|
. | . |
|
By Rob Lever Washington (AFP) Feb 10, 2015
The Obama administration unveiled plans Tuesday for a new US intelligence center to integrate information about cyber threats, aiming for the same kind of coordination used to battle terrorism. The Cyber Threat Intelligence Integration Center will be led by the Director of National Intelligence and will "analyze and integrate information already collected under existing authorities," said Lisa Monaco, a special adviser to President Barack Obama for homeland security and counterterrorism. Monaco told a forum at the Woodrow Wilson Center in Washington that the government's response to cyber attacks and threats must follow the same model as the response to terrorism after the attacks of September 11, 2001. "We need to develop the same muscle memory in the government response to cyber threats as we have for terrorist incidents," she said. Monaco noted that the attack on Sony Pictures last year -- which Washington blamed on North Korea -- was "a game changer, because it wasn't about profit; it was about a dictator trying to impose censorship and prevent the exercise of free expression." She said the threats in cyberspace have been rising and pose serious risks to the nation. - No one immune - "No one, it seems, is immune -- from health care companies and universities to the tech industry, critical infrastructure and entertainment sector," Monaco said. "Inside the US government, we know that state and non-state actors, terrorists, hackers and criminals are probing our networks every day -- seeking to steal, spy, manipulate and destroy data." A senior administration official said earlier that the new entity "will be a national cyber threat intelligence center that will 'connect the dots' between various cyber threats to the nation so that relevant departments and agencies are aware of these threats in as close to real time as possible," the official said. The mission will be similar to that of the National Counterterrorism Center -- to integrate data on foreign cyber threats and ensure that US government centers responsible for cybersecurity have access to intelligence and tools to respond to threats. Obama has launched a fresh effort to persuade Congress to pass legislation to encourage better cooperation between the government and private sector, an effort stalled since his first proposal in 2011. Earlier efforts on cybersecurity legislation have stalled amid opposition from civil libertarians who feared it could allow too much government snooping and conservatives who argued it would create a new bureaucracy. One contentious part of the proposal is a shield of liability for companies that share information about cyber threats with the Department of Homeland Security. Monaco said the government needs to coordinate better with the private sector to combat cyber threats. "We're not going to bottle up our intelligence -- if we have information about a significant threat to a business, we're going to do our utmost to share it," she said. But Monaco also maintained that the flow of information should "go both ways." "When companies share information with us about a major cyber intrusion or a potentially debilitating denial of service attack, they can expect us to respond quickly," she said. "We will provide as much information as we can about the threat to assist companies in protecting their networks and critical information."
Chinese spy team hacks Forbes.com: security firms Invincea and iSight Partners detailed what they described as a "watering hole" campaign late last year that took advantage of Forbes.com and other legitimate websites. "A Chinese advanced persistent threat compromised Forbes.com to set up a watering hole style web-based drive-by attack against US defense and financial services firms in late November 2014," Invincea said in a report posted at its website. The "brazen attack" took advantage of Adobe Flash and Internet Explorer vulnerabilities which have since been patched, according to Invincea. Watering hole attacks typically involve hackers breaking into websites popular with their desired targets and then booby-trapping venues with viruses to infect visitors. The cyber espionage campaign focused on Forbes.com appeared to last only a few days, but the security firms said deeper investigation could determine it went on for a longer period of time. ISight believed that the culprits behind the attack were Chinese cyber espionage agents it called Codoso Team but also referred to as Sunshop Group. The group has been linked to previous cyber spying campaigns against US government; military; defense industrial; think tanks covering foreign affairs; financial services; energy firms, and political dissidents, according to security researchers. Rather than spreading malicious code to the machines of the millions of people who visited Forbes.com, the hackers appeared to be after select targets such as defense and financial services firms, according to iSight. Further investigation reportedly revealed a set of websites being used by Codoso to target dissident groups. Given that Forbes.com is ranked the 61st most popular website in the United States and the 168th most popular in the world, the reach of the espionage campaign could be vast, security researchers said.
Related Links Cyberwar - Internet Security News - Systems and Policy Issues
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service. |