Cyber Strategies for a World at War

OPEN SOURCE AGGREGATION & ANALYSIS

The Latest Security Firm “Tell all”

On the heels of Mandiant’s international sensation APT1: Exposing One of China’s Cyber Espionage Units, we now have the Symantec report flamboyantly entitled Stuxnet 0.5: The Missing Link.

Have we now entered an era where Security Firms need to reveal their secrets in order to stay relevant and, perhaps more importantly, attract new customers? Or is it that these Security Firms regard more openness by them as better for the overall health and security of the cyber world than keeping their secrets secret?

Read the Symantec report:
Stuxnet 0.5: The Missing Link

Advertisements

Filed under: Business, cyber security, cyber war, government, Intelligence Community, Internet, Politics, SCADA, Stuxnet, Technology, Threats, , , , , , , , , , , , , ,

Stuxnet: The New Face of 21st Century Cyber Warfare Infographic

Stuxnet

Infographic by Veracode Application Security

Filed under: cyber security, cyber war, government, Intelligence Community, Internet, Military, Stuxnet, Threats, War, , , ,

U.S. Interests Face Challenges in Europe, Intelligence Chief Says

By Jim Garamone
American Forces Press Service

WASHINGTON, Feb. 16, 2009 – (This is the third in a series on the intelligence community’s annual threat assessment.)

Russia’s perceived strengths and its policies, tensions in Eurasia, Caucasus and Central Asia, and instability in the Balkans all pose challenges to U.S. interests in Europe, the director of national intelligence said Feb. 12.

Dennis C. Blair, a retired Navy admiral, told the Senate Select Committee on Intelligence that Russia continues to rebuild its military and, as events in Georgia last year show, use those forces to impress on the world that the nation is still relevant.

“Russian challenges to US interests now spring more from Moscow’s perceived strengths than from the state weaknesses characteristic of the 1990s,” Blair said in prepared testimony.

“U.S. involvement in Iraq and Afghanistan and general anti-Americanism have created openings for Russia to build alternative arrangements to the US-led international political and economic institutional order,” he said.

Russia is attempting to increase its ability to influence events, he said, by “actively cultivating relations with regional powers, including China, Iran, and Venezuela.”

Blair said Russia’s energy policy is aimed at increasing the country’s importance on the European continent.

“Moscow also is trying to maintain control over energy supply and transportation networks to Europe to East Asia, and protect and further enhance its market share in Europe through new bilateral energy partnerships and organizing a gas cartel with other major exporters,” he said.

Read the rest of this entry »

Filed under: Analysis, Business, cyber security, cyber war, Doctrine, government, History, Intelligence Community, Internet, Life, Military, News, Policy, Politics, Strategy, Technology, Terrorism, Training, War, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Economic Crisis Overlays all Threats Facing U.S., Intel Chief Says

By Jim Garamone
American Forces Press Service

WASHINGTON, Feb. 14, 2009 – (Editor’s note: This is the first in a three-part series on the intelligence community’s annual threat assessment.)

The global economic crisis colors all other threats confronting the United States, the new director of national intelligence told the U.S. Senate Select Committee on Intelligence on Feb. 12.

Dennis C. Blair said the crisis raises the level of uncertainty in the world and places new areas of the globe in danger. Analysts are trying to understand the geopolitical implications of the crisis.

“The crisis has been ongoing for about a year, and economists are divided over whether and when we could hit bottom,” Blair said in prepared testimony. “Time is probably our greatest threat. The longer it takes for recovery to begin, the greater the likelihood of serious damage to U.S. strategic interests.”

The longer the crisis continues, the more likely the risk of instability in many areas of the world including Latin America, Central Asia and Africa. “Statistical modeling shows that economic crises increase the risk of regime-threatening instability if they persist over a one- to two-year period,” he said.

The overlay of the crisis makes known threats — such as al-Qaida — even more dangerous, he said. Extremist Muslim groups retain the greatest capability to threaten the United States and its interests.

Still, there has been progress countering al-Qaida, in particular. Blair said the indiscriminate attacks on fellow Muslims in Iraq and North Africa have caused many moderate Muslims to condemn the group.

Al-Qaida remains a threat in Afghanistan and Pakistan. The group portrays itself as aiding Taliban insurgents who are fighting Western imperialism, Blair said.

In Pakistan’s tribal areas, the terror group lost many of its leaders in 2008, he said. While this has weakened the group in the area, the group in Pakistan remains the most dangerous and continues to plot against the United States and U.S. interests from havens in the region.

In Iraq, al-Qaida has been severely weakened, but still retains the ability to launch occasional attacks, he said.

The terror group is re-emerging in Yemen. A terror cell launched an attack on the U.S. embassy in Sanaa in September and has launched 19 attacks on Western targets in the country in 2008.

Blair forecasts more al-Qaida activity in East Africa, specifically in Kenya and Somalia.

Al-Qaida cells may grow in the United States, Blair said. “We remain concerned about the potential for homegrown extremists inspired by the al-Qaida militant ideology to plan attacks in the United States, Europe and elsewhere without operational direction from the group itself,” he said. U.S. agencies will focus on identifying ties between U.S.-based individuals and extremist networks overseas.

There are terror groups beyond al-Qaida. Hezbollah in Lebanon remains a dangerous terrorist foe, Blair said. The group could attack U.S. targets if it perceives the United States is threatening its survival, leadership or infrastructure. Due to the terror group’s sponsorship by Iran, should Hezbollah’s leaders think the United States is a threat to its benefactor, the terror group may launch attacks on U.S. interests in the Middle East.

Iran is at the heart of what Blair calls an “arc of instability” running from the Middle East to South Asia. Blair said Iran’s goal to be a regional power drives its efforts in Iraq, Lebanon, Syria, North Africa, the Persian Gulf and beyond. It also is at the heart of the Iranian drive to develop nuclear weapons, he said.

Filed under: Analysis, Business, cyber security, cyber war, Doctrine, government, History, Intelligence Community, Internet, Life, Military, News, Policy, Strategy, Technology, Terrorism, Training, War, , , , , , , , , , , , , , , ,

Intel director: Iran, cyber threats biggest worry

By Pamela Hess
January 16, 2009
Associated Press

WASHINGTON (AP) — Iran producing a nuclear weapon and a cyber attack on critical government or private computer networks top the list of concerns nagging at National Intelligence Director Michael McConnell as he prepares to leave office.

McConnell told reporters in an interview Friday that U.S. intelligence agencies do not have evidence to prove Iran has decided to build a nuclear warhead, but he shares the alarm of outgoing CIA Director Michael Hayden that the possibility may come soon. He said Tehran is two to three years away from having a long-range missile that could reach Europe, and continues to produce low-enriched uranium, the raw ingredient for the fissile material needed for a warhead.

“I’m very concerned Iran will continue down a path that will result in a nuclear weapon,” he said.

He is especially worried about the effect it would have in the Middle East, either kicking off a regional arms race or a war.

McConnell said that protection of U.S. computer networks — government, military and commercial — is another major worry.

“Cyber security is the soft underbelly of this country,” he said.

His fear is less that information would be stolen off the networks by hackers or spies but that they would destroy it outright.

“It could have a debilitating effect on the country,” he said.

The federal government is still building its cyber protection plan, with the Homeland Security Department nominally in charge. But McConnell said the spy agencies, especially the National Security Agency, have to play a key role in protecting domestic computer networks. That prospect alarms privacy and civil liberty advocacy groups, who oppose giving agencies meant to spy on foreign powers access to private citizens’ data and activities on the Internet.

Continue reading…

Filed under: cyber war, Intelligence Community, News, , , , , , , , , , , , , , ,

Cyberwar Emerges Amid The Israeli-Palestinian Conflict in Gaza

By Mahran Amona
January 4, 2009
Aladdin

Since the beginning of the Israeli military campaign in the Gaza Strip, thousands of Israeli websites have come under cyber-attacks carried out by hacking groups operating out of Morocco, Lebanon, Turkey, and Iran.

A Moroccan Islamic group hacked into the registration system server of domainthenet.com on last Friday, and the main pages of more than 300 Israeli Web sites were defaced. The group hijacked the domains of major Israeli websites including Israeli Bank Discount, a website for weather forecast and the Israeli Ynet News, a popular Israeli news website. Visitors of the hijacked domains were rerouted to websites featuring images of the casualties of the ongoing Israeli offensive against Gaza, and with anti-Israeli and anti-U.S. messages.

Ynet reported that the hackers obtained a password which granted them access to the server, “which updates and ‘translates’ the websites’ IP addresses into a Domain Name Service; and change the IP’s numeral values, effectively rerouting users away from the original websites”. Ynet added also that the hackers did not hack into the actual websites but redirected the users to a “hostile” website, while other hackers managed to access original websites.

Continue reading…

Filed under: cyber war, News, War, , , , , , , , , , , , ,

Global Trends

"The nature of conflict is changing. The risk of conflict will increase due to diverging interests among major powers, an expanding terror threat, continued instability in weak states, and the spread of lethal, disruptive technologies. Disrupting societies will become more common, with long-range precision weapons, cyber, and robotic systems to target infrastructure from afar, and more accessible technology to create weapons of mass destruction."
 
Global Trends and Key Implications Through 2035 from the National Intelligence Council Quadrennial Report GLOBAL TRENDS: The Paradox of Power

A World at War

The World is at War. It is a world war that is being fought right now, in real time, virtually everywhere on the planet. It is a world war that is, perhaps, more encompassing and global in nature than any other world war in history because, not only is it being fought by nations and their governments, it is also being fought by non-state actors such as terrorists, organized crime, unorganized crime, and many other known and unknown entities. It is a total world war being fought every day on the hidden and dark battle fields of the cyber domain. It is a war that, according to some intelligence estimates, has the potential to be as nearly as serious and as deadly as a nuclear war... [MORE]

 


 


ADVERTISEMENT

Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real... [MORE]

RSS ODNI News

  • An error has occurred; the feed is probably down. Try again later.

ADVERTISEMENT

Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity... [MORE]


ADVERTISEMENT

Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications... [MORE]

RSS NSA News


ADVERTISEMENT

“When it comes to what government and business are doing together and separately with personal data scooped up from the ether, Mr. Schneier is as knowledgeable as it gets…. Mr. Schneier’s use of concrete examples of bad behavior with data will make even skeptics queasy and potentially push the already paranoid over the edge.” (Jonathan A. Knee - New York Times)... [MORE]

RSS CIA News


ADVERTISEMENT

The Blue Team Handbook is a zero fluff reference guide for cyber security incident responders and InfoSec pros alike. The BTHb includes essential information in a condensed handbook format about the incident response process, how attackers work, common tools, a methodology for network analysis developed over 12 years, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, and numerous other topics... [MORE]

RSS Defense Advanced Research Projects Agency (DARPA)

  • 2018/10/12 DARPA Seeks Proposals for Third OFFSET Swarm Sprint, Awards Contracts for Second October 12, 2018
    DARPA's OFFensive Swarm-Enabled Tactics (OFFSET) envisions swarms of 250 collaborative autonomous systems providing critical insights to small ground military units in urban areas where vertical structures, tight spaces, and limited sight lines constrain communications and mobility. DARPA is soliciting proposals for its third swarm sprint, which will fo […]
  • 2018/10/11 Teaching Machines Common Sense Reasoning October 11, 2018
    Today's machine learning systems are more advanced than ever, capable of automating increasingly complex tasks and serving as a critical tool for human operators. Despite recent advances, however, a critical component of Artificial Intelligence (AI) remains just out of reach – machine common sense. Defined as "the basic ability to perceive, underst […]
  • 2018/10/04 Discovering New Molecules for Military Applications October 4, 2018
    The efficient discovery and production of new molecules is essential for a range of military capabilities-from developing safe chemical warfare agent simulants and medicines to counter emerging threats, to coatings, dyes, and specialty fuels for advanced performance. Current approaches to develop molecules for specific applications, however, are intuition-dr […]
  • 2018/09/26 DARPA Selects Teams to Explore Underground Domain in Subterranean Challenge September 26, 2018
    The world beneath us leaves much to be discovered. These uncharted environments pose immense challenges to military and emergency personnel as they respond to threats from adversaries or natural disasters. DARPA has selected nine teams to compete in the Subterranean (SubT) Challenge – seven in the physical Systems track and two in the Virtual track – to deve […]
  • 2018/09/07 DARPA Announces $2 Billion Campaign to Develop Next Wave of AI Technologies September 7, 2018
    Over its 60-year history, DARPA has played a leading role in the creation and advancement of artificial intelligence (AI) technologies that have produced game-changing capabilities for the Department of Defense. Starting in the 1960s, DARPA research shaped the first wave of AI technologies, which focused on handcrafted knowledge, or rule-based systems capabl […]

