obama, the CIA, NSA and other intelligence groups eventually put together was a new kind of cyber operation that places remotely triggered "implants" in critical Russian networks, ready for the US to deploy in the ...Obama put cybe […]
  • NSA infected Russian networks with remote cyber weapons ... - Business Insider June 23, 2017
    Business InsiderNSA infected Russian networks with remote cyber weapons ...Business InsiderThe top secret program was a covert action that would allow the US to retaliate if Russia meddles in future elections.and more »
  • Student cyber camps aim to create pipeline to tech jobs - WAVE 3 June 24, 2017
    Student cyber camps aim to create pipeline to tech jobsWAVE 3LOUISVILLE, KY (WAVE) - With more than 2,000 cyber security job openings in the state of Kentucky, community groups are starting early to train young students on the opportunities. "These skills are transferable," said Kevin Fields, who's hosting ...
  • Joint Base Cape Cod Becomes Cyber Battlefield - CapeNews.net June 23, 2017
    Joint Base Cape Cod Becomes Cyber BattlefieldCapeNews.netKnown as exercise “Cyber Yankee,” the simulation partnered National Guard cyber network defense teams from across New England with local players—think utility companies—and local, state and federal law enforcement agencies to prepare for a ...
  • SLO County saw spike in Election Day cyber attacks, days after meeting with FBI - The San Luis Obispo Tribune June 24, 2017
    The San Luis Obispo TribuneSLO County saw spike in Election Day cyber attacks, days after meeting with FBIThe San Luis Obispo TribuneLeading up to the Nov. 8 General Election, San Luis Obispo County officials met quietly with representatives from the FBI to identify possible cyber threats and beef up its security against hackers who have breached the confide […]
  • Cyber warriors have the questions - Suffolk News-Herald June 24, 2017
    Cyber warriors have the questionsSuffolk News-HeraldNCDOC enables global power projection through proactive network defense of navy computer networks and systems and reports operationally to U.S. Fleet Cyber Command/U.S. 10th Fleet. U.S. Fleet Cyber Command serves as the Navy component ...
  • Girl Scouts Will Get The Chance To Earn Badges In Cyber Security - PYMNTS.com June 23, 2017
    PYMNTS.comGirl Scouts Will Get The Chance To Earn Badges In Cyber SecurityPYMNTS.comWomen are vastly underrepresented in the cyber security industry, holding just 11 percent of jobs worldwide, so one of the program's main goals is to instill “a valuable twenty-first century skill set” including preventing against a cyber attack in ...New Girl Scout badg […]
  • Local IT professionals learn to detect and prevent cyber attacks - WEAR June 24, 2017
    WEARLocal IT professionals learn to detect and prevent cyber attacksWEAREvery cyber target, whether it be the federal government, an online dating website, or a multinational corporation, needs people trained to prevent cyber attacks. IT professionals across Escambia County and the city of Pensacola came together Friday ...and more »
  • Girl Scouts learn about cyber security at Cal State San Bernardino ... - Press-Enterprise June 23, 2017
    Press-EnterpriseGirl Scouts learn about cyber security at Cal State San Bernardino ...Press-EnterpriseWinchester resident Alexis Gettemeier, 10, learns how to fly a drone during a 2015 Girl Scout camp at Cal State San Bernardino designed to interest middle ...Girl Scouts rolling out new cyber security badges next fallWRDW-TVall 2 news articles »

ADVERTISEMENT

RSS Cyber War News (Bing)


ADVERTISEMENT

RSS Cyber Tag (Icerocket)


ADVERTISEMENT

RSS Cyberwar Tag (Wordpress)


ADVERTISEMENT


 
The Art of Attention

© 2016 PROSOCHĒ. All Rights Reserved.
Fair Use Policy ҩ Terms of Service ҩ Privacy Policy ҩ Contact

Cyber Threat Assessment

 


ADVERTISEMENT

In this New York Times bestselling investigation, Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared... [MORE]


ADVERTISEMENT

As cyber-attacks dominate front-page news, as hackers join terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prize–winning journalist Fred Kaplan... [MORE]


ADVERTISEMENT

ADVERTISEMENT

Support CSWW

Please help improve CSWW by providing us with your comments, concerns, and questions at our FEEDBACK page.

Editor, CSWW

Kurt Brindley is a retired U.S. Navy Senior Chief who specialized in the fields of tele-communications and C4SRI systems Upon retirement from the navy, he spent nearly a decade as a defense industry consultant. He now writes full time... [MORE]


ADVERTISEMENT

Now in development for film by 20th Century Fox, award-winning CyberStorm depicts, in realistic and sometimes terrifying detail, what a full scale cyber attack against present-day New York City might look like from the perspective of one family trying to survive it... [MORE]