cyber espionage

The big news reverberating through cybersecurity circles last week, reported by the New York Times, that the U.S. was behind the Stuxnet cyber attack on Iranian nuclear enrichments back in 2010 has set off a new firestorm of concern about the likelihood of retaliation.

The news report was based on information provided by “unnamed participants in the program.” In the article it states that the information in the piece was called an “account of the American and Israeli effort to undermine the Iranian nuclear program is based on interviews over the past 18 months with current and former American, European and Israeli officials involved in the program, as well as a range of outside experts.” Keep reading →

In a move that suggests the incendiary impact of malicious software, Iran has now publicly threatened the United States over the Flame malware incident that has gained worldwide attention in recent days.

Flame has been dubbed the “utlimate spy” and for good reason. Iran was the country hit the hardest by the state-of-the-art piece of malware. Keep reading →

It happened again. A number of countries have been hit by what has been called the most sophisticated piece of malware seen to date.

The malware is called Flame – appropriate given the number of computers that have been burned by this latest cyber weapon. Keep reading →

It appears that all the expert cyber threat warnings and media coverage–and now a realistic cyber attack simulation on New York’s power grid–has gotten the attention of Washington.

In the latest example, according to an account published March 8 by Politico, Homeland Security Secretary Janet Napolitano and White House counterterrorism adviser John Brennan, during a classified briefing in the Office of Senate Security, showed lawmakers how a hacker could breach control systems of New York City’s electric system and trigger a ripple effect throughout the population and private sector. Keep reading →

As discussed in last week’s blog I continue to come across what I believe are two very dangerous attitudes about cyber aggression.

The first issue one, discussed last week, is about the importance of distinguishing between a cyber intrusion and a cyber attack. This week, I want to address the comment I hear too often that “we know for a fact” who are behind the cyber attacks.


I called a CISO (chief information security officer) of a critical infrastructure and a subject matter expert that worked with three-letter agencies on cyber event investigations. I barely finished relating the statement when he replied “That’s bulls**t and went on to talk about cyber break-in investigations that went on for “years” without identifying who was behind the attack. Keep reading →


COMMENTARY: The history of espionage activities, both for and against the United States goes back to early formative stages of the country. The tools and techniques associated with the tradecraft of spying have changed over time and kept up with modern society.

Today, China’s espionage activities/targets go far beyond government and military targets and now include leading private sector technology companies. Acts of espionage that have been attributed to China are said to have reached new “intolerable levels”. Representative Mike Rogers of Michigan, chairman of the House Intelligence Committee, said that “Beijing is waging a massive trade war on us all, and we should band together to pressure them to stop.” He went on to pretty much DEMAND the FBI provide answers! Keep reading →

COMMENTARY:
Last week yet another call was heard for the need for increased efforts to identify, collect, analyze and disseminate cyber intelligence. This latest call was the result of a recent report that warned the U.S. must develop cyber intelligence as a new and better coordinated government discipline.

How many times does this have to be recommended and justified before we just get it done and done right? Keep reading →

A recently released report provides a glimpse into the true economic impact of the cyber crime wave that has been going on for years.

The 2011 Norton Cyber crime disclosed that over 74 million people in the United States were victims of cyber crime in 2010. These criminal acts resulted in $32 billion in direct financial losses. Keep reading →

COMMENTARY:
The race to keep pace with conventional arms development recently ran head long into the race for cyber dominance–and sustained an eye-opening set-back.

These weapons programs take years to develop and typically cost billions of dollars. But the damage goes far beyond the dollars spent on the program to date. The loss of time in the conventional arms race is perhaps the biggest area of loss and the greatest concern for Defense Department strategic planners. Keep reading →