Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Cyber defenders urged to go on the offense
by Staff Writers
Las Vegas (AFP) July 25, 2012


Computer security champions on Wednesday were urged to hunt down and eliminate hackers, spies, terrorists and other online evildoers to prevent devastating Internet Age attacks.

The first day of briefings at a prestigious Black Hat computer security gathering here opened with a former FBI cyber crime unit chief calling for a shift from defense to offense when it comes to protecting networks.

"We need warriors to fight our enemies, particularly in the cyber world right now," Shawn Henry said in a Black Hat keynote presentation that kicked off with dramatic video of hostage rescue teams training.

"I believe the threat from computer network attack is the most significant threat we face as a civilized world, other than a weapon of mass destruction."

The peril grows as water supplies, power grids, financial transactions, and more rely on the Internet and as modern lives increasingly involve working and playing on smartphones or tablet computers, according to Henry.

He rolled off a list of adversaries ranging from spies and well-funded criminals to disgruntled employees with inside knowledge of company networks.

"Cyber is the great equalizer," Henry said.

"With a $500 laptop with an Internet connection anybody, anywhere in the world can attack any organization, any company," he continued. "The last time I checked, that was about 2.3 billion people."

After 24 years of working for the FBI, Henry in April switched to the private sector as the head of a division at startup CrowdStrike specializing in cyber attack incident responses and identifying adversaries.

The computer security industry to expand its arsenal beyond just building walls, filters and other safeguards against online intruders to include watching for, and gathering intelligence on, culprits who have slipped through.

"It is not enough to watch the perimeter," Henry said, equating computer security to protecting real world offices. "We have to be constantly hunting; looking for tripwires."

In the cyber world, that translates into monitoring system activities such as whether files have been accessed or changed and by whom.

"The sophisticated adversary will get over that firewall and walk around, like an invisible man," Henry said. "We have to mitigate that threat."

Tactics for fighting cyber intruders should include gathering information about how they operate and the tools used, and then sharing the data in the industry and with law enforcement agencies in relevant countries.

"Intelligence is the key to all of this," Henry said. "If we understand who the adversary is, we can take specific actions."

Teamwork between governments and private companies means that options for responding to identified cyber attackers can range from improved network software to political sanctions or even military strikes, according to Henry.

"You can't make every school, every mall, every university, and every workplace impenetrable," Henry said. "We have to look at who the adversary is and stop them in advance of them walking in."

Black Hat founder Jeff Moss, the self-described hacker behind the notorious Def Con gathering that starts here on Thursday, backed Henry's argument.

"Maybe we need some white blood cells out there; companies willing to push the edge and focus on threat actors," Moss said, calling on the computer security community to "raise the immunity level."

Moss is head of security at the Internet Corporation for Assigned Names and Numbers, which oversees the world's website addresses.

"So, am I Luke, or am I Darth Vader; sometimes I'm not sure," Moss quipped about his roles in the hacker realm and the computer security industry.

"It depends upon which day and who asks."

Moss proposed that cyber attackers also be fought on legal fronts, with companies taking suspected culprits to court.

"I can't print money; I can't raise an army, but I can hire lawyers and they are almost as good," Moss said. "One way to fight the enemy is you just sue them."

Henry feared that it may take an Internet version of the infamous 9/11 attack in New York City to get the world to take the cyber threat to heart.

"We need to get down range and take them out of the fight," Henry said.

"As well-trained, well-equipped cyber warriors you can have an impact; the stakes are high."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Finnish firm says new cyber attack may have targeted Iran
Helsinki (AFP) July 25, 2012
A scientist claiming to work for the Atomic Energy Organisation of Iran told a Finnish cyber-security group that Tehran's nuclear programme had been the victim of a new cyber attack, the group said Wednesday. Mikko Hypponen, the research head for the Finnish firm F-Secure, said he received a series of emails over the weekend from Iran. "The only thing we can confirm is that these emails ... read more


CYBER WARS
US plans $4.2 bn Patriot missile sale to Kuwait

Lockheed Martin Receives Contract For PAC-3 MSE Production

US building missile defense station in Qatar: report

Raytheon reveals new missile defense system architectural analysis capability

CYBER WARS
Lockheed Martin Receives U.S. Army Contract For Guided MLRS Rockets

Boeing Receives US Navy Contracts for SLAM ER and Harpoon Missiles

Lockheed Martin Completes First LRASM Captive Carriage Test

Ukraine jails two N. Koreans for missile spying

CYBER WARS
Britain and France sign two deals on drone cooperation

US drone strike kills 10 militants in Pakistan

Insitu ScanEagle set for Australia's navy

Northrop Grumman, AUVSI Partner to Develop Unmanned Systems Engineers

CYBER WARS
US Army awards Raytheon contract to upgrade Advanced Field Artillery Tactical Data System

Boeing-built Legacy UHF Payload Operating on MUOS-1 Satellite

Lockheed Martin Completes On-Orbit Testing of First US Navy MUOS Satellite

Northrop Grumman's RC-12X Airborne Signals Intelligence System Completes 1,000th Mission

CYBER WARS
Boeing F-15E Radar Modernization Program Begins Second Low Rate Initial Production Phase

Northrop Grumman Awarded contract for Continuing BACN Mission Support

Northrop Grumman Delivers First B-1 Radar Modification Kit

12 die in Brunei helicopter crash

CYBER WARS
Amnesty petitions White House over UN arms treaty

Israel's IAI signs Italian deals worth $1B

Colorado gun sales soar after mass shooting: report

'Word by word' arguments at UN over arms trade treaty

CYBER WARS
Outside View: China in the campaign

China charges Bo Xilai's wife with murder: Xinhua

US to station forces in Poland for first time

Obama defends his foreign policy ahead of Romney trip

CYBER WARS
Researchers Create Highly Conductive and Elastic Conductors Using Silver Nanowires

Silver nanoparticle synthesis using strawberry tree leaf

UK nanodevice builds electricity from tiny pieces

Ferroelectricity on the Nanoscale




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement