Threats to international peace and security include the proliferation of weapons of mass destructions, rogue nations, and international terrorism. The United States must respond to these challenges to its national security and to world stability by embracing new military technologies such as drones, autonomous robots, and cyber weapons. These weapons can provide more precise, less destructive means to coerce opponents to stop WMD proliferation, clamp down on terrorism, or end humanitarian disasters. Efforts to constrain new military technologies are not only doomed, but dangerous. Most weapons in themselves are not good or evil; their morality turns on the motives and purposes for the war itself. These new weapons can send a strong message without cause death or severe personal injury, and as a result can make war less, rather than more, destructive.
In military operations, information has always been every bit as vital as fuel or ammunition in achieving favorable outcomes. Today, the need to reduce decision timelines highlights its importance. The Navy postulates that network-centric operations will enhance the effectiveness of combat systems by allowing commanders to mass effects from great distances. At issue is verification of this assumption. How can the effectiveness of network-centric information systems be linked to combat outcomes? The authors seek to identify how information affects outcomes and determine how to measure the link between the two. This report creates a framework for developing measures to help the Navy decide how network-centric operations affect combat outcomes and which information systems work best. The authors demonstrate a proof-of-concept tool that cangenerate several alternative network-centric command, control, communications, computer, intelligence, surveillance, and reconnaissancesystems. Using a spreadsheet model, they take the first steps toward developing formulas to help the Navy codify an approach to measuring combat effectiveness in network-centric operations.
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
To provide for the sharing of certain cyber threat intelligence and cyber threat information between the intelligence community and cybersecurity entities, and for other purposes.
Continue reading “Cyber Intelligence Sharing and Protection Act – H.R. 3523 – 112th Congress”
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile.
Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively.
Continue reading “Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware”