Items Tagged with "National Security"
April 13, 2012 Added by:Headlines
“We’re trying to think about cyber operations as a new form of policy tool that gives the president or the secretary of defense new options. We’re not actively looking to mount operations in cyberspace... We want to do it only when appropriate and when there’s a good reason to.."
April 12, 2012 Added by:Scot Terban
In the rar file that was uploaded to multiple locker sites were five video files that were taken from the internet and re-purposed for the release. Metadata from the files shows that they were handled on a Windows machine using the following software...
April 11, 2012 Added by:Headlines
"What we're looking at is a global cyber arms race. It's not proceeding at a leisurely or even a linear fashion but in fact is accelerating. I wouldn't claim that it's following Moore's law, but the curve looks kind of similar," said U.S. Cyber Command's Rear Admiral Samuel Cox...
April 10, 2012 Added by:Dan Dieterle
When you think of USCYBERCOM, the Air Force comes to mind immediately. Since the beginning, the Air Force has been a driving force behind US Cyber War. But there is another group that is more responsible for the creation of USCYBERCOM and actually forms the Command’s backbone...
April 09, 2012 Added by:Headlines
"Our nation is under constant attack... from individuals stealing personal financial information to sophisticated terrorist networks seeking to hack into our electrical grid and be a detriment to our way of life. Our nation continues to seek out and employ the best and brightest..."
April 09, 2012 Added by:Headlines
As commander of 50 NOG, Sutherland is responsible for 1,500 military, DoD civilian and contractor personnel assuring access to cyberspace by operating and maintaining the $6.2 billion Air Force Satellite Control Network and the $100 million communications and information gateway...
April 09, 2012 Added by:Joe Weiss
I was asked by DOD how to get an organization to address OT security. The only chance for OT security to succeed is if senior management drives it. There are only a few utilities whose senior management mandated they be secure not just compliant. What a sorry commentary...
April 07, 2012 Added by:Joel Harding
DOE is in charge of locating and fixing critical infrastructure problems within the energy sector. Do they, in turn, report to DHS if it has to do with critical infrastructure? Does DHS oversee DOE’s cybersecurity problems, their critical infrastructure problems or...?
April 06, 2012 Added by:Scot Terban
The military and the government movers and shakers are all moving with fear tinged with desire, for more control over the internet as a whole while the beltway bandits are all in the wings, like a murder of crows watching dark eyed, waiting for their moment to strike...
April 05, 2012 Added by:Headlines
By improving our ability to extract knowledge and insights from large and complex collections of digital data, the initiative promises to help accelerate the pace of discovery in science and engineering, strengthen our national security, and transform teaching and learning...
April 03, 2012 Added by:Scot Terban
The terrorists may aspire to this, as nebulous as that aspiration can be from an image like the one in question. This in NO WAY means we are doomed or that NYC will be seeing an attack like 9/11 again directly relating to this piece of so called artwork...
April 03, 2012 Added by:Joel Harding
The Congressman was obviously attempting to either persuade the US China Economic and Security Commission or reassure them about Huawei. He passionately made a one-sided statement but failed to provide any evidence aside from one news report in that day’s Washington Post...
April 03, 2012 Added by:Don Eijndhoven
Making your own arbitrary definition of Cyber Warfare and discounting MOUNTAINS of evidence that undermine your point isn't very scholarly to say the least. Can we please stop giving a stage to these people who are obviously cherry-picking their way to an uninformed argument?
April 02, 2012 Added by:Headlines
“Every day U.S. businesses are targeted by nation-state actors like China for cyber exploitation and theft. This consistent and extensive cyber looting results in huge losses of valuable intellectual property, sensitive information, and American jobs..."
March 30, 2012
The exploitation of information technology (IT) products and services through the global supply chain is an emerging threat that could degrade the confidentiality, integrity, and availability of critical and sensitive agency networks and data...
March 29, 2012 Added by:Headlines
“Today, we’re in the forensics mode. We need to see the attack. If we can’t see the attack, we can’t stop it. We have to have the ability to work with industry - our partners - so that when they are attacked, they can share that with us immediately,” said Gen. Keith Alexander...