• Israel’s navy protects more than the country’s coast

    Cyber warriors working for Israel’s navy are constantly engaged in protecting against intense cyber intrusions which targets the country’s digital infrastructure, according to a senior navy source. “The navy understands that cyber conflicts are wars in their own right, beyond conventional conflicts that we have grown accustomed to. In cyber war, one can engage without firing a single bullet. Attacks can come before a conventional war. There are no official cease-fires. It goes on all of the time,” the source said.

  • U.S. adopts a more assertive cyber defense posture

    Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.

  • Cybersecurity firms hire former military, intelligence cyber experts

    Over the past two years, U.S. cybersecurity firms have brought in several former military and intelligence community computer experts to help combat hackers targeting the U.S. private sector. For the new private sector employees, the wages are higher and opportunities are endless. Hundreds of ex-government cybersecurity workers represent the competitive advantage of a cybersecurity services industry expected to bring in more than $48 billion in revenue next year, up 41 percent from 2012. “The people coming out of the military and the intelligence community are really, really good,” says a cyber startup founder. “They know the attackers. They know how they work.”

  • Cyber espionage campaign, likely sponsored by China, targets Asian countries: FireEye

    FireEye has released a report which provides intelligence on the operations of APT 30, an advanced persistent threat (APT) group most likely sponsored by the Chinese government. APT 30 has been conducting cyber espionage since at least 2005, making it one of the longest operating APT groups that FireEye tracks. APT 30 targets governments, journalists, and commercial entities across South East Asia and India.

  • China increasing significantly funding for cyber warfare capabilities

    U.S. intelligence officials have warned that China is increasing significantly its investment in cyber warfare programs in an attempt to compete with the U.S. military. The new spending initiative is part of a long-term, large-scale resource reallocation strategy aiming to make China one of the most capable cyber warfare nations. The increases are an effort by the Chinese to improve their cyber capabilities following the realization that they are lagging behind U.S. programs in significant ways.

  • Hackers with “Anonymous” threaten to “erase Israel from cyberspace”

    In a new video posted online, hackers operating under the “Anonymous” flag have threatened to erase Israel from cyberspace. Citing reasons which include “continuous aggression, bombing, killing, and kidnapping of the Palestinian people,” the hackers vowed to unleash cyber “squadrons” that will launch a “cyber holocaust” on 7 April, a little more than a week before Israel’s 16 April Holocaust Remembrance day, known as Yom HaShoah.

  • NSA’s recruitment effort challenged by Snowden leaks, private sector competition

    The NSA employs roughly 35,000 people nationwide and anticipates on recruiting at least 1,000 workers each year. For 2015, the agency needs to find 1,600 recruits, hundreds of whom must come from highly specialized fields like computer science and mathematics. The agency has been successful so far, but still faces recruitment challenges in the aftermath of the Edward Snowden revelations and competition from private sector firms who offer recruits much higher salaries.

  • Cyber researchers need to predict, not merely respond to, cyberattacks: U.S. intelligence

    The Office of the Director of National Intelligence wants cybersecurity researchers to predict cyberattacks rather than just respond to them, according to the agency’s Intelligence Advanced Research Projects Activity (IARPA) program. Current cyber defense methods such as signature-based detection “haven’t adequately enabled cybersecurity practitioners to get ahead of these threats,” said Robert Rahmer, who leads IARPA’s Cyber-attack Automated Unconventional Sensor Environment (CAUSE) program. “So this has led to an industry that’s really invested heavily in analyzing the effects or symptoms of cyberattacks instead of analyzing [and] mitigating the cause.”

  • Bio-inspired analysis helps in recognizing, characterizing evolving cyberthreats

    Our reliance on cyber systems permeates virtually every aspect of national infrastructure. The volume of network traffic data generated has outpaced our ability effectively analyze it fast enough to prevent many forms of network-based attacks. In most cases new forms of attacks cannot be detected with current methods. The MLSTONES methodology leverages technologies and methods from biology and DNA research — LINEBACkER applies the MLSTONES methodology to the problem of discovering malicious sequences of traffic in computer networks. LINEBACkER allows cyber security analysts quickly to discover and analyze behaviors of interest in network traffic to enhance situational awareness, enable timely responses, and facilitate rapid forensic and attribution analysis.

  • North Korea’s cyber warriors target Western critical infrastructure

    North Korea has a team of roughly 3,000 cyber soldiers dedicated to launching attacks at Western interests in the private and government sector, according to Kim Heung-gwang, a former professor at North Korea’s Hamhung University of Computer Technology, a key military training facility. Heung-gwang, urging Western governments to do more to counter North Korean hacking, said the country’s hackers are targeting Western nuclear power plants, transportation networks, and electrical utilities.

  • Army seeks public collaboration in developing security software

    Researchers working on a new cybersecurity project at the Army Research Lab (ARL) in Adelphi, Maryland have made available their project to anyone on the Internet in order to prompt professional collaboration and help. This atypical development tactic is intended to kick-start public collaboration on a software tool intended to aid soldiers in understanding where hackers might be targeting military systems.

  • Texas lawmakers on the Hill lead drive for cybersecurity legislation

    After recent high-profile cyberattacks on the U.S. private sector, Congress has been tasked with passing legislation that will address cybersecurity concerns including how the private sector should report data breaches to regulators and how the U.S. government should respond to state-sponsored cyberattacks. Three Texas Republican lawmakers, through leadership roles in committees and subcommittees, have been charged with exploring solutions to those concerns.

  • The CIA bolsters cyber operations

    The Central Intelligence Agency (CIA) is planning to join the growing list of U.S. intelligence and security agencies which have redefined their missions to include cyber operations — in the CIA’s case, cyber espionage. Current and former agency officials say the new effort will be part of the broad restructuring of an intelligence service long defined by its human spy work. The shift also reflects the increasing role cyber plays in intelligence gathering, with allies and adversaries relying on smartphones, social media, and other technologies to communicate.

  • Obama’s cybersecurity initiative: a start but businesses – and individuals – need to do more

    The linchpin of President Obama’s recently launched cybersecurity initiative is to encourage the private sector to share information to better defend against cyberattacks. Yet U.S. companies have historically been wary of openly talking about their cybersecurity efforts with competitors and with government — for good reason. Many businesses fear that sharing threat-related information could expose them to liability and litigation, undermine shareholder or consumer confidence, or introduce the potential for leaks of proprietary information. For some companies, Edward Snowden’s revelations of sweeping government surveillance programs have reinforced the impulse to hold corporate cards close to the vest. Yet on the heels of a deluge of high-profile cyberattacks and breaches against numerous U.S. companies, we may finally have reached a tipping point, where potential harm to reputation and revenue now outweighs the downside of disclosure from a corporate perspective. Obama’s executive order is thus a spur to get the ball rolling but, frankly, there is a limit to what government alone can (and should) do in this area. Changes in attitudes and behaviors are needed across the board, right down to families and individuals.

  • New document details U.S.-Iran cyber tit-for-tat

    Just as U.S. Secretary of State John Kerry and his Iranian counterpart discuss plans to ensure Iran does not weaponized its nuclear program, a newly disclosed National Security Agency (NSA) document details the intensifications of cyber skirmishes between the two countries. While the document does not describe the specific targets in Iran, it acknowledges, for the first time, that the NSA’s attacks on Iran’s nuclear program, a George W. Bush administration project, initiated the cycle of retaliation and escalation of the U.S.-Iran cyber conflict.