• CybersecurityIf two countries waged cyber war on each another, here’s what to expect

    By Bill Buchanan

    Imagine you woke up to discover a massive cyberattack on your country. All government data has been destroyed, taking out healthcare records, birth certificates, social care records and so much more. The transport system isn’t working, traffic lights are blank, immigration is in chaos, and all tax records have disappeared. When countries declare war on one another in future, this sort of disaster might be the opportunity the enemy is looking for. Given the current level of international tension and the potential damage from a major cyberattack, this is an area that all countries need to take very seriously. Better to do it now rather than waiting until one country pays the price. For better and worse, the world has never been so connected.

  • CybersecurityDominating cyberspace through advanced network security, capabilities

    As the cyber domain continues to expand, the U.S. military and government have begun to place greater emphasis on cyber operations. As cyber operations have increased, the need for enhanced monitoring, security, and access technologies to promote advanced cyberspace operations have increased as well. The Defense Strategies Institute (DSI) has designed a forum in order to promote conversation that seeks to advance network security and cyber capabilities.

  • view counter
  • CybersecurityCyber Guard 2016 aims to manage complexity in invisible domain

    Between one million and ten million U.S. homes and businesses are without power. An oil spill from a near-shore refinery is gushing into the waters off Texas and Louisiana. The port of Los Angeles is shut down due to a network outage. Visitors to exercise Cyber Guard 2016 here viewed mock newscasts detailing these scenarios as examples of the likely effects of a massive cyberattack.

  • Cyber terrorismTerrorists gaining cyber capability to bring major cities to a standstill: U.K. intelligence chief

    Robert Hannigan, the director of GCHQ, the British equivalent of the U.S. NSA, has warned that terrorists and rogue states are gaining the technical capability to bring a major city to a standstill with the click of a button. He said that the risk to cities like London would significantly increase as more physical objects – cars, household appliances — are connected online in what is called the Internet of Things.

  • CybersecurityHow Israel became a cybersecurity superpower

    Israel’s rise as one of the world’s leaders in cybersecurity has been boosted by cooperation between the military, government, education, and private sectors, a level of partnership unmatched in the Western world. Israel’s cybersecurity sector is now worth half a billion dollars annually — second only to the United States.

  • Cyber warfareAmerica is ‘dropping cyberbombs’ – but how do they work?

    By Richard Forno and Anupam Joshi

    Recently, United States Deputy Defense Secretary Robert Work publicly confirmed that the Pentagon’s Cyber Command was “dropping cyberbombs,” taking its ongoing battle against the Islamic State group into the online world. Other American officials, including President Barack Obama, have discussed offensive cyber activities, too. Cyber weapons and the policies governing their use likely will remain shrouded in secrecy. However, the recent public mentions of cyber warfare by national leaders suggest that these capabilities are, and will remain, prominent and evolving ways to support intelligence and military operations when needed.

  • Cyber warfarePentagon “dropping cyberbombs” on ISIS

    Deputy Secretary of Defense Robert Work has said that the U.S. military is “dropping cyberbombs” on ISIS. Earlier this month, Defense Secretary Ashton Carter announced that the U.S. Cyber Command had been given its “first wartime assignment” – attacking and disrupting ISIS cyber infrastructure. in the last few months, the Pentagon has allowed more information to be published about the U.S. military’s cyberwar against ISIS. Work, describing the Cyber Command’s operations at a news conference, said: “We are dropping cyberbombs. We have never done that before.”

  • Cyber warfareThe next Cold War has already begun – in cyberspace

    By Conor Deane-McKenna

    The world is fighting a hidden war thanks to a massive shift in the technologies countries can use to attack each other. Much like the Cold War, the conflict is being fought indirectly rather than through open declarations of hostility. It has so far been fought without casualties but has the potential to cause suffering similar to that of any bomb blast. It is the Cyber War.

  • CybersecurityNations ranked on vulnerability to cyberattacks

    Damaging cyberattacks on a global scale continue to surface every day. Some nations are better prepared than others to deal with online threats from criminals, terrorists, and rogue nations. Data-mining experts ranked the vulnerability of forty-four nations to cyberattacks. The United States ranked 11th safest, while several Scandinavian countries (Denmark, Norway, and Finland) ranked the safest.

  • GridRussian govt. behind attack on Ukraine power grid: U.S. officials

    Obama officials said that Russian hackers were behind a December 2015 cyberattack on Ukraine’s power grid. The attack caused power outages and blackouts in 103 cities and towns across Ukraine. Elizabeth Sherwood-Randall, deputy Energy Secretary, made the comments to a gathering of electric power grid industry executives.

  • CounterterrorismAdministration tries to harness Silicon Valley’s talent for fight against ISIS

    Senior administration intelligence officials are meeting today (Friday) with Silicon Valley’s major technology firms — companies including Facebook, Twitter, Apple, Microsoft, YouTube , LinkedIn, Dropbox, and others — in an effort to recruit them and their technological know-how in the fight against radicalization and terrorism.

  • Infrastructure protectionIranian hackers attacked New York dam

    In 2013, Iranian government hackers infiltrated the control system of Bowman Avenue Dam in Rye, New York, located twenty-five miles from New York City. Using a cellular modem, the hackers could have released larger volumes of upstream water without warning. As dams go, the Rye dam is small at about 20ft tall. There was some confusion initially, as DHS and DOE thought a similarly named dam in Oregon — the Arthur R. Bowman Dam – was the one hacked. The Oregon dam, at 245 feet, is much bigger, and hacking its control systems could have had much more serious consequences.

  • CybersecuritySafer cyberspace through experimental cybersecurity research

    How do cybersecurity experts discover how properly to defend a system or build a network which is secure? As in other domains of science, this process involves hypothesis, experimentation, and analysis — or at least it should. In reality, cybersecurity research can happen in an ad hoc fashion, often in crisis mode in the wake of an attack. A group of researchers has imagined a different approach, one in which experts can test their theories and peers can review their work in realistic but contained environments — not unlike the laboratories found in other fields of science. The researchers issued a report calling for a new generation of experimental cybersecurity research.

  • CybersecurityFollowing indictments, China’s military reduces its commercial cybeespionage against American companies

    The People’s Liberation Army (PLA) has reduced its cyberespionage activity targeting American companies since five PLA officers were indicted by the Department of Justice in May 2014. “The indictments had an amazing effect in China, more than we could have hoped for,” said one expert. In April, Obama signed an executive order calling for impose economic sanctions on individuals and entities that take part in or benefit from illicit cyber-activities such as commercial espionage. “If the indictments had the effect of getting the PLA to scale down, then sanctions likely will have a wider effect on other Chinese state-sponsored groups,” says another expert.

  • Data securityDHS runs many unsecured databases: IG

    DHS Inspector General found that DHS is running dozens of unpatched databases, some of which are rated “secret” and even “top secret.” An audit of the department’s IT infrastructure has found large security gaps, including the fact that 136 systems had expired “authorities to operate” – that is, no one was in charge of keeping them updated. Of the 136, 17 were classified as “secret” or “top secret.”