Shoshana Bryen, Senior Director, Jewish Policy Centerjinsa; former Senior Director for Security Policy, Jewish Institute for National Security Affairs (JINSA)
So what’s Mitt Romney’s take on cyber security?
“Mitt Romney has promised to make cybersecurity a top priority early in his administration,” said a campaign spokeswoman when Killer Apps asked if the candidate has more detailed plans than what was outlined in the white paper. “He will order the formulation of a national cybersecurity strategy, to deter and defend against the growing threats of militarized cyber-attacks, cyber-terrorism, and cyber-espionage. Once the strategy is formulated he will determine how best it can be implemented.”
“Live-fire” cyberwar-in-a-box tests mettle of military, IT pros
“In August, a collection of military, government, and nongovernmental humanitarian organizations from 22 countries in the Pacific gathered in Singapore for Pacific Endeavor 2012, a joint exercise to test how quickly and how well they could communicate in the face of a disaster. While the simulated mission was peaceful, some of the participants were put through a separate, more hostile test—Cyber Endeavor, a full-on “live fire” cyberwarfare exercise focused on “protecting information in a collaborative environment, “with both innocent bystanders and hostile attackers.”
Anonymous hacktivists to launch TYLER: “WikiLeaks on steroids!”
“In an exclusive interview to the Voice of Russia a member of Anonymous talks about the conflict that revolves around the coercive fund raising techniques and a lack of transparency regarding WikiLeaks. He also mentions the possible release of a list of what they view as WikiLeaks ethical violations. On December 21, 2012 Anonymous are planning to launch a secure, no cost and decentralized online leaks release platform called TYLER to circumvent to problems inherent in WikiLeaks and to continue to disclose information that governments, including US, are hiding from people.”
WikiLeaks and Anonymous: Will they kiss and make up?
“Anonymous has pulled support for WikiLeaks, Julian Assange has met with Lady Gaga, I have interviewed dozens of WikiLeaks supporters, WikiLeaks number 2 has gone incommunicado and Bradley Manning is facing the beast on his own. Those are just some of the developments in the case of Julian Assange and WikiLeaks that Voice of Russia is commenting on.”
Russian Opposition Votes for Leaders Online amidst Hacker Attacks
“Electronic voting to the coordination council of Russia’s street opposition was temporarily suspended Saturday over a hacker attack, the movement’s central election committee said via Twitter Saturday. “It is possible that the online voting has been affected by DDoS attacks,” the committee said, referring to a Distributed Denial-of-Service attack, a common form of hacking that denies users access to targeted websites.”
The Threat Is Real and Must Be Stopped: Clarifications And Rebuttal by An INFOSEC Professional
“At the end of the day though, all my community see’s is just another government official overstating the facts concerning a new and scary “warfare” in our ever increasing security state in hopes of passing legislation with their name on it. There are no hard facts here in your opinion piece other than the names of tools and players in recent acts of hacking. There has been a trend in the government and the military circles since the presence of Stuxnet was revealed to the world of a great “Cyber-land-grab” of sorts that I and others have been watching and worrying about though. You, and others within the government are now beating the war drum over terms like “Cyber War” when you really do have very little comprehension of what that really means and this is the scariest thing for us all to watch. So much so that now, since the senate and house could not agree on measures for “cyber security” the president is seeking a unilateral method of protection in an “Executive Order” There have been stories about how such an order could “Shut down the internet” and frankly, that’s just a bad idea.”
DARPA-Funded Radio HackRF Aims To Be A $300 Wireless Swiss Army Knife For Hackers
“Pretty much any wireless device that you can think of would be in the frequency range covered by HackRF,” says Ossmann.”Just from observing [a signal] over the air, you can reverse engineer it completely to figure out the information transmitted over the network, and potentially inject your own transmissions onto that network. All of that can be done with one HackRF device and a laptop.” With HackRF in the hands of hackers or security researchers, in other words, no wireless signal would remain secure just by virtue of using a unique, unfamiliar frequency. Ossmann says that tools like HackRF mean wireless communications will need to evolve beyond the “security through obscurity” model of protecting communications that has long been considered outmoded in the wired computing world.”
Classified Information Plays Central Role in Both 9/11, WikiLeaks Cases
“Pretrial hearings for two major court cases – one involving the alleged perpetrators behind the 9/11 terror attacks and the other involving the soldier charged with the largest intelligence leak in U.S. history – are converging this week as attorneys operating in two very different legal systems focus on the issue of classified information in the courtroom. The pre-trial hearing for Khalid Sheik Mohammed, who has confessed to planning the 9/11 attacks “from A to Z,” and four others who allegedly trained, financed or arranged transportation for the 19 hijackers entered its fourth day today at Naval Air Station Guantanamo Bay, Cuba. Mohammed’s codefendants in the case are his nephew, Ali Abdul Aziz Ali; Walid Muhammad Salih Mubarak bin Attash, charged with selecting and training some of the hijackers; and Ramzi Binalshibh and Mustafa Ahmed Adam al Hawsawi, accused with helping finance the attacks. Meanwhile, here at Fort Meade, the second day of pre-trial hearings continued for Army Pfc. Bradley Manning. He is an Army intelligence specialist accused of downloading and transmitting classified information to the whistle-blowing group WikiLeaks while he was deployed to Iraq.”
Alleged hacker worked for House, RCMP
“According to the RCMP, the hack originated from the House of Commons network when someone gained administrative privileges and then used them to upload a malicious program to the government of Quebec’s website. The break-in on April 27 crashed the site for two days. The alleged hacker was working for the House of Commons at the time of the attacks, the Mounties said. The man also worked for the RCMP on contract.”
New wave of cyber attacks mostly target energy firms
Threats against the energy industry are progressively increasing during a constantly evolving threatening landscape. Security operations will be forced to continuously adapt to these variety of challenges including economic, criminal, political, as well as homeland security constraints. Against this backdrop, the 8th Middle East Energy Security Forum will be held on Dec. 4-6 at Habtoor Grand Resort and Spa in Dubai. The forum is all set to reveal the latest cyber security techniques, risk management and assessment, maritime critical infrastructure and hostile reconnaissances.