Cyberpro August 27, 2009
Total Page:16
File Type:pdf, Size:1020Kb
Volume 2, Edition 17 CyberPro August 27, 2009 Keeping Cyberspace Professionals Informed Officers The articles and information appearing herein are intended for President educational purposes to promote discussion in the public interest and to Larry K. McKee, Jr. keep subscribers who are involved in the development of Cyber-related concepts and initiatives informed on items of common interest. The Chief Operations Officer newsletter and the information contained therein are not intended to Jim Ed Crouch provide a competitive advantage for any commercial firm. Any misuse or unauthorized use of the newsletter and its contents will result in removal ------------------------------ from the distribution list and/or possible administrative, civil, and/or CyberPro Editor-in-Chief criminal action. Lindsay Trimble The views, opinions, and/or findings and recommendations contained in CyberPro Research Analyst this summary are those of the authors and should not be construed as an Kathryn Stephens official position, policy, or decision of the United States Government, U.S. Department of Defense, or National Security Cyberspace Institute. CyberPro Archive To subscribe or unsubscribe to this newsletter click here CyberPro News Subscription. Please contact Lindsay Trimble regarding CyberPro subscription, sponsorship, and/or advertisement. All rights reserved. CyberPro may not be published, broadcast, rewritten or redistributed without prior NSCI consent. 110 Royal Aberdeen Smithfield, VA 23430 ph. (757) 871 - 3578 CyberPro National Security Cyberspace Institute P a g e | 1 Volume 2, Edition 17 CyberPro August 27, 2009 Keeping Cyberspace Professionals Informed TABLE OF CONTENTS This Week in CyberPro ........................................................................................................... 5 Education & Training ............................................................................................................. 6 Cyberspace – Big Picture ........................................................................................................ 8 Cyber-Attack Just a Click Away ................................................................................................................ 8 Time to Move Toward a More Secure Cyberspace .................................................................................. 8 Center for Cyberspace Research Awarded a $2.1 Million Grant ............................................................. 8 Government, Industry Create Threat Forum for Power Grid .................................................................... 9 International Perspectives: Cyber Security ............................................................................................... 9 Employers Crack Down on Social Networking, Web Surfing at Work ...................................................... 9 Cyberspace – U.S. Government ............................................................................................ 10 Making Cyber-Security a National Priority .............................................................................................. 10 NIST Eyes IT Lab Reorganization .......................................................................................................... 10 Guidelines Aim to Close Gaps in Cybersecurity ..................................................................................... 10 U.S. Pledges $1.2 Billion for Digital Health Networks ............................................................................ 11 Audit of Dept. of Energy Reveals Unaddressed Problems ..................................................................... 11 National Defense Network Created to Fight Cyber Attacks ................................................................... 11 Pre-Empting a Digital Pearl Harbor ........................................................................................................ 11 U.S. Cyber Leadership Debate .............................................................................................. 12 Langevin ‘Concerned and Disappointed’: Still No Cybersecurity Czar................................................... 12 Cybersecurity Resignations Raise Questions ........................................................................................ 13 Obama is Failing the Cybersecurity Test ................................................................................................ 13 Cyber Exits Lamented Coast to Coast ................................................................................................... 13 Janet Napolitano: The Cyber Czar? Part 2 ............................................................................................. 14 Cyberspace – Department of Defense (DoD) ........................................................................ 14 New Flash Drives Arrive on Market for DoD ........................................................................................... 14 Collaboration Key to Success in Cyber Operations................................................................................ 15 Breaking Down the Military Fiefdoms by Building a ‘Fifth Arm’ to Combat Cyber Security .................... 15 DoD Likely to Adopt Limited Social Networking ..................................................................................... 15 Signs of Support for DoD 2.0 .................................................................................................................. 15 National Guard Embraces Social Media ................................................................................................. 16 Butler Tapped for Cyber/Space Policy Slot ............................................................................................ 17 110 Royal Aberdeen Smithfield, VA 23430 ph. (757) 871 - 3578 CyberPro National Security Cyberspace Institute P a g e | 2 Volume 2, Edition 17 CyberPro August 27, 2009 Keeping Cyberspace Professionals Informed 24th Air Force Activated, 2 Units Realign in Joint Ceremony ................................................................. 17 Air Force Establishes New, ‘Reduced’ Cyber-War Command ............................................................... 17 Leaders Issue Joint Message, Define Cyber Mission............................................................................. 17 Northrop Grumman’s Cybersecurity Team Receives Army Information Operations Award Potentially Worth $430 Million .................................................................................................................................. 17 The Three-Star Navy Cyber Command .................................................................................................. 18 Navy CIO Says Cybersecurity is an Urgent National Issue .................................................................... 18 Cyberspace – Department of Homeland Security (DHS) ........................................................ 19 Agencies Struggling Over Control of Cybersecurity Overblown, say DHS Officials ............................... 19 DHS Plans Wiki for Agencies, Cybersecurity Centers to Coordinate Efforts ......................................... 19 DHS Plans Cybersecurity Wiki ............................................................................................................... 19 Cyberspace – International .................................................................................................. 20 Waging War on Gangsters Who Stalk the Internet................................................................................. 20 Citizen Soldiers Wage Cyberwar ............................................................................................................ 20 The Twitter Fiasco: A Bungled Caper by Russian Intelligence .............................................................. 20 Georgian Blogger Says Will Not Be Silenced ......................................................................................... 20 U.S. Tests Censorship Circumvention Tool; Chinese Shrug .................................................................. 21 China Scales Back Censorship Plans .................................................................................................... 21 British Government Puts a Food in It ...................................................................................................... 22 Management Plan Drawn for Meeting Crisis Out of Cyber Attacks ........................................................ 22 Cyberspace Research ........................................................................................................... 22 Botmaster: It’s All About Infecting, Selling Big Batches of Bots ............................................................. 22 Millions of E-mail Viruses Bypass Major Anti-Virus Engines .................................................................. 23 Social Sites Being Targeted More by Criminals ..................................................................................... 23 Botnets Go Public By Tweeting on Twitter ............................................................................................. 23 Criminals Increase Attacks on Social Networking Sites ......................................................................... 23 Survey: Social Networks Increasingly Blocked ....................................................................................... 24 Social Zombies Out for Your Network, Not Brains ................................................................................