An interesting week in cyber warfare news. The revelation of an Iranian “second” virus has many discussing targeting techniques. In an interesting set of counter threads through the media one thread merges the messaging of cloud infrastructures (recent Amazon failures not discussed here but context should be noted) and the cyber conflict themes are starting to merge. Whether the late week article mentioning Jeffrey Carr stating cloud infrastructures will be targets of cyber warfare or the idea that they are more resilient. It is noticed that this merging of topics has interesting elements for a memetic implosion. Some of this can be seen in the weekend discussions of over hyped cyber warfare. There is a serious hype cycle to cyber warfare and many things get tossed into the pot that holds cyber warfare. Unfortunately not may of those “things” are going to make a good soup. It is pretty hard to make a case for “cyber warfare” when there is no doctrine, strategy, or tactics to back it up. Then again we waged an entire war on terrorism without any of those things either.
Monday April 25th
China’s decade-old cyberwar against the West ITworld.com April 22, 2011, 9:53 AM — Cyber espionage attacks from China are nothing new, but public awareness of the attacks is growing. A report by news service Reuters published last week warned that Chinese spies, affiliated with the People’s Liberation Army, … See all stories on this topic » |
||
Fifth Annual Joint Warfighting Conference and Expo Returns to Virginia Beach SunHerald.com … with opportunities to question experts about the latest policy and technology issues. Topics include future operations, humanitarian assistance and disaster relief, irregular warfare, ballistic missile defense, cyber warfare, and the defense budget. See all stories on this topic » |
||
|
||
|
||
Ongoing Attacks on Human Rights Web sites and the Problem of Attribution Information Warfare Monitor The problem of state attribution was brought up once again this week when Canadian resident and Chinese dissident with protected person status, Maggie Wenzhuo Hou, stepped up to warn against a “’silent cyber war” that was being launched by the Chinese … See all stories on this topic » |
||
Industrial espionage has a new bogeyman Business Times (subscription) ‘He’s obviously trying to sell a book,’ he said, referring to Mr Clarke’s new book on the topic,Cyberwar. Mr Rein, an American who has been based in Shanghai for the past nine years, said: ‘China is clearly the next superpower. … See all stories on this topic » |
Tuesday April 26th
Gearing up for cyber-warfare
Zawya
As technology and computers increasingly take over our everyday activities, what nations will fear most is cyber war warned former senior White House Adviser and cyber security expert Richard A. Clarke. Clarke was speaking at a Khalifa University …
See all stories on this topic »
Wednesday April 27th
|
||
To win the cyberwar we have to reinforce the cloud Financial Times If there were a cyberwar, I told Congress, we would lose. The unfortunate truth is that, a year later, we are no better prepared – and the stakes have risen. Since then more details have emerged on the early 2010 attacks on Google and two dozen other … See all stories on this topic » |
||
|
||
Bruins pest Brad Marchand thumbs nose at Habs’ Max Pacioretty tweet Vancouver Sun A comical if perhaps ill-advised message sent on his Twitter account during Saturday’s game touched off a ridiculous cyberwar between Montreal Canadiens and Boston Bruins fans, and might even have been the digital bulletin-board material that lit a … See all stories on this topic » |
||
Politics In 60 Seconds: What You Need To Know Right Now The Business Insider Mike McConnell persuasively argues that the US and its allies are ill-prepared for cyberwar and that immediate steps — especially “hardening” the cloud against attack — must be taken to avoid disaster. 8. The National Labor Relations Board (NLRB) has … See all stories on this topic » |
||
|
||
Reuters World News Highlights at 1358 GMT, April 25 TrustLaw TEHRAN – Iran has been targeted by a second computer virus in a “cyber war” waged by its enemies, its commander of civil defence said on Monday. PHANOM DONG RAK, Thailand – Thai and Cambodian troops clashed with guns and rocket-propelled grenades on … See all stories on this topic » |
Thursday April 28th
|
||
|
||
Iron Bow Technologies Achieves McAfee Elite Partner Status Business Wire (press release) Our partnership with industry leader McAfee demonstrates our commitment to provide the best-in-breed information security solutions and professional guidance that our customers require in this age of cyber warfare” Iron Bow offers a comprehensive … See all stories on this topic » |
||
BC has big role to play in election that’s no longer about nothing Vancouver Sun What should we make of these strategies in the brave new world of political cyberwar? It feels like the imminent future colliding with the receding past. Tories launch email bombardments of excruciating minutiae about photo ops in obscure ridings. … See all stories on this topic » |
||
7 Cloud Computing Security Emerging Vendors Datamation CEO Mike Gault gained in-the-trenches, cutting-edge cyber-security knowledge while living in Estonia when Russia launched one of the first “cyber-warfare attacks.” Calling it that is probably a bit sensationalist; nonetheless, in a country where 97% of … See all stories on this topic » |
||
|
||
Like a hurricane: Winds of good fortune are blowing for Colin James Ottawa Citizen Iran has been targeted by a second computer virus in a “cyber war” waged by its enemies, its commander of civil defence said on Monday. A BC company that takes tourists to the Great Bear Rainforest aboard a classic tall ship has been heralded by … See all stories on this topic » |
Friday April 29th
Over the Horizon: Crafting an IR Professional’s Reading List World Politics Review Books that were considered but that didn’t make the list included Charli Carpenter’s “Forgotten Children Born of War,” Stephanie Carvin’s “Prisoners of America’s Wars,” Richard Clarke’s “CyberWar,” John Mueller’s “Atomic Obsession,” and Sebastian … See all stories on this topic » |
Iran victim of second virus attack Hindustan Times Iran has been targeted by a second computer virus in a cyber war being waged by its enemies, its commander of civil defence said. Gholamreza Jalali told Mehr news agency the new virus, called Stars, was being investigated by experts. … See all stories on this topic » |
Weekend
Are we talking “cyber war” like the Bush admin talked WMDs? Ars Technica As a consequence, the public is treated to a regular diet of draconian fare coming from Sixty Minutes and Fresh Air about the “growing cyberwar threat.” Former National Security Adviser Richard A. Clarke suggests a thought exercise in his hit book … See all stories on this topic » |
||
Cyberwar Is Harder Than It Looks Reason Online A January report by the UK-based market research firm Visiongain identifies cyberwar preparedness as the “single greatest growth market in the defense and security sector,” forecasting that global spending will reach $12.5 billion this year. … See all stories on this topic » |
||
China’s infrastructure a doddle to hack TechEye While China is being identified as one of the main experts of cyber warfare, the nation had better hope that it never engages troops with a rival country, according to Threat Post. Dillon Beresford, a security researcher with testing firm NSS Labs said … See all stories on this topic » |
||
Sony Faces Legal, Regulatory Backlash Over Playstation Breach; Shares Fall Bloomberg Photographer: Robert Gilhooly/Bloomberg April 27 (Bloomberg) — Jeffrey Carr, author of “InsideCyber Warfare: Mapping the Cyber Underworld,” talks about a possible security breach at Sony Corp. Sony warned its 77 million PlayStation Network and … See all stories on this topic » |
||
FBI Seeks OK To Kill Malware as Attackers Boost Yields NewsFactor Network And Symantec reports criminals are refining their malware targets for maximum yields, and even moving into cyberwar. As the Coreflood botnet grabs users’ private information, the US is seeking those users’ permission to directly remove the malware. … See all stories on this topic » |
||
Iran Sees Stars as It Detects Second Computer Worm The Media Line It also raises the question of how Iran could retaliate for cyber warfare against an anonymous foe. Jalali told the Iranian Mehr news agency that Stars had targeted government computer programs by disguising itself as an ordinary computer file. … See all stories on this topic » |
||
Glass Dragon: China’s Cyber Offense Obscures Woeful Defense Threatpost (blog) I was reading a lot about cyber war and the capabilities of PRC and PLA. I was hearing a lot about the vulnerability of US critical infrastructure, so I got interested in China and wanted to find out about its infrastructure – map out the flashpoints. … See all stories on this topic » |
||
|
||
|
||
Carr Says Cloud Platform `Preferred Target’ of Hackers Washington Post April 27 (Bloomberg) — Jeffrey Carr, author of “Inside Cyber Warfare: Mapping the Cyber Underworld,” talks about a possible security breach at Sony Corp. Sony warned its 77 million PlayStation Network and Qriocity online service customers that their … See all stories on this topic » |
||
Report: British Firm Offered Spy Software To Egypt Forbes (blog) … stole thousands of emails from the digital intelligence contractor HBGary Federal in February, revealing that the company had been working on proposals to spy on and discredit supporters of WikiLeaks using tactics associated with cyber warfare. … See all stories on this topic » |
Cyberwar Hype Comes Under Increasing Scrutiny Forbes (blog) By SEAN LAWSON This week, the Mercatus Center at George Mason University released the second in a series of working papers that address the growing concern over cyberwar. In that paper, “Loving the Cyber Bomb? The Dangers of Threat Inflation in … See all stories on this topic » |
||
US-Russian dictionary defines cyber war, other concepts GCN.com At the other end of the spectrum, cyber war is “an escalated state of cyber conflict between or among states in which cyberattacks are carried out by state actors against cyber infrastructure as part of a military campaign,” either declared or … See all stories on this topic » |
||
|
||
Government can’t secure cyberspace alone, says DHS secretary FCW.com Although the military has established a Cyber Command with responsibility for defending military cyberspace and for responding to and waging cyber war, this responsibility does not officially extend to civilian critical infrastructure. … See all stories on this topic » |
xxx