Blog Posts Tagged with "National Security"

94ae16c30d35ee7345f3235dfb11113c

Our Massively Dysfunctional Cyber System

November 28, 2012 Added by:Joel Harding

What should be done to stop theft of intellectual property by state actors (China) would require a Presidential Finding but our leadership structure is devoid of real leaders. That is not a political statement, that is a statement about our country...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

LTE networks vulnerable to jamming, a question of national security

November 18, 2012 Added by:Pierluigi Paganini

"These comments describe extremely effective attacks can be realized, using fairly low complexity. It would be in the interest of public safety to take measures to reduce the vulnerability of Public Safety LTE, and lower the likelihood of an effective jamming attack..."

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

How Best to Discuss a Whole of Nation Approach to Information Activities

November 12, 2012 Added by:Joel Harding

Now that IO has a new definition, there is no longer a clear cut way to divide up the parts. My friend and mentor, Dr. Dan Kuehl, invented a model I like to use, called the Three C model. ‘What we do’ can be divided into Connectivity, Content and Cognitive...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

US Responses to Cyberattacks – Circus du Jour

October 31, 2012 Added by:Joel Harding

Who is in charge? Don’t answer that, you don’t want to know. Who is in charge of our national response to anything? It depends? What do you mean? Do you mean to say that there is no one person or office, no agency or even a department with the mission of coordinating a national response?

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Cleansing the Internet of Terrorism

October 28, 2012 Added by:Electronic Frontier Foundation

Internet companies under the CleanIT regime would not only be allowed, but in fact obligated to store communications containing “terrorist content,” even when it has been removed from their platform, in order to supply the information to law enforcement agencies...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Secretary of Defense Panetta on U.S. Cyber Capabilities

October 15, 2012 Added by:Pierluigi Paganini

Panetta has warned of cyber attacks against critical infrastructure and that opponents are increasing their cyber capabilities and represent a serious menace. The words used last Thursday are very strong: The US is in a “pre-9/11 moment,” referring to a possible series of cyber attacks...

Comments  (4)

E11e506024f5d2b70f037b9af4734f33

National Security and Chinese Telecommunications Companies

October 14, 2012 Added by:Stefano Mele

Unfair trade practices of the Chinese telecommunications sector should be investigated by committees of jurisdiction in U.S. Congress and enforcement agencies in the Executive Branch. Particular attention should be paid to China’s continued financial support of key companies...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Expect New Wave of Cyber Attacks Against Banking

September 26, 2012 Added by:Pierluigi Paganini

A possible Iranian cyber offensive against US banks has been discussed recently, and immediately denied by government of Teheran. Financial institutions are targets for a cyber attacks, as the banking system is a critical asset for a nation and its paralysis could damage economic activities...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

War in Cyberspace is about Definitions

September 18, 2012 Added by:Joel Harding

We are stuck in “Definitional Wars” or the struggle to get definitions approved that are not only accurate but widely accepted. A bigger problem is the constant evolution of technology and terminology, by the time a definition is published, it is usually obsolete...

Comments  (2)

94ae16c30d35ee7345f3235dfb11113c

What Will the Impact of a Massive Attack in Cyberspace Be?

September 13, 2012 Added by:Joel Harding

In every war, civilians are the victims. If and when a nation state unleashes their cyber forces against another, the initial blow will most likely be crushing. The economy will grind to an immediate halt, and without communications most of what we know will cease to exist...

Comments  (2)

E11e506024f5d2b70f037b9af4734f33

Assessment of Security Policies Within the DoD

September 11, 2012 Added by:Stefano Mele

According to a new report from the DoD Inspector General, security policies "often overlap, are fragmentary, or inconsistent". The sheer volume of policies that are not integrated makes it difficult for those in the field to ensure consistent and comprehensive policy implementation...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

OPSEC: Is the Juice Worth the Squeeze?

September 06, 2012 Added by:Joel Harding

In the cyber world there is a process called IGL or Intelligence Gain-Loss. Sometimes deploying a new tool would disclose a capability that the US has to gather intelligence, but sometimes the gain outweighs the loss of a source. Ya gotta ask is the juice worth the squeeze?

Comments  (0)

296634767383f056e82787fcb3b94864

The Poor State of Cyber Intelligence

August 23, 2012 Added by:Jeffrey Carr

The state of cyber intelligence as it is practiced by infosec professionals and others who are not trained in the science of rigorous analysis is often exponentially worse. Many analysts are missing huge gaps in the threat landscape and are doing a great disservice to their customers and their craft...

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

Thoughts On a U.S. Cyber Militia

August 23, 2012 Added by:Joel Harding

The Swiss are standing up a cyber command and they say their cyber warriors will be armed. Why wouldn’t this work in the US? First, we don’t trust our people as much as the Swiss. That is the nature of our culture, especially in the US. We are more paranoid, cynical and negative. We tend to micromanage...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

Army to Integrate Cyber Considerations Across the Board

August 20, 2012 Added by:Headlines

"The vulnerabilities inherent in social media, ubiquitous encryption and malicious software that has the ability to change form and target enroute, retaining access and the freedom to maneuver in cyberspace will be essential for us to defend ourselves and influence the nature of future conflict..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Newest U.S. Counter-Terrorism Strategy: Trolling

August 08, 2012 Added by:Infosec Island Admin

The State Department has given the go ahead to a 20-something to put together a coalition of people across the globe to subtly troll the jihadi’s online in the hope that it will shame them into dropping the notions of radical jihad. Why am I surprised that a hair brained scheme like this would come out of State?

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »