Cyberpro October 22, 2009
Total Page:16
File Type:pdf, Size:1020Kb
Volume 2, Edition 21 CyberPro October 22, 2009 Keeping Cyberspace Professionals Informed Officers The articles and information appearing herein are intended for President educational purposes to promote discussion in the public interest and to Larry K. McKee, Jr. keep subscribers who are involved in the development of Cyber-related concepts and initiatives informed on items of common interest. The Chief Operations Officer newsletter and the information contained therein are not intended to Jim Ed Crouch provide a competitive advantage for any commercial firm. Any misuse or unauthorized use of the newsletter and its contents will result in removal ------------------------------ from the distribution list and/or possible administrative, civil, and/or CyberPro Editor-in-Chief criminal action. Lindsay Trimble The views, opinions, and/or findings and recommendations contained in CyberPro Research Analyst this summary are those of the authors and should not be construed as an Kathryn Stephens official position, policy, or decision of the United States Government, U.S. Department of Defense, or National Security Cyberspace Institute. CyberPro Archive To subscribe or unsubscribe to this newsletter click here CyberPro News Subscription. Please contact Lindsay Trimble regarding CyberPro subscription, sponsorship, and/or advertisement. All rights reserved. CyberPro may not be published, broadcast, rewritten or redistributed without prior NSCI consent. 110 Royal Aberdeen Smithfield, VA 23430 ph. (757) 871 - 3578 CyberPro National Security Cyberspace Institute P a g e | 1 Volume 2, Edition 21 CyberPro October 22, 2009 Keeping Cyberspace Professionals Informed TABLE OF CONTENTS This Week in CyberPro ........................................................................................................... 5 Cyber Jihad – Use of the virtual world .................................................................................... 6 Panel: How business can beat hackers at their own game .................................................... 11 Education & Training ........................................................................................................... 12 Cyberspace – Big Picture ...................................................................................................... 13 Some Key Events in the History of Cyber Warfare ................................................................................. 13 Top Tech Firms Back Net-Neutrality Rules ............................................................................................ 13 Cyber Consortium Gets $2.7 Million Grant ............................................................................................. 13 SC World Congress: Feds Talk Cybersecurity ....................................................................................... 13 Cyberspace – U.S. Government ............................................................................................ 14 House Panel Plans Cybersecurity Training Sessions for Members and Staff ....................................... 14 White House Blogs Cybersecurity .......................................................................................................... 15 White House Warns Public on Cyber Threat .......................................................................................... 15 Hathaway Joins Kennedy School as Senior Adviser .............................................................................. 15 Cyber Security: California to Join U.S. Cyber Challenge ....................................................................... 15 Recruiting 11,000 IT Workers ................................................................................................................. 16 CIA Building Secure Cloud-Based System ............................................................................................. 16 NASA Systems and Data Vulnerable to Hackers, Malicious Employees ............................................... 16 Cyberwar Readiness Recast as Low Priority ......................................................................................... 17 FBI Takes to Planes in Global Fight Against Cybercrime ...................................................................... 17 U.S. Cyber Leadership Debate .............................................................................................. 18 Hacker Jeff Moss: Inter-Agency Turf War Plague Cybersecurity Effort ................................................. 18 Cyberspace – Department of Defense (DoD) ........................................................................ 19 U.S. Cyber Command Now Fully Online, and Seeking a Few Good Geeks .......................................... 19 DARPA, Microsoft, Lockheed Team Up to Reinvent TCP/IP ................................................................. 19 Pentagon Officials Stress Cybersecurity ................................................................................................ 19 Pentagon Backs Off Cloud Availability Claims ....................................................................................... 19 How DoD’s Bob Lentz Changed the Role of Chief Information Security Officer .................................... 20 U.S. Navy Creates Command to Maintain Cyber Supremacy ................................................................ 20 The Information Dominance Corps ......................................................................................................... 20 Fort Meade to be Cyber Defense Home ................................................................................................. 20 110 Royal Aberdeen Smithfield, VA 23430 ph. (757) 871 - 3578 CyberPro National Security Cyberspace Institute P a g e | 2 Volume 2, Edition 21 CyberPro October 22, 2009 Keeping Cyberspace Professionals Informed Yep, Computers for Offensive Ops ......................................................................................................... 21 Air Force Activates New Cyberspace Defense Unit ............................................................................... 21 Keesler AFB Begins Cyber Warfare Training ......................................................................................... 21 Cyberspace – Department of Homeland Security (DHS) ........................................................ 22 DHS Web Sites Vulnerable to Hackers, IG Says ................................................................................... 22 Cyberspace – International .................................................................................................. 22 Cyberwar: Sooner or Later, or Now ........................................................................................................ 22 IMPACT Boss Warns of Long Struggle with Cyber Crime ..................................................................... 22 National Cybersecurity Agencies Most Effective Against Cyber Attacks: IMPACT Chairman ............... 23 U.N. Warns the Next World War will be Online ...................................................................................... 23 U.S. Gen. Urges More Effort Against Cyber Attacks .............................................................................. 23 State to Award Social Networking Grants in Middle East, Africa ........................................................... 23 EU Signs Up New Cyber-Security Boss ................................................................................................. 24 Polish Government Cyberattack Blamed on Russia............................................................................... 24 ‘Hack Idol’ To Find Top UK Cyberwarriors ............................................................................................. 24 S. Korea’s Classified Information Withdrawn via Hacking: Official ......................................................... 24 Report: NKorea Hackers Steal SKorea Toxic Secrets ........................................................................... 25 Cyberspace Research ........................................................................................................... 25 Gartner: Loosen Up on Social Networks, Security ................................................................................. 25 Classic Cyber Crimes Could Pose Future Threats ................................................................................. 26 Cybersecurity Provider Says Most Agencies Have Already Been Attacked .......................................... 26 U.S. Must Focus on Protecting Critical Computer Networks from Cyber Attack, Experts Urge ............. 26 Cyber Terrorism Demands New Tactics: Study ..................................................................................... 26 Study: U.S. Should Focus on Protecting Critical Computer Networks ................................................... 27 SSL Still Mostly Misunderstood .............................................................................................................. 27 Enterprises Confident in Defenses Against External Attacks, Study Says ............................................ 27 Cyberspace Hacks and Attacks ............................................................................................. 28 How Hackers Find Your Weak Spots ..................................................................................................... 28 Fake Security Software in Millions of Computers: Symantec ................................................................