ADVERTISEMENT

RSS Cyber News (Google)

  • This RSS feed URL is deprecated October 21, 2018
    This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news
  • Cyber Saturday—Facebook's 'War Room' Is a Marketing Ploy - Fortune October 20, 2018
    FortuneCyber Saturday—Facebook's 'War Room' Is a Marketing PloyFortuneWelcome to the Cyber Saturday edition of Data Sheet, Fortune's daily tech newsletter. Fortune reporter Robert Hackett here. You may reach Robert Hackett via Twitter, Cryptocat, Jabber (see OTR fingerprint on my about.me), PGP encrypted email (see ...and more »
  • IUP schedules cyber security event - Indiana Gazette October 20, 2018
    Indiana GazetteIUP schedules cyber security eventIndiana GazetteIndiana University of Pennsylvania's Institute for Cyber Security, in collaboration with the Information Technology Support Center, will present a number of speakers for the 11th annual Cyber Security/Information Assurance Day on Oct. 30. This annual ...C5 Capital to Sign Landmark Atlantic […]
  • Muscatine cyber-attack targets government financial server - WQAD.com October 19, 2018
    WQAD.comMuscatine cyber-attack targets government financial serverWQAD.comMUSCATINE, Iowa — Several government servers were attacked early Wednesday morning including a server used for the city's finances. City officials sent out a press release on Oct. 18, which stated several servers were attacked by ransomware at 1 a.m., ...and more »
  • Trump Claims China Election Meddling. Cyber Firms Don't See It - Fortune October 20, 2018
    FortuneTrump Claims China Election Meddling. Cyber Firms Don't See ItFortunePresident Donald Trump has said China is interfering with the November midterm elections, but the findings of top cybersecurity firms are casting doubt on his claims. “We haven't observed any evidence of Chinese targeting the midterms or anything that ...and more »
  • Protect yourself from cyber crime with strong passwords - Tyler Morning Telegraph October 20, 2018
    Tyler Morning TelegraphProtect yourself from cyber crime with strong passwordsTyler Morning TelegraphAs we approach the end of National Cybersecurity Awareness Month, the Better Business Bureau reminds consumers that a strong password is just one way to keep cyber criminals at bay. If it has been some time since you reviewed the passwords to your ...
  • Reducing Cyber Vulnerabilities in Weapons Systems: A New Priority - Lawfare (blog) October 19, 2018
    Reducing Cyber Vulnerabilities in Weapons Systems: A New PriorityLawfare (blog)Two years ago, in the 2016 National Defense Authorization Act, Congress called on the Defense Department to evaluate the extent of cyber vulnerabilities in its weapons systems by 2019. While the Pentagon report has yet to be released, a scathing report ...and more »
  • GAO Audit Uncovers Cyber Vulnerabilities in Pentagon Weapons Systems - CPO Magazine October 20, 2018
    CPO MagazineGAO Audit Uncovers Cyber Vulnerabilities in Pentagon Weapons SystemsCPO MagazineFederal government security audits carried out between fiscal years 2012-2017 have uncovered significant cyber vulnerabilities in the U.S. Department of Defense's top weapons systems. In fact, just about every new weapons system developed in recent ...and more » […]
  • A Chinese Perspective on the Pentagon's Cyber Strategy: From 'Active Cyber Defense' to 'Defending Forward' - Lawfare (blog) October 19, 2018
    Lawfare (blog)A Chinese Perspective on the Pentagon's Cyber Strategy: From 'Active Cyber Defense' to 'Defending Forward'Lawfare (blog)The 2018 Department of Defense Cyber Strategy is the third report of its kind: The document, a summary of which was issued on Sept. 18, follows the Department of Defense Strategy for Operating in Cyber […]
  • EU leaders vow tough action on cyber attacks - Phys.Org October 18, 2018
    Phys.OrgEU leaders vow tough action on cyber attacksPhys.OrgWith concerns growing about the malign cyber activities of several countries around the world, notably Russia, the bloc's leaders called for work to begin to set up sanctions to punish hackers. The decision at an EU summit in Brussels comes after eight ...Theresa May to urge EU leaders to take […]
  • 'I'll be the last person he ever sees.' Man sentenced for cyber threats to ex-girlfriend and others - Lexington Herald Leader October 20, 2018
    Lexington Herald Leader'I'll be the last person he ever sees.' Man sentenced for cyber threats to ex-girlfriend and othersLexington Herald LeaderA California man was sentenced Friday to two years in federal prison for sending cyber threats to his ex-girlfriend, her new boyfriend, and her father. Jesse L. Kessler, 35, pleaded guilty in July to […]

ADVERTISEMENT

RSS Cyber War News (Bing)


ADVERTISEMENT

RSS Cyber Tag (Icerocket)

  • 5 Ideas to Create Holiday PR Buzz October 20, 2018
    As we get deeper into the holidays, we in public relations may be in the midst of trying to secure related coverage and create holiday PR buzz for our clients.…Read More >>>
    Meltwater
  • The Rise of Influencer Fraud October 14, 2018
    Weeding out Fake InfluencersTrack Community GrowthFollowers is a metric that brands flock to when choosing influencers. The more followers, the more they pay. Fake influencers, therefore, purchase followers. By tracking…Read More >>>
    Meltwater
  • Infographic: PR and Marketing Reporting—Keys to Capturing KPIs October 13, 2018
    As PR and marketing reporting becomes essential in the modern comms department and folks move towards quantifying their efforts, wading through different aspects of reporting can get confusing fast. This…Read More >>>
    Meltwater
  • Brand Bravery: Thoughts on PR Leadership from #PRSAICON October 11, 2018
    From the conference’s very first remarks on the importance of ethics, diversity, and inclusion, PRSA ICON 2018 focused on one overarching theme: PR leadership. As Del Galloway, APR, Fellow PRSA,…Read More >>>
    newscred
  • How 5 Fashion Brands Use Social Media October 11, 2018
    In this day and age, it’s hard to remember a time when the fashion world didn't use social media. From live broadcasts of the runway shows at New York Fashion Week on…Read More >>>
    Meltwater

ADVERTISEMENT

RSS Cyberwar Tag (Wordpress)


ADVERTISEMENT


 
The Art of Attention

© 2016 PROSOCHĒ. All Rights Reserved.
Fair Use Policy ҩ Terms of Service ҩ Privacy Policy ҩ Contact

Cyber Threat Assessment

 


ADVERTISEMENT

In this New York Times bestselling investigation, Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared... [MORE]


ADVERTISEMENT

As cyber-attacks dominate front-page news, as hackers join terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prize–winning journalist Fred Kaplan... [MORE]


ADVERTISEMENT

ADVERTISEMENT

Support CSWW

Please help improve CSWW by providing us with your comments, concerns, and questions at our FEEDBACK page.

Editor, CSWW

Kurt Brindley is a retired U.S. Navy Senior Chief who specialized in the fields of tele-communications and C4SRI systems Upon retirement from the navy, he spent nearly a decade as a defense industry consultant. He now writes full time... [MORE]


ADVERTISEMENT

Now in development for film by 20th Century Fox, award-winning CyberStorm depicts, in realistic and sometimes terrifying detail, what a full scale cyber attack against present-day New York City might look like from the perspective of one family trying to survive it... [MORE]