Page 8 of 8 FirstFirst ... 678
Results 141 to 151 of 151

Thread: USAF Cyber Command (catch all)

  1. #141
    Council Member AdamG's Avatar
    Join Date
    Dec 2005
    Location
    Hiding from the Dreaded Burrito Gang
    Posts
    3,096

    Default

    Nasdaq OMX, the global exchange operator, said it had been targeted by hackers who breached its system but did not compromise its trading operations.

    The attack is the most recent in a string of worrying events, including attacks on Europe’s carbon trading market, but early evidence suggested that it was possibly related to corporate espionage rather than a cyberattack on the US financial market.
    http://www.ft.comLink provided in next post
    Last edited by davidbfpo; 02-07-2011 at 10:12 PM. Reason: Update on link after below post
    A scrimmage in a Border Station
    A canter down some dark defile
    Two thousand pounds of education
    Drops to a ten-rupee jezail


    http://i.imgur.com/IPT1uLH.jpg

  2. #142
    Council Member
    Join Date
    Aug 2010
    Posts
    98

    Default

    Quote Originally Posted by AdamG View Post
    Not in that url, but rather since, NASDAQ has stated that there was malware planted:
    http://www.theregister.co.uk/2011/02...alware_breach/

    We have a very long way to go to step up our game. From a national security perspective, this is made of fail. The sad thing is, this is how we do things. These are the results that are generated by how we do things. We need to change our culture, and change our strategies.
    Last edited by davidbfpo; 02-07-2011 at 10:13 PM.

  3. #143
    Registered User
    Join Date
    Jan 2011
    Posts
    4

    Default House Hearing -- role of DoD in cyber

    http://armedservices.house.gov/index...2-cb10ab20e579

    I find it interesting that the witness panel only consists of industry and educational leaders. I would think that some other gov't reps would be there as well -- whether from DoD, DHS, FBI, etc. Granted, GEN Alexander has spent quite a bit of time on the Hill as part of his own confirmation hearings, so perhaps this is their attempt to get non-DoD perspectives.

    I also wonder if a better question to be asked at this point is "what should be the Government's role" as opposed to DoD's role. National cyberspace defense will require a whole of gov't approach.

  4. #144
    Registered User
    Join Date
    Jan 2011
    Posts
    4

    Default

    Quote Originally Posted by Allen Ford View Post
    RMILLS:
    This is precisely why I think a successful attack on our "Commercial" versus USG Critical Infrastructure would incite our nation's demand for either a military or USG service dedicated to this domain. WWII begot the Air Force, Eagle Claw begot SOCOM, 9/11 begot the DHS etc.
    I suspect you are right, Allen. In my dream world, Governments would recognize risks and take action beforehand to mitigate them (e.g., strategy=ends, ways and means). Instead, we wait until something bad happens, point fingers, commission studies to look at the problem, create new organizations, and spend gobs of money after the fact (which is the antithesis of strategy).

  5. #145
    Council Member Brett Patron's Avatar
    Join Date
    Dec 2009
    Location
    Yorktown, Virginia
    Posts
    45

    Lightbulb

    Quote Originally Posted by rmills View Post

    I also wonder if a better question to be asked at this point is "what should be the Government's role" as opposed to DoD's role. National cyberspace defense will require a whole of gov't approach.
    That, sir, is the spot-on question. Especially so, considering the listed slate of speakers. Curious how they are properly credentialed to answer so specific a question (like "DOD").

    Yes, with a broad "Government" role defined, DODs role would properly derive.

    I'd offer that it will require far more than merely an "approach". Rather, it will require a truly "all-hands-on-deck" orchestrated way of conducting business.

  6. #146
    Council Member
    Join Date
    Aug 2010
    Posts
    98

    Default

    Quote Originally Posted by Brett Patron View Post
    I'd offer that it will require far more than merely an "approach". Rather, it will require a truly "all-hands-on-deck" orchestrated way of conducting business.
    I agree, but I'm not sure how to deal with some of the witless & tiresome turf battles that usually go with those types of efforts. We can't afford them anymore, and they're one aspect of dealing with these problems that's been pretty persistently an issue. The only thing I can come up with to deal with that aspect of the 'whole government' problem is to change the ground rules some to bias decisions in favor of provable examples of capacity for creating results with these problems. I know that type of approach would cut out some of the claims of being able to do everything while producing nothing, as well as probably cause some pain as ambitions & sugarplum visions hit the hard wall of 'what are your past results?'.

    This is a realm where people respect the doing, not the fancy smack talking. We've had over a decade of a lot of talking without enough doing, without the results we need, and that has to change.

  7. #147
    Council Member AdamG's Avatar
    Join Date
    Dec 2005
    Location
    Hiding from the Dreaded Burrito Gang
    Posts
    3,096

    Default

    http://news.yahoo.com/s/ap/20110210/...s_cyberattacks

    BEIJING – Hackers operating from China stole sensitive information from Western oil companies, a U.S. security firm reported Thursday, adding to complaints about pervasive Internet crime traced to the country.
    The report by McAfee Inc. did not identify the companies but said the "coordinated, covert and targeted" attacks began in November 2009 and targeted computers of oil and gas companies in the United States, Taiwan, Greece and Kazakhstan. It said the attackers stole information on operations, bidding for oil fields and financing.
    "We have identified the tools, techniques, and network activities used in these continuing attacks — which we have dubbed Night Dragon — as originating primarily in China," said the report.
    A scrimmage in a Border Station
    A canter down some dark defile
    Two thousand pounds of education
    Drops to a ten-rupee jezail


    http://i.imgur.com/IPT1uLH.jpg

  8. #148
    Council Member
    Join Date
    Aug 2010
    Posts
    98

    Default

    Quote Originally Posted by AdamG quoted View Post
    "We have identified the tools, techniques, and network activities used in these continuing attacks — which we have dubbed Night Dragon — as originating primarily in China," said the report.
    Things are as usual getting fuzzy afterward though... You can see from the following urls there's spin & weaseling going on. Wen Weiping doesn't bother to address the issue of what types of malware were used, and that they were of Chinese origin, & popular there. That's obviously rather a bit too convenient.

    http://english.cri.cn/6909/2011/02/12/1461s620380.htm

    http://www.ibtimes.com/articles/1118...interllige.htm

  9. #149
    Council Member AdamG's Avatar
    Join Date
    Dec 2005
    Location
    Hiding from the Dreaded Burrito Gang
    Posts
    3,096

    Default

    WASHINGTON (AP) — The Pentagon's Cyber Command has shut down Defense Department workers' access to popular streaming video websites including YouTube, Amazon, and Googlevideo. Officials say the tremendous demand to see the Japan earthquake is eating up bandwidth already weakened by Internet problems in that part of the world.
    http://hosted2.ap.org/apdefault/5482...terstitialskip

    So, a natural disaster would be a good time to launch a sneak attack.
    A scrimmage in a Border Station
    A canter down some dark defile
    Two thousand pounds of education
    Drops to a ten-rupee jezail


    http://i.imgur.com/IPT1uLH.jpg

  10. #150
    Council Member Stan's Avatar
    Join Date
    Dec 2006
    Location
    Estonia
    Posts
    3,817

    Default Germany's Cyber-War Intensifies

    The threat of cyber-war--and of a catastrophic hacker attack to Germany's industrial or military infrastructure--is spurring the creation of two new high-level government organizations.

    The Federal Republic of Germany has just released a comprehensive cyber-security strategy [PDF] that will create two high-level government agencies devoted exclusively to cyber-war. Germany's move to mobilize for cyber-war is one of the boldest Internet decisions made by a European power in years.
    If you want to blend in, take the bus

  11. #151
    Council Member davidbfpo's Avatar
    Join Date
    Mar 2006
    Location
    UK
    Posts
    13,150

    Default KoW reviews FRG cyber strategy

    Stan,

    KoW has comprehensively reviewed the proposal:http://kingsofwar.org.uk/2011/03/ger...rity-strategy/
    davidbfpo

Similar Threads

  1. Leadership of Cyber Warriors: Enduring Principles and New Directions
    By SWJ Blog in forum Media, Information & Cyber Warriors
    Replies: 0
    Last Post: 07-11-2011, 02:41 PM
  2. Replies: 51
    Last Post: 01-08-2011, 07:42 PM
  3. Information Operations
    By SWJED in forum Media, Information & Cyber Warriors
    Replies: 152
    Last Post: 08-28-2009, 09:47 AM
  4. Question 5: Cyber space (oh you know I had to ask at least one of these)
    By selil in forum TRADOC Senior Leaders Conference
    Replies: 7
    Last Post: 08-14-2009, 03:27 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •