Cyber Strategies for a World at War

OPEN SOURCE AGGREGATION & ANALYSIS

U.S. Interests Face Challenges in Europe, Intelligence Chief Says

By Jim Garamone
American Forces Press Service

WASHINGTON, Feb. 16, 2009 – (This is the third in a series on the intelligence community’s annual threat assessment.)

Russia’s perceived strengths and its policies, tensions in Eurasia, Caucasus and Central Asia, and instability in the Balkans all pose challenges to U.S. interests in Europe, the director of national intelligence said Feb. 12.

Dennis C. Blair, a retired Navy admiral, told the Senate Select Committee on Intelligence that Russia continues to rebuild its military and, as events in Georgia last year show, use those forces to impress on the world that the nation is still relevant.

“Russian challenges to US interests now spring more from Moscow’s perceived strengths than from the state weaknesses characteristic of the 1990s,” Blair said in prepared testimony.

“U.S. involvement in Iraq and Afghanistan and general anti-Americanism have created openings for Russia to build alternative arrangements to the US-led international political and economic institutional order,” he said.

Russia is attempting to increase its ability to influence events, he said, by “actively cultivating relations with regional powers, including China, Iran, and Venezuela.”

Blair said Russia’s energy policy is aimed at increasing the country’s importance on the European continent.

“Moscow also is trying to maintain control over energy supply and transportation networks to Europe to East Asia, and protect and further enhance its market share in Europe through new bilateral energy partnerships and organizing a gas cartel with other major exporters,” he said.

Read the rest of this entry »

Filed under: Analysis, Business, cyber security, cyber war, Doctrine, government, History, Intelligence Community, Internet, Life, Military, News, Policy, Politics, Strategy, Technology, Terrorism, Training, War, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Nato’s cyber defence warriors

By Frank Gardner
February 3, 2009
BBC

Nato officials have told the BBC their computers are under constant attack from organisations and individuals bent on trying to hack into their secrets.

The attacks keep coming despite the establishment of a co-ordinated cyber defence policy with a quick-reaction cyber team on permanent standby.

The cyber defence policy was set up after a wave of cyber attacks on Nato member Estonia in 2007, and more recent attacks on Georgia – so what are they defending against and how do they do it?

Tower of Babel

Nato’s operational headquarters in Mons is a low, drab three-storey building – part of a sprawling complex set in rolling farmland south of Brussels.

The blue and white flag of the 26-nation alliance flutters in the cold breeze alongside the spangled banner of the EU.

Inside the canteen it is like a Tower of Babel with almost every language of Europe competing to be heard above the clatter of trays and dishes.

Our escort, a German army officer in immaculate uniform, leads us down a corridor to a hushed room where 20 or so military analysts sit hunched over computers; their desert boots and camouflage fatigues strangely out of place for a windowless room in Belgium.

This, explains Chris Evis, is the Incident Management Section, which he heads.

“We face the full gamut of threats. It varies from your kiddie who’s just trying to gain street cred amongst his friends to say he’s just defaced a Nato system to more focused targeted attacks against Nato information”.

Cyber attacks are not new – websites were being hacked into and brought down during the Kosovo war 10 years ago.

Continue reading…

Filed under: cyber war, Military, News, , , , , , , , , , , , , , ,

Intel director: Iran, cyber threats biggest worry

By Pamela Hess
January 16, 2009
Associated Press

WASHINGTON (AP) — Iran producing a nuclear weapon and a cyber attack on critical government or private computer networks top the list of concerns nagging at National Intelligence Director Michael McConnell as he prepares to leave office.

McConnell told reporters in an interview Friday that U.S. intelligence agencies do not have evidence to prove Iran has decided to build a nuclear warhead, but he shares the alarm of outgoing CIA Director Michael Hayden that the possibility may come soon. He said Tehran is two to three years away from having a long-range missile that could reach Europe, and continues to produce low-enriched uranium, the raw ingredient for the fissile material needed for a warhead.

“I’m very concerned Iran will continue down a path that will result in a nuclear weapon,” he said.

He is especially worried about the effect it would have in the Middle East, either kicking off a regional arms race or a war.

McConnell said that protection of U.S. computer networks — government, military and commercial — is another major worry.

“Cyber security is the soft underbelly of this country,” he said.

His fear is less that information would be stolen off the networks by hackers or spies but that they would destroy it outright.

“It could have a debilitating effect on the country,” he said.

The federal government is still building its cyber protection plan, with the Homeland Security Department nominally in charge. But McConnell said the spy agencies, especially the National Security Agency, have to play a key role in protecting domestic computer networks. That prospect alarms privacy and civil liberty advocacy groups, who oppose giving agencies meant to spy on foreign powers access to private citizens’ data and activities on the Internet.

Continue reading…

Filed under: cyber war, Intelligence Community, News, , , , , , , , , , , , , , ,

Waging a war with bits and bytes

By Mayank Tewari
January 11, 2009
DNA

Did you know that India and Pakistan have been fighting a cyber war for more than ten years now? That the Western world, particularly USA and a handful of European nations, have been shouting themselves hoarse at every international forum for the last two years alleging cyber intrusions by China?

Welcome to cyber warfare, a kind of conflict where no blood is shed but networks bleed, websites are attacked and defaced, e-mail servers are compromised and spying software is planted in them.

The cyber war between India and Pakistan began more than a decade ago when India went nuclear in May 1998. Angry at India for destabilising the region, hacker groups from Pakistan hacked into the website of Bhabha Atomic Research Centre (BARC). Within weeks, Indian hackers had their revenge by defacing hundreds of websites run by the Pakistani government and its affiliates. The war continues till date.

Continue reading…

Filed under: cyber war, News, , , , , , , ,

Global Trends

"The nature of conflict is changing. The risk of conflict will increase due to diverging interests among major powers, an expanding terror threat, continued instability in weak states, and the spread of lethal, disruptive technologies. Disrupting societies will become more common, with long-range precision weapons, cyber, and robotic systems to target infrastructure from afar, and more accessible technology to create weapons of mass destruction."
 
Global Trends and Key Implications Through 2035 from the National Intelligence Council Quadrennial Report GLOBAL TRENDS: The Paradox of Power

A World at War

The World is at War. It is a world war that is being fought right now, in real time, virtually everywhere on the planet. It is a world war that is, perhaps, more encompassing and global in nature than any other world war in history because, not only is it being fought by nations and their governments, it is also being fought by non-state actors such as terrorists, organized crime, unorganized crime, and many other known and unknown entities. It is a total world war being fought every day on the hidden and dark battle fields of the cyber domain. It is a war that, according to some intelligence estimates, has the potential to be as nearly as serious and as deadly as a nuclear war... [MORE]

 


 


ADVERTISEMENT

Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real... [MORE]

RSS ODNI News


ADVERTISEMENT

Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity... [MORE]


ADVERTISEMENT

Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications... [MORE]

RSS NSA News


ADVERTISEMENT

“When it comes to what government and business are doing together and separately with personal data scooped up from the ether, Mr. Schneier is as knowledgeable as it gets…. Mr. Schneier’s use of concrete examples of bad behavior with data will make even skeptics queasy and potentially push the already paranoid over the edge.” (Jonathan A. Knee - New York Times)... [MORE]

RSS CIA News


ADVERTISEMENT

The Blue Team Handbook is a zero fluff reference guide for cyber security incident responders and InfoSec pros alike. The BTHb includes essential information in a condensed handbook format about the incident response process, how attackers work, common tools, a methodology for network analysis developed over 12 years, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, and numerous other topics... [MORE]

RSS Defense Advanced Research Projects Agency (DARPA)

  • 2017/03/23 Turning to Chemistry for New “Computing” Concepts March 23, 2017
    As the complexity and volume of global digital data grows, so too does the need for more capable and compact means of processing and storing data. To address this challenge, DARPA has announced its Molecular Informatics program, which seeks a new paradigm for data storage, retrieval, and processing. Instead of relying on the binary digital logic of computers […]
  • 2017/03/17 Taking Animal Magnetism to the Extreme March 17, 2017
    Each beat of your heart or burst of brain activity relies on tiny electrophysiological currents that generate minuscule ripples in the surrounding magnetic field. These field variations provide the basis for a range of research tools and diagnostic techniques with mouthful names like magnetoencephalography (MEG) and magnetocardiography (MCG). But tapping int […]
  • 2017/03/16 Bushwhacking into Unexplored Transistor Territories March 16, 2017
    Since the advent of microelectronics in the mid-20th century, humanity has been on a nonstop sprint to eke more speed, power efficiency, and computational power from the sextillions (1021) of ever more miniaturized transistors that have come to underlie so much of the modern technoscape.
  • 2017/03/16 Toward Machines that Improve with Experience March 16, 2017
    Self-driving taxis. Cell phones that react appropriately to spoken requests. Computers that outcompete world-class chess and Go players. Artificial Intelligence (AI) is becoming part and parcel of the technological landscape-not only in the civilian and commercial worlds but also within the Defense Department, where AI is finding application in such arenas a […]
  • 2017/03/15 The Uncertainty Wrangler March 15, 2017
    In the latest episode of DARPA podcast series, Voices from DARPA, Fariba Fahroo of the Agency's Defense Sciences Office discusses just how pivotal mathematics can be for, in her words, "keeping our models honest." By characterizing the uncertainties inherent in the computer models we use to better understand complex phenomena, such as the flow […]

ADVERTISEMENT

RSS Cyber News (Google)

  • Cyber Firm Rewrites Part of Disputed Russian Hacking Report - Voice of America March 25, 2017
    Voice of AmericaCyber Firm Rewrites Part of Disputed Russian Hacking ReportVoice of AmericaCrowdStrike has revised, retracted statements it used to support allegations of Russian hacking during US presidential campaign; VOA reported company ...and more »
  • New cyber warriors face culture shock - FCW.com March 25, 2017
    FCW.comNew cyber warriors face culture shockFCW.comThe U.S. military services continue to stand up cyber recruiting and training programs, but they are also confronting the need for cultural changes to integrate a new generation of cyber warriors. The Navy has added mandatory cyber courses for all ...
  • Cyber war: Defense firms face battle with adversaries for secrets - Dayton Daily News March 24, 2017
    Dayton Daily NewsCyber war: Defense firms face battle with adversaries for secretsDayton Daily NewsThousands of defense contractors face a Pentagon directive to boost cyber security defenses by the e...and more »
  • Cyber warfare: Airmen learn cyber warfare at Wright-Patterson - Dayton Daily News March 24, 2017
    Dayton Daily NewsCyber warfare: Airmen learn cyber warfare at Wright-PattersonDayton Daily NewsGraduate student Capt. Jose Gutierrez Del Arroyo is studying the vulnerabilities of multipoint Bluetooth networks at the Center for Cyber Research at the Air ...and more »
  • State gives firm date for cyber center completion - The Augusta Chronicle March 24, 2017
    The Augusta ChronicleState gives firm date for cyber center completionThe Augusta ChronicleGeorgia Technology Authority Executive Director Calvin Rhodes said during the Augusta Metro Chamber of Commerce's Member Economic Luncheon that the $50 million Georgia Cyber Innovation and Training Center will open on that date at Augusta ...Cyber training center […]
  • Miami FOP Union President Relieved of Duty For Cyber-bullying - CBS Miami March 24, 2017
    CBS MiamiMiami FOP Union President Relieved of Duty For Cyber-bullyingCBS MiamiMIAMI (CBSMiami) – Miami's Fraternal Order of Police President Lt. Javier Ortiz has been reassigned, removed from the street and placed on desk duty without his gun. According to Miami Police, “Lt. Javier Ortiz has been relieved of duty and ...and more »
  • Intro to Cyber Insurance: 7 Questions to Ask - Dark Reading March 24, 2017
    Dark ReadingIntro to Cyber Insurance: 7 Questions to AskDark ReadingThese changes make it harder for underwriters and companies to stay abreast of the landscape. During the tricky process of buying cyber insurance, you'll ask and answer questions about your company, security posture, and other factors to determine ...
  • Hisham: Development of national cyber defence system kept secret for two years - The Star Online March 25, 2017
    The Star OnlineHisham: Development of national cyber defence system kept secret for two yearsThe Star OnlineLANGKAWI: It has been kept under wraps until now, but for the past two years, Malaysia's cyber defence system has been in development and will be fully operational by October, says Datuk Seri Hishammuddin Tun Hussein. The Defence Minister said the […]
  • US may accuse N. Korea in Bangladesh cyber heist: WSJ - CNBC March 23, 2017
    CNBCUS may accuse N. Korea in Bangladesh cyber heist: WSJCNBCU.S. prosecutors are building potential cases that would accuse North Korea of directing the theft of $81 million from Bangladesh Bank's account at the Federal Reserve Bank of New York last year, and that would charge alleged Chinese middlemen, The ...US 'may accuse North Korea in Banglad […]
  • Vermont seeking recourse in Joblink employment cyber attack - Watchdog.org March 24, 2017
    Watchdog.orgVermont seeking recourse in Joblink employment cyber attackWatchdog.orgThe incident has spread to 10 Joblink Alliance states: Alabama, Arizona, Arkansas, Delaware, Idaho, Illinois, Kansas, Maine, Oklahoma and Vermont. The governor said personal and Social Security data were involved in the cyber attack, though the extent ...and more »

ADVERTISEMENT

RSS Cyber War News (Bing)

  • Watch: This Kalki Koechlin Starrer Delivers A Powerful Message Against Cyber Bullies March 25, 2017
    With popularity of social networking websites on a rise, we have all seen significant evolution of stardom and celebrity culture. Indeed, it has never been easier for celebrities to have one on one conversations with their fans, share and advocate their ...
  • Ghanaian organisations vulnerable to cyber attacks — Study March 25, 2017
    Ghanaian organisations, including those in the financial institutions, are vulnerable to cyber attacks, Internet Solution (IS), a South African-based Telecom Service provider, has said. According to IS, the development is due to the fact that most of the ...
  • Cyber Resilience and Security for 2017: Protecting Identity and Privacy March 25, 2017
    In the Client Briefing Center at Discover London, Andrzej Kawalec discusses protecting healthcare and financial records, identity data ownership and people centric security. – hpe.com/services/security
  • ASSANGE: Cyber weapons more dangerous than nukes March 24, 2017
    On the heels of releasing thousands of documents related to the CIA’s hacking program, Wikileaks founder Julian Assange is making the case that cyber weapons are more dangerous than nuclear weapons. Speaking to Arabic-language talk show “The Fifth ...
  • Hisham: National cyber defence system ready by October March 25, 2017
    LANGKAWI: Malaysia's cyber defence system will be fully operational by October, says Datuk Seri Hishammuddin Tun Hussein (pic). The Defence Minister said the facilities and expertise required were already in place, and this had been in planning over the ...
  • Clear command and control needed in cyber-crime war March 24, 2017
    With financial cyber-crime rising at alarming rates, Treasury committee chairman Andrew Tyrie believes greater focus is urgently needed. Members of the G20 often don’t see eye-to-eye on global issues, but on the pressing concern of financial cyber-crime ...
  • Five Reasons why a Cyber National Guard is a Good Idea March 24, 2017
    Successful cyber attacks on critical infrastructure, both private and public, are becoming all too commonplace and way to successful. Moreover, the purpose of many of these attacks increasingly is strategic in nature. U.S. military planners believe that ...
  • New cyber warriors face culture shock March 24, 2017
    The U.S. military services continue to stand up cyber recruiting and training programs, but they are also confronting the need for cultural changes to integrate a new generation of cyber warriors. The Navy has added mandatory cyber courses for all ...
  • Lessons learned from the Russian hacking scandal and our ‘cyber’ election March 23, 2017
    Joel Wallenstrom is president and chief executive of Wickr, a secure communications company. Before Wickr, Joel co-founded iSEC Partners, one of the world's leading information security research teams, later acquired by NCC Group, and served as Director ...
  • Cyber war: Defense firms face battle to guard secrets March 24, 2017
    Thousands of defense contractors face a Pentagon directive to boost cyber security defenses by the end of the year, but many will likely won’t have all the safeguards in place, a cyber expert says. “We don’t anticipate many companies being close to ...

ADVERTISEMENT

RSS Cyber Tag (Icerocket)


ADVERTISEMENT

RSS Cyberwar Tag (Wordpress)

  • YOUR PERSONAL (FACE) BOOK, A PAGE IN BOOK OF FOREIGN INTELLIGENCE AGENCIES!! March 23, 2017
    ACRONYMS: FBI: FEDERAL BUREAU OF INVESTIGATION CIA: CENTRAL INTELLIGENCE OF AMERICA NSA: NATIONAL SE
    charan
  • Did the U.S. sabotage N. Korean missile launch? March 22, 2017
    (NationalSentinel) Defense: In an attempt to bolster it’s supposed “first strike”
    usafeaturesmedia
  • Cyber attacks: The New Warfare March 22, 2017
    Bank accounts are being hacked and other banking transactions and corporations do not have credible
    tinseltech
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Donald Dickson
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Wilson Behr
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Jean Relyea
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Amanda Wright
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Ella Martinez
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Aaron Stevenson
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Florence Wong
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Luis Brandy
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Margaret Johnson
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Shirley Elkin
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Lucile Hamilton
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Prince Scarbrough
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Stephen Green
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Wonda Franklin
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Angel Krawczyk
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Janie Haynes
  • Cyberwar March 20, 2017
    The New Handbook For Hacking Attacks Is Being Written By Russia View Entire Post › from DIYS http://
    Stephen Wolfram

ADVERTISEMENT


 
The Art of Attention

© 2016 PROSOCHĒ. All Rights Reserved.
Fair Use Policy ҩ Terms of Service ҩ Privacy Policy ҩ Contact

Cyber Threat Assessment

 


ADVERTISEMENT

In this New York Times bestselling investigation, Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared... [MORE]


ADVERTISEMENT

As cyber-attacks dominate front-page news, as hackers join terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prize–winning journalist Fred Kaplan... [MORE]


ADVERTISEMENT

ADVERTISEMENT

Support CSWW

Please help improve CSWW by providing us with your comments, concerns, and questions at our FEEDBACK page.

Editor, CSWW

Kurt Brindley is a retired U.S. Navy Senior Chief who specialized in the fields of tele-communications and C4SRI systems Upon retirement from the navy, he spent nearly a decade as a defense industry consultant. He now writes full time... [MORE]


ADVERTISEMENT

Now in development for film by 20th Century Fox, award-winning CyberStorm depicts, in realistic and sometimes terrifying detail, what a full scale cyber attack against present-day New York City might look like from the perspective of one family trying to survive it... [MORE]