Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Cyber-terrorism a real and growing threat: FBI
by Staff Writers
San Francisco (AFP) March 5, 2010


US agencies needs clear cybersecurity roles: GAO report
Washington (AFP) March 5, 2010 - US government cybersecurity efforts are being hampered by a need to better define the roles of the agencies responsible for defending against cyber threats, a US Congressional watchdog said Friday. The need for more clearly defined responsibilities for agencies tasked with defending against cyberattacks was one of a number of "challenges" to effective cybersecurity raised in the report by the Government Accountability Office. The GAO report looked at the Comprehensive National Cybersecurity Initiative (CNCI), which was launched by former US president George W. Bush in 2008 to reduce vulnerabilities and protect federal systems against cyberattack. In its report, the GAO cited "defining roles and responsibilities" as among the "challenges" to cybersecurity efforts.

"Federal agencies have overlapping and uncoordinated responsibilities for cybersecurity, and it is unclear where overall responsibility for coordination lies," the GAO said. Other challenges raised by GAO were "coordinating actions with international entities" and "establishing an appropriate level of transparency." "The federal government does not have a formal strategy for coordinating outreach to international partners for the purposes of standards setting, law enforcement, and information sharing," the GAO said. "Few of the elements of CNCI have been made public, and the rationale for classifying related information remains unclear, hindering coordination with private sector entities and accountability to the public," the GAO said. "Until these challenges are adequately addressed, there is a risk that CNCI will not fully achieve its goal to reduce vulnerabilities, protect against intrusions, and anticipate future threats against federal executive branch information systems," it said.

The White House took issue with the GAO's conclusion that the roles of the various agencies tasked with cybersecurity were not well defined. In a letter to the director of the GAO, Chief Information Officer Vivek Kundra said "the roles and responsibilities of agencies participating in the CNCI are clearly defined." Kundra also pointed out that President Barack Obama had made cybersecurity a top priority of his administration, had conducted a 60-day cybersecurity review and had appointed an overall cybersecurity coordinator in December. On Tuesday, cybersecurity coordinator Howard Schmidt announced that the White House was declassifying elements of the CNCI and was seeking to strengthen its cybersecurity partnership with the private sector. "We can't ask industry to help government and government can't help industry if we don't have transparency," Schmidt told a cybersecurity conference in San Francisco.

Terrorists, crooks and nation states are ramping up cyber-assaults that are eating away at data, cash and security in the United States, the head of the FBI warned.

"The risks are right at our doorsteps and in some cases they are in the house," Federal Bureau of Investigation chief Robert Mueller said in a Thursday speech at an RSA Conference of computer security professionals here.

"Working together we can find the people taking shots at us and stop those attacks."

Mueller was the third high-ranking federal official in as many days to urge private industry cyber-warriors to join forces with the US government to battle spies, terrorists and crooks plaguing the Internet.

"As you well know, a cyber-attack could have the same impact as a well-placed bomb," Mueller said.

"In the past 10 years, Al-Qaeda's online presence has become as potent as its in-world presence."

Al-Qaeda uses for the Internet range from recruiting members and inciting violence to posting ways to make bio-weapons and forming social-networks for aspiring terrorists, according to Mueller.

"The cyber-terrorism threat is real and rapidly expanding," Mueller said.

"Terrorists have shown a clear interest in hacking skills and combining real attacks with cyber attacks."

Threats are also rising from online espionage, with hackers out for source code, money, trade and government secrets, according to the FBI.

"Every major company in the US and Europe has been penetrated -- it's industrial warfare," said Richard Clarke, who was a White House adviser under three prior US presidents.

"All the little cyber devices that the companies here sell have been unable to stop them. China and Russia are stealing petabytes of information."

Clarke, now a partner at Good Harbor Consulting firm, was among the RSA panelists discussing cyber-warfare.

"Nation states have created cyber-warfare units. They are preparing the battlefield," Clarke said.

"We have the governments of China and Russia engaging in daily activities successfully that the US government and private industry are not stopping and they are stealing anything worth stealing."

Even seemingly innocuous information about companies is swiped for "spearphishing" attacks in which hackers dupe influential employees into downloading malicious computer codes into company networks.

"We are bleeding data... byte by byte and in some cases terabyte by terabyte," Mueller said.

"We are playing cat and mouse and, unfortunately, the mouse seems to be one step ahead most of the time."

Mueller urged computer security professionals to join in a united, international alliance with law enforcement agencies to battle enemies in cyberspace.

He credited such teamwork with resulting in the recent arrest of three men in Spain suspected of running a network of nearly 13 million computers secretly infected with malicious software and used for nefarious deeds.

Mueller called on victims of cyber-attacks to break the pattern of remaining silent out of fear that reporting crimes would hurt their positions in the marketplace.

"Maintaining the code of silence will not benefit you or your clients in the long run," Mueller said. "We must continue to do everything we can together to minimize and stop these attacks."

Mueller invited computer security savants to join the FBI, echoing a similar offer extended a day earlier by US Department of Homeland Security Secretary Janet Napolitano.

White House Internet security coordinator Howard Schmidt on Tuesday at RSA released a declassified version of a Comprehensive National Cybersecurity Initiative.

CNCI was crafted as the result of a directive signed by then-president George W. Bush in January 2008.

earlier related report
US building top cyber defense team: Napolitano
San Francisco (AFP) March 3, 2010 - The United States is building an elite cyber defense team to guard the nation's public and private computer systems, Homeland Security Secretary Janet Napolitano said Wednesday.

"We need the best brains we can bring to bear on meeting the challenge," Napolitano told computer security specialists at a premier RSA Conference here.

"We are building one of the best teams anywhere, but our success depends in no small part on our ability to collaborate with the private sector."

She challenged those at the conference to join forces with the department and help teach people the importance of protecting themselves from online crooks and spies.

Napolitano launched a National Cybersecurity Awareness Campaign contest to find innovative ways to convince the public how vital it is to safeguard computers from online attacks.

"All Americans have an important role to play in securing our computer systems and cyber networks," Napolitano said.

Proposals for promoting cybersecurity awareness can be submitted online at dhs.gov/cyberchallenge any time before April 30. The department will back winning ideas, according to Napolitano.

She said the department is ahead of schedule deploying an Einstein computer intrusion detection system on federal networks, which should be in place at 21 government agencies by the end of this year.

"Even as we are working to deploy Einstein we take very seriously the protection of privacy and civil liberties," Napolitano said of the system that analyzes Internet traffic as it flows into or out of federal computer systems.

She added the department has made "significant progress" in hardening cyber defenses of privately-owned portions of the US critical infrastructure.

"We need to do more and we need to do it faster," Napolitano said. "Cyber threats are also threats to our homeland security."

She called on computer security specialists to help the department "leapfrog" forward with technology for speedy automated defenses that can operate across all types of systems.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
US cyber defense strategy details hit the Internet
San Francisco (AFP) March 3, 2010
The White House has pulled back the curtain on portions of a secret US cyber defense strategy crafted during the administration of former president George W. Bush. White House Internet security coordinator Howard Schmidt described bits of the strategy at the RSA cybersecurity conference here, saying the revelation was part of a promise of transparency by President Barack Obama. Parts of ... read more


CYBER WARS
Rocket To Go To Moon Under Design

Student Ready To Battle At 17th Annual Great Moonbuggy Race

Biggest, Deepest Crater Exposes Hidden, Ancient Moon

Deep Crater Exposes Hidden Ancient Moon

CYBER WARS
Lava Likely Made River-Like Channel On Mars

Phobos Flyby Success

Spirit Set For Another Cold Quiet Winter

NASA Mars Orbiter Speeds Past Data Milestone

CYBER WARS
Obama to host April space conference

Popular Space Artist Had Extensive Ties To UA

LockMart Orion Team Fabricates World's Largest Heat Shield Structure

NASA Increases Support Contract To Mid-Atlantic Regional Spaceport

CYBER WARS
China Plans To Launch Unmanned Space Module Next Year

Two Crews For Tiangong

China Developing Technologies For Own Space Program

China announces second lunar probe

CYBER WARS
Alternative Energy Crops In Space

Boeing Transfers US Portions of International Space Station to NASA

Orbital Sciences Selects GS Yuasa to Power Cargo Transport Missions To ISS

Canada to boost space research

CYBER WARS
France To Pay Russia One Billion For 14 Soyuz Carrier Rockets

ASTRA 3B Topped Off For Arianespace Year-Opening Flight

NASA's high-tech GOES-P weather satellite lifts off

Kazakhstan Says Russian Proton launches To Continue

CYBER WARS
How To Hunt For Exoplanets

Watching A Planetary Death March

Seeing ExoPlanet Atmospheres From The Ground

New Technique For Detecting Earth-Like Planets

CYBER WARS
Lockheed To Supply Advanced Airborne Early Warning Radar

TerraSAR-X Images International Space Station

'Avatar' inspires a high-tech fair in glorious 3D

USAF Eyes Mini-Thrusters For Use In Satellite Propulsion




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement