Thursday, January 16, 2020

Cyber Command Pursues Perfect Citizen

Originally Published August 17, 2010; Last Updated January 16, 2020; Last Republished January 16, 2020:

Cyber Command Pursues Perfect Citizen

UPDATED 12/05/2016 WH, Commission on Enhancing National Cybersecurity, December 01, 2016, Report on Securing and Growing the Digital Economy

The commission make a number of recommendations and action items.

UPDATED 06/09/2016 NIST, The Stakeholders Have Spoken: NIST to Refine Cybersecurity Framework
UPDATED 11/03/2015 NSF, Cybersecurity: Tech, Tools, and Training
UPDATED 10/20/2015 NSF, Cybersecurity research looks to guard networks from 'insider threats'
UPDATED 07/03/2013 NIST, Draft Outline of Cybersecurity Framework for Critical Infrastructure
UPDATED 09/28/2012 NSF, Secure and Trustworthy Cyberspace (SaTC)
UPDATED 09/07/2010 Networking and Information Technology Research and Development
UPDATED 09/07/2010 GAO, Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development (pdf)
Wikipedia, United States Cyber Command


UPDATED 01/16/2020 USAToday, Speaker Pelosi's Weekly Press Conference and WP, U.S. Cybercom Contemplates Information Warfare to Counter Russian Interference in 2020 Election and Reuters, Ukraine Asks FBI for Help to Probe Suspected Russian Hack of Burisma

...the Speaker calls Facebook's behavior "shameful" and "very abusive"...

...a public announcement consistent with the Washington Post's reporting, if it occurs, is a big deal... the above article provides some information on the growing malignant influences of social media platforms..."wet behind the ears" doesn't begin to describe the "leaders" of these companies or their mostly uninformed users...

...below is an older version with different and more information...'s unclear why targeting a malign Putin is "too provocative" it any more provocative than using a revised BlackEnergy (BE-n) toolkit to sow chaos in the lives of civilians1 and the infrastructure they depend on?...

UPDATED 09/08/2019 CISA, U.S. Cyber Command Shares 11 New Malware Samples
UPDATED 06/16/2019 NYT, U.S. Escalates Online Attacks on Russia’s Power Grid
UPDATED 11/26/2018 DOE, CyberForce Competition
UPDATED 10/05/2018 NAP, Recoverability as a First-Class Security Objective: Proceedings of a Workshop
UPDATED 09/22/2017 Reuters, Distrustful U.S. allies force spy agency to back down in encryption fight and ReutersTV, Distrustful U.S. allies force NSA To Retreat In Encryption Row and Improved Differential Cryptanalysis of Round-Reduced Speck (pdf) and The SIMON and SPECK Families of Lightweight Block Ciphers (pdf) and SIMON, SPECK and NISTIR 8114 Slides (pdf) and Notes on the design and analysis of Simon and Speck

UPDATED 06/14/2017 Brookings, Cyber Threats and How the United States Should Prepare and OSD, Final Report of the Defense Science Board (DSB) Task Force on Cyber Deterrence

UPDATED 05/23/2017 NYT, Watch Live: Mike Rogers, N.S.A. Director, Testifies

UPDATED 11/19/2016 WP, Pentagon and intelligence community chiefs have urged Obama to remove the head of the NSA
UPDATED 10/27/2016 Navy, USNA Breaks Ground at New Cyber Security Studies Center to Prepare Future Navy Cyber Warriors
UPDATED 09/23/2016 Quanta, Hacker-Proof Code Confirmed and DARPA, High-Assurance Cyber Military Systems (HACMS) and 2016 CyLab Partners Conference
"...HACMS will produce a set of publicly available tools integrated into a high-assurance software workbench, which will be widely distributed for use in both the commercial and defense software sectors..."
and CSIS, Deepening U.S.-Australia Cyber Security Cooperation

UPDATED 07/27/2016 CSIS, Webcast Live: Hacking the Skills Shortage (also, NIST, National Cybersecurity Workforce Framework
UPDATED 06/14/2016 Reuters, U.S. sees progress in latest cyber talks with China
UPDATED 02/19/2016 WEST 2016, Panel, Information Warfare: Identifying the Gaps and Seams in Cyber Security and NIST, Cybersecurity “Rosetta Stone” Celebrates Two Years of Success

UPDATED 02/11/2016 WH, The President Meets with his National Security and Cybersecurity Advisors

UPDATED 10/19/2015 NYT, Cybersecurity Firm Says Chinese Hackers Keep Attacking U.S. Companies
UPDATED 09/14/2015 Wired, We’re at Cyberwar: A Global Guide to Nation-State Digital Attacks
UPDATED 08/31/2015 WP, U.S. developing sanctions against China over cyberthefts

...and working to develop international protocols for incorporation into international agreements—no counterattack necessary—just an invoice and current account offset.

UPDATED 08/14/2015 UCTV, The Rise of the Military-Internet Complex
UPDATED 07/09/2015 CFR, Strategic Risks of Ambiguity in Cyberspace
UPDATED 07/07/2015 Guardian, Hacking Team hacked: firm sold spying tools to repressive regimes, documents claim and Reuters, Surveillance software maker Hacking Team gets taste of its own medicine and WP, U.S. firm helped the spyware industry build a potent digital weapon for sale overseas and SonS, Hacking Team Is Hacked (includes mirror to leaked documents)  and CL, Open letter to Hacking Team

UPDATED 02/13/2014 WH, Launch of the Cybersecurity Framework
UPDATED 01/31/2014 NYT, N.S.A. Choice Is Navy Expert on Cyberwar and NavyMil, Navy Short Bio Vice Admiral Michael S. Rogers

UPDATED 07/03/2013 MoJo, Why the Story on Snowden and the NSA Doesn't Add Up

The President's comment that he won't be "scrambling military jets to go after a 29-year-old hacker" is interesting in the context of this article.

UPDATED 06/09/2013 Guardian, Obama orders US to draw up overseas target list for cyber-attacks
UPDATED 06/02/2013 NYT, U.S. and China Agree to Hold Regular Talks on Hacking

Unsupported hyperbolic statements by well-meaning Chinese and American generals are distinctly unhelpful and unlikely to motivate an improved bilateral relationship.

UPDATED 03/20/2013 DiscoveryNews, Teens Prepare for Cyberwar
UPDATED 03/12/2013 Time, Hack Attack: China and the U.S. Trade Barbs on Cyberwarfare

UPDATED 01/28/2013 NYT, Pentagon Expanding Cybersecurity Force to Protect Networks Against Attacks
UPDATED 11/14/2012 WP, Obama signs secret directive to help thwart cyberattacks

Classified cybersecurity directive 20 must be publicly published in its entirety—if cybersecurity directive 20 cannot be immediately published in its entirety those asserting its classification must immediately publicly publish a "sanitized version" pending public disclosure of cybersecurity directive 20 in its entirety. (UPDATED 07/03/2013 above Guardian article on Snowden leaks: Obama orders US to draw up overseas target list for cyber-attacks)

UPDATED 10/29/2010 SFGate, Napolitano: Military to aid civilian cybersecurity.

It will be useful to formally rely on laws and published policies and procedures that guarantee protection against infringement of our civil rights.



1. ...interested in learning more about Russia's malign hacking activity? about Andy Greenberg's latest book, Sandworm? (named after the fictional and rapacious underground worms in Frank Herbert's novel Dune...

No comments:

Post a Comment