cyber threat

A relatively new report on the extent to which foreign spies are stealing U.S. economic secrets is gaining attention not only for what it concludes but also for the fact that it actually names names.

The report comes by way of the Office of the National Counter Intelligence Executive and is titled Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009 – 2011. Keep reading →

The European Network and Information Security Agency (ENISA) just released a new study this month that looks at protecting the security of industrial control (or SCADA) systems (ICS).

The study recognizes that industrial control systems are truly a strategic asset and must be protected against the rising potential of cyber terrorist attacks with Keep reading →

It is getting to the point that those reporting acts of cyber aggression, particularly in the area of cyber espionage, think they are in a repetitive do-loop. It is the same story over and over again with the only difference being the list of victims.

The news of late has been the discovery of yet another sophisticated cyber attack that resulted in the collection of untold information, some general some sensitive, from the business community as well as defense contractors and government officials. Keep reading →

Cyber intelligence has emerged as the single most critical element in cyber defense. The private sector owns and operates the vast majority of the U.S. critical infrastructure which has become a high value target for those who wish to harm the United States. In addition, the private sector produces a substantive portion of the technology used to defend the nation, which if compromised could be very damaging.

On Dec. 1, 2011 the House Permanent Select Committee on Intelligence Committee Chairman Mike Rogers introduced what is being called a ground-breaking piece of legislation. Keep reading →


COMMENTARY: The history of espionage activities, both for and against the United States goes back to early formative stages of the country. The tools and techniques associated with the tradecraft of spying have changed over time and kept up with modern society.

Today, China’s espionage activities/targets go far beyond government and military targets and now include leading private sector technology companies. Acts of espionage that have been attributed to China are said to have reached new “intolerable levels”. Representative Mike Rogers of Michigan, chairman of the House Intelligence Committee, said that “Beijing is waging a massive trade war on us all, and we should band together to pressure them to stop.” He went on to pretty much DEMAND the FBI provide answers! Keep reading →

Cyber diplomacy is becoming the new discipline to establish cooperation among nation states.

The threat now posed by acts of aggression in cyber space has caused governments to establish a position to deal with the establishment of agreements of cooperation and coordination of government activities in cyber space. The new position has been dubbed “cyber diplomat.” At this point, the cyber diplomat is charged with practicing the art and science of cyber diplomacy. Keep reading →

A recently released report provides a glimpse into the true economic impact of the cyber crime wave that has been going on for years.

The 2011 Norton Cyber crime disclosed that over 74 million people in the United States were victims of cyber crime in 2010. These criminal acts resulted in $32 billion in direct financial losses. Keep reading →

COMMENTARY:
The race to keep pace with conventional arms development recently ran head long into the race for cyber dominance–and sustained an eye-opening set-back.

These weapons programs take years to develop and typically cost billions of dollars. But the damage goes far beyond the dollars spent on the program to date. The loss of time in the conventional arms race is perhaps the biggest area of loss and the greatest concern for Defense Department strategic planners. Keep reading →

COMMENTARY:
A new arms race began a few years back and its rapid revolutions will make the cold war era look like a minuscule research project for a white paper!

The new race is to develop offensive, defensive and intelligence collection capabilities for cyber space operations. Keep reading →

COMMENTARY:
Social media is perhaps the greatest tool for mass communication–and for attracting like-minded individuals. That is not new. Back in 2005, for instance, the Journal of International Security Affairs reported on the increased web presence of several major Islamic militias.

Threat intelligence analysis, however, indicates that information and activities within social networking sites is now viewed as one of the primary sources of cyber intelligence on extremist groups and terrorists. Keep reading →

Page 4 of 512345