Pages

Wednesday, June 14, 2017

Cyber Command Pursues Perfect Citizen

Originally Published August 17, 2010; Last Updated December 05, 2016; Last Republished December 05, 2016:



Cyber Command Pursues Perfect Citizen
Res:

UPDATED 12/05/2016 WH, Commission on Enhancing National Cybersecurity, December 01, 2016, Report on Securing and Growing the Digital Economy

The commission make a number of recommendations and action items.

UPDATED 06/09/2016 NIST, The Stakeholders Have Spoken: NIST to Refine Cybersecurity Framework
UPDATED 11/03/2015 NSF, Cybersecurity: Tech, Tools, and Training
UPDATED 10/20/2015 NSF, Cybersecurity research looks to guard networks from 'insider threats'
UPDATED 07/03/2013 NIST, Draft Outline of Cybersecurity Framework for Critical Infrastructure
UPDATED 09/28/2012 NSF, Secure and Trustworthy Cyberspace (SaTC)
UPDATED 09/07/2010 Networking and Information Technology Research and Development
UPDATED 09/07/2010 GAO, Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development (pdf)
Wikipedia, United States Cyber Command

Web:

UPDATED 06/14/2017 Brookings, Cyber Threats and How the United States Should Prepare and OSD, Final Report of the Defense Science Board (DSB) Task Force on Cyber Deterrence


UPDATED 05/23/2017 NYT, Watch Live: Mike Rogers, N.S.A. Director, Testifies


UPDATED 11/19/2016 WP, Pentagon and intelligence community chiefs have urged Obama to remove the head of the NSA
UPDATED 10/27/2016 Navy, USNA Breaks Ground at New Cyber Security Studies Center to Prepare Future Navy Cyber Warriors
UPDATED 09/23/2016 Quanta, Hacker-Proof Code Confirmed and DARPA, High-Assurance Cyber Military Systems (HACMS) and 2016 CyLab Partners Conference
"...HACMS will produce a set of publicly available tools integrated into a high-assurance software workbench, which will be widely distributed for use in both the commercial and defense software sectors..."
and CSIS, Deepening U.S.-Australia Cyber Security Cooperation


UPDATED 07/27/2016 CSIS, Webcast Live: Hacking the Skills Shortage (also, NIST, National Cybersecurity Workforce Framework
UPDATED 06/14/2016 Reuters, U.S. sees progress in latest cyber talks with China
UPDATED 02/19/2016 WEST 2016, Panel, Information Warfare: Identifying the Gaps and Seams in Cyber Security and NIST, Cybersecurity “Rosetta Stone” Celebrates Two Years of Success


UPDATED 02/11/2016 WH, The President Meets with his National Security and Cybersecurity Advisors


UPDATED 10/19/2015 NYT, Cybersecurity Firm Says Chinese Hackers Keep Attacking U.S. Companies
UPDATED 09/14/2015 Wired, We’re at Cyberwar: A Global Guide to Nation-State Digital Attacks
UPDATED 08/31/2015 WP, U.S. developing sanctions against China over cyberthefts

...and working to develop international protocols for incorporation into international agreements—no counterattack necessary—just an invoice and current account offset.


UPDATED 08/14/2015 UCTV, The Rise of the Military-Internet Complex
UPDATED 07/09/2015 CFR, Strategic Risks of Ambiguity in Cyberspace
UPDATED 07/07/2015 Guardian, Hacking Team hacked: firm sold spying tools to repressive regimes, documents claim and Reuters, Surveillance software maker Hacking Team gets taste of its own medicine and WP, U.S. firm helped the spyware industry build a potent digital weapon for sale overseas and SonS, Hacking Team Is Hacked (includes mirror to leaked documents)  and CL, Open letter to Hacking Team

UPDATED 02/13/2014 WH, Launch of the Cybersecurity Framework
UPDATED 01/31/2014 NYT, N.S.A. Choice Is Navy Expert on Cyberwar and NavyMil, Navy Short Bio Vice Admiral Michael S. Rogers

UPDATED 07/03/2013 MoJo, Why the Story on Snowden and the NSA Doesn't Add Up

The President's comment that he won't be "scrambling military jets to go after a 29-year-old hacker" is interesting in the context of this article.

UPDATED 06/09/2013 Guardian, Obama orders US to draw up overseas target list for cyber-attacks
UPDATED 06/02/2013 NYT, U.S. and China Agree to Hold Regular Talks on Hacking

Unsupported hyperbolic statements by well-meaning Chinese and American generals are distinctly unhelpful and unlikely to motivate an improved bilateral relationship.

UPDATED 03/20/2013 DiscoveryNews, Teens Prepare for Cyberwar
UPDATED 03/12/2013 Time, Hack Attack: China and the U.S. Trade Barbs on Cyberwarfare

UPDATED 01/28/2013 NYT, Pentagon Expanding Cybersecurity Force to Protect Networks Against Attacks
UPDATED 11/14/2012 WP, Obama signs secret directive to help thwart cyberattacks

Classified cybersecurity directive 20 must be publicly published in its entirety—if cybersecurity directive 20 cannot be immediately published in its entirety those asserting its classification must immediately publicly publish a "sanitized version" pending public disclosure of cybersecurity directive 20 in its entirety. (UPDATED 07/03/2013 above Guardian article on Snowden leaks: Obama orders US to draw up overseas target list for cyber-attacks)


UPDATED 10/29/2010 SFGate, Napolitano: Military to aid civilian cybersecurity.

It will be useful to formally rely on laws and published policies and procedures that guarantee protection against infringement of our civil rights.

No comments:

Post a Comment