Crossroads Blog | Institute National Security and Counterterrorism

Current Affairs, cyber attack, Cyber Exploitation, technology

Today’s Cybernews

On November 4th, 2011, Reuters reported how China scorned the most recent report by the Office of the National Counterintelligence Executive (see blog post below) and called it irresponsible.  In a shocking turn of events, Chinese Foreign Ministry spokesman Hong Lei rejected the report and repeated Beijing's long-standing position that it is a victim of cyberattacks.  Hong told reporters that "I hope the international community can abandon prejudice and work hard with China to maintain online security."

***

With the release of the National Counterintelligence Executive report and and the recent criticisms of Russia and China, one has to wonder if the United States has clean hands.  Jack Goldsmith wrote for Lawfare how the US does not engage in broad-ranging industrial or economic espionage, but still does so on a limited scale.  Citing a 1996 report, Goldsmith believes that "U.S. intelligence agencies do not collect proprietary information of foreign commercial firms to benefit private firms in the United States, but they do identify situations abroad where U.S. commercial firms are being placed at a competitive disadvantage as a result of unscrupulous actions, e.g. bribery and kickbacks.”  Moreover, Goldsmith quoted Former CIA Director James Woolsey's comments that the US steals secrets from foreign corporations for three reasons:  "(1) to understand how sanctions regimes are operating; (2) to monitor dangerous dual-use technologies in private hands; and (3) to learn about bribery practices."

***

Wired's Danger Room reported on how DARPA is funding an intricate misidentification program to track digital intruder's movements.  The program, run by Columbia University, generates bogus documents in classified networks and then tracks intruders who use the documents.  The program aims to "scare off uninvited riff-raff as well as minimize insider threats, one of the greatest vulnerabilities in military networks."   

***

On November 3rd, the Sacramento Bee reported how U.S. Strategic Command (USSTRATCOM) will be holding a Cyber and Space Symposium titled "Space and Cyber: New Challenges, New Opportunities", from November 15-17, 2011.  The event will "provide an exciting venue for information exchange among leaders in cyber and space" and "offer space and cyber security professionals an unparalleled opportunity for education, interactive discussion and exposure to the latest technologies."  Among those attending include Gen C. Robert Kehler (Commander, Strategic Command), Gen Keith B. Alexander (Commander, US Cyber Command and Director, NSA) and Howard Schmidt, White House Cybersecurity Coordinator. 

***

Finally, the Onion (satire!) interviewed several ordinary citizens on their thoughts about hackers and cybersecurity.  One citizen was quoted as saying "The danger is evident. We must post tanks at the entrances to all cyber cafes immediately."  I couldn't agree more. 

Leave a Reply

Current Affairs, cyber attack, Cyber Exploitation, technology

Today’s Cybernews

On November 4th, 2011, Reuters reported how China scorned the most recent report by the Office of the National Counterintelligence Executive (see blog post below) and called it irresponsible.  In a shocking turn of events, Chinese Foreign Ministry spokesman Hong Lei rejected the report and repeated Beijing's long-standing position that it is a victim of cyberattacks.  Hong told reporters that "I hope the international community can abandon prejudice and work hard with China to maintain online security."

***

With the release of the National Counterintelligence Executive report and and the recent criticisms of Russia and China, one has to wonder if the United States has clean hands.  Jack Goldsmith wrote for Lawfare how the US does not engage in broad-ranging industrial or economic espionage, but still does so on a limited scale.  Citing a 1996 report, Goldsmith believes that "U.S. intelligence agencies do not collect proprietary information of foreign commercial firms to benefit private firms in the United States, but they do identify situations abroad where U.S. commercial firms are being placed at a competitive disadvantage as a result of unscrupulous actions, e.g. bribery and kickbacks.”  Moreover, Goldsmith quoted Former CIA Director James Woolsey's comments that the US steals secrets from foreign corporations for three reasons:  "(1) to understand how sanctions regimes are operating; (2) to monitor dangerous dual-use technologies in private hands; and (3) to learn about bribery practices."

***

Wired's Danger Room reported on how DARPA is funding an intricate misidentification program to track digital intruder's movements.  The program, run by Columbia University, generates bogus documents in classified networks and then tracks intruders who use the documents.  The program aims to "scare off uninvited riff-raff as well as minimize insider threats, one of the greatest vulnerabilities in military networks."   

***

On November 3rd, the Sacramento Bee reported how U.S. Strategic Command (USSTRATCOM) will be holding a Cyber and Space Symposium titled "Space and Cyber: New Challenges, New Opportunities", from November 15-17, 2011.  The event will "provide an exciting venue for information exchange among leaders in cyber and space" and "offer space and cyber security professionals an unparalleled opportunity for education, interactive discussion and exposure to the latest technologies."  Among those attending include Gen C. Robert Kehler (Commander, Strategic Command), Gen Keith B. Alexander (Commander, US Cyber Command and Director, NSA) and Howard Schmidt, White House Cybersecurity Coordinator. 

***

Finally, the Onion (satire!) interviewed several ordinary citizens on their thoughts about hackers and cybersecurity.  One citizen was quoted as saying "The danger is evident. We must post tanks at the entrances to all cyber cafes immediately."  I couldn't agree more. 

Leave a Reply

Bitnami