cyber war USA
Get flash to fully experience Pearltrees
President Obama has signed a secret directive that effectively enables the military to act more aggressively to thwart cyberattacks on the nation’s web of government and private computer networks.
MIAMI, Florida – A security researcher was able to locate and map more than 10,000 industrial control systems hooked up to the public internet, including water and sewage plants, and found that many could be open to easy hack attacks, due to lax security practices. Infrastructure software vendors and critical infrastructure owners have long maintained that industrial control systems (ICSes) — even if rife with security vulnerabilities — are not at risk of penetration by outsiders because they’re “air-gapped” from the internet — that is, they’re not online. But Eireann Leverett, a computer science doctoral student at Cambridge University, has developed a tool that matches information about ICSes that are connected to the internet with information about known vulnerabilities to show how easy it could be for an attacker to locate and target an industrial control system.
ManTech International Corporation (NASDAQ: MANT) ( www.mantech.com ), a leading provider of innovative technologies and solutions for mission-critical national security programs, today announced that the
Fuck FBI Friday III: ManTech Type: Other > Other
University projects to secure cyberspace could soon bear fruit Five-year program funded by Northrop Grumman researching new technologies A number of university cybersecurity research programs funded by Northrop Grumman are expected to begin paying off in new technologies soon, researchers said June 1.
For that reason an alphabet soup of federal agencies — DOD, DHS, NASA, NSA — are descending on Las Vegas this week for Defcon, an annual hacker convention where the $150 entrance fee is cash only — no registration, no credit cards, no names taken.
News July 22, 2010 06:00 AM ET Computerworld - Hundreds of people in the information security, military and intelligence fields recently found themselves with egg on their faces after sharing personal information with a fictitious Navy cyberthreat analyst named "Robin Sage," whose profile on prominent social networking sites was created by a security researcher to illustrate the risks of social networking.
The hacking stories just keep on coming.
When it comes to cyber defence, assessing the risk of online warfare, or even of a “cyber Pearl Harbor”, as opposed to common-or-garden crime or espionage, is made more difficult by the lack of detail around cyber attacks and the conflation of unrelated attacks.
The Pentagon has suspected China and Russia in the past of carrying out internet espionage. Photograph: Getty Images
download as pdf President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter. Shortly after taking office, the President therefore ordered a thorough review of federal efforts to defend the U.S. information and communications infrastructure and the development of a comprehensive approach to securing America’s digital infrastructure.
The Pentagon's cyber attack policy "All appropriate options would be on the table" Identifying attacker can be hard, take a long time 2008 incident was wake-up call
By SIOBHAN GORMAN And JULIAN E. BARNES
According to the Wall Street Journal , DoD’s first formal cyber strategy is based on the doctrine that a cyber attack on US critical infrastructure can be retaliated by a conventional military strike. The article is decorated with macho statements from unidentified military officials, such as “if you shut down our power grid, maybe we will put a missile down one of your smokestacks.”
The National Cyber Range marks a rise in the temperature of the online battlefield. Illustration: Getty Images The US defence agency that invented the forerunner to the internet is working on a "virtual firing range" intended as a replica of the real internet so scientists can mimic international cyberwars to test their defences.