Posts Tagged cyber war

Preparing for Cyber War, Without a Map

From: MIT

The U.S. government has pledged to retaliate quickly if power grids or other critical elements of infrastructure are hacked—but the technology needed to do so is lacking.

more

, ,

No Comments

Russian Hackers Attack Illinois Utility

From: PopSci

The Illinois Statewide Terrorism and Intelligence Center released a “Public Water District Cyber Intrusion” report on November 10 that indicates that hackers may have had access to the system since September. Hackers using Russian IP addresses hacked the software vendor that makes the system. They were then able to access the vendor’s database of usernames and passwords, and used the stolen credentials for remote access to the SCADA system’s network. These vendors keep records of their customer’s access information for maintenance and upgrading the systems.

Two to three months before the discovery of the hack, operators noticed “glitches” in the remote access to the SCADA system. “They just figured it’s part of the normal instability of the system,” said Joe Weiss, cybersecurity expert and managing partner at Applied Control Solutions, who obtained a copy of the report. “But it wasn’t until the SCADA system actually turned on and off that they realized something was wrong.”

, , , , , , ,

No Comments

New Malware Brings Cyberwar One Step Closer

From: MIT
A newly discovered piece of malicious code dubbed Duqu is closely related to the notorious Stuxnet worm that damaged Iran’s nuclear-enrichment centrifuges last year. Although it has no known target or author, it sets the stage for more industrial and cyberwar attacks, experts say.

“This is definitely a troubling development on a number of levels,” says Ronald Deibert, director of Citizen Lab, an Internet think-tank at the University of Toronto who leads research on cyberwarfare, censorship, and espionage. “In the context of the militarization of cyberspace, policymakers around the world should be concerned.”

Indeed, the spread of such code could be destabilizing. The Pentagon’s cyberwar strategy, for example, makes clear that computer attacks on industrial and civilian infrastructure like chemical factories or power grids as well as military networks could be regarded as equivalent to a conventional bombing or other attack, if civilians were endangered.

more

, , , , , ,

No Comments

Cyber combat: act of war

From: WSJ via Kurzweil AI

Cyber combat: act of war

June 1, 2011

Source: Wall Street Journal — May 31, 2011

The Pentagon has concluded that computer sabotage coming from another country can constitute an act of war, opening the door for the U.S. to respond using traditional military force.

Pentagon officials believe the most sophisticated computer attacks require the resources of a government. For instance, the weapons used in an assault such as taking down a power grid would likely have been developed with state support.

Defense officials refuse to discuss potential cyber adversaries, although military and intelligence officials say they have identified previous attacks originating in Russia and China.

Read original article

Topics: Computers/Infotech/UI | Survival/Defense

, , , , ,

No Comments

Using the Evolved Cyber Range – Free Webinar

From: IDGA

Using the Evolved Cyber Range to Arm and Train U.S. Warriors to Win Cyber War

This FREE webinar will be on:
Tuesday, April 5, 2011, 2:00 PM – 3:00 PM ET
Presenter: Scott Register
Register

How are military and intelligence organizations such as the U.S. Defense Information Systems Agency (DISA), the U.S. European Command (EUCOM), and Northrop Grumman (U.S. and U.K.) deploying cyber range technology? What are these organizations doing to develop the expertise of personnel and then equipping them with the advanced tools needed to fulfill cyber security missions?

Join BreakingPoint Systems, the global leader in cyber range technology, and learn how U.S. government and military can properly train personnel with the skills to defend against cyber terrorism, espionage, and theft of intellectual property.

Listen to the best practice case studies of DISA, EUCOM, and Northrop Grumman as they use the latest technology and establish a turnkey system to deliver a complete, scalable, and operational cyber range.

Learn how to use technology to simulate Internet-scale cyber war conditions in a controlled environment in order to establish IT certification methods and curriculum needed for assessing, training, and qualifying cyber warrior personnel.

View the Whitepaper

View the Whitepaper

After attending this webinar you will know how to:

  • Deploy and use a modern cyber range machine to create an operationally relevant environment that precisely mirrors the Global Information Grid (GIG), enabling sophisticated simulation of real-world cyber conditions
  • Optimize and harden the resiliency—the performance, stability, and security—of next-generation deep packet inspection (DPI) devices to carry out effective Lawful Intercept programs and related missions
  • Model and research advanced cyber threats including Stuxnet and botnet-driven distributed denial of service (DDoS) attacks
  • Implement a scalable approach for training and certifying cyber warriors in critical Information Assurance (IA), Information Operations (IO), and Mission Assurance (MA) skills.
  • Establish centralized command and control to monitor and manage a distributed network of remote cyber ranges

, ,

No Comments

Protecting the Critical Infrastructure

From: IDGA

With a turbulent economic outlook, advancing threats from cyber criminals and an ongoing oil spill impacting our global ecosystem; the challenge of protecting the critical infrastructure can no longer be an exercise in reactive security. Caretakers of these systems have to look at changing how they monitor, control, and recover in the event of a cyberevent. By the looks of things BP is dealing with their fair share of Hacktivism right now.

more

, , , ,

No Comments