What U.S. Cyber Command Must Do |
- What U.S. Cyber Command Must Do
- Google Confirms That It Fired Engineer For Breaking Internal Privacy Policies
- BC Lotteries kept minister in the dark about PlayNow security breach
- Who Is a Big Fan of ArcSight? The CIA
- Siemens: Stuxnet worm hit industrial systems
- Advice to Security Pros: Learn Chinese
- Sienna Miller set to sue 'News of the World' over phone hacking
What U.S. Cyber Command Must Do Posted: InfoSec News: What U.S. Cyber Command Must Do: http://www.ndu.edu/press/what-US-cyber-command-must-do.html By Wesley R. Andrues Joint Force Quarterly Issue 59 - October 2010 Wesley R. Andrues is the Plans and Readiness Division Chief for the U.S. Army Global Network Operations Center. In June 2009, the Secretary of Defense announced the creation of U.S. Cyber Command (USCYBERCOM), a new subunified command to be led by the director of the National Security Agency (NSA). While the press colored the announcement with Big Brother undertones and hints of civil liberties surrendered, the real story lies in the intriguing legal landscape of USCYBERCOM and what it could mean for the security, efficiency, and economy of the military's networks. The Department of Defense (DOD), the largest single consumer of Federal information technology dollars, has struggled for decades to bring a singular voice and management process to its communications infrastructure. Although this is not the stated intent of the new command, USCYBERCOM must ultimately reconcile its role in information technology "ownership" and draw clear operational boundaries if it is to administer cyber security through unified standards and procedures. As USCYBERCOM now has its first commander and begins shaping its core functions, fundamental changes in the legal landscape must occur in parallel with the new organizational structure if the command hopes to effect a "comprehensive approach to Cyberspace Operations."1 In short, it must go beyond cosmetic organizational change and set to work on a campaign that genuinely reduces interdepartmental friction, repairs ailing processes, and truly empowers it to meet its mission, both specified and implied. Step One: Establish Priorities To compel its components to organize confidently and appropriately, USCYBERCOM must provide solid, intuitive operational imperatives and priorities. What tangible problem does the command seek to solve, and how does the formation of this single entity contribute to the integrity of DOD networks? One of the main impediments to answering this question is the lack of any meaningful cyberspace doctrine, or at least a serious consideration of how cyberspace operations differs from the closely related computer network operations, which is itself a key component of information operations. How does the emerging rubric of cyber now fit against the broad operational backdrop of information operations as a whole? This is an elemental question that demands top-down clarification if USCYBERCOM expects to contain its mission space and lead decisively. The question must be answered: Is it about securing the network itself, or achieving military effects through the targeted application of information in all its forms? To call it both takes a middle road that complicates the identity of this new command and makes task organization exceedingly difficult. It is not that DOD has failed to invest intellectual capital toward defining cyberspace. On the contrary, a good deal of self-examination is under way across all the Services, yet precious little substance has emerged signifying a strong, novel environmental foundation. To its credit, the Joint Staff devoted significant effort toward articulating broad cyberspace priorities in its National Military Strategy for Cyberspace Operations (2006). The basic premise echoed the notion that the United States must secure freedom of action in a "contested domain" and deny the same to its adversaries, yet its ambitious goal of achieving "military strategic superiority in cyberspace" glosses over the vast complexity of such an all-consuming endstate. [...] |
Google Confirms That It Fired Engineer For Breaking Internal Privacy Policies Posted: InfoSec News: Google Confirms That It Fired Engineer For Breaking Internal Privacy Policies: http://techcrunch.com/2010/09/14/google-engineer-spying-fired/ By Jason Kincaid TechCrunch September 14, 2010 Earlier today Gawker published an alarming report detailing the exploits of a former Google engineer who allegedly used his internal clearances [...] |
BC Lotteries kept minister in the dark about PlayNow security breach Posted: InfoSec News: BC Lotteries kept minister in the dark about PlayNow security breach: http://www.vancouversun.com/Lotteries+kept+minister+dark+about+PlayNow+security+breach/3523910/story.html By Chat Skelton Vancouver Sun September 14, 2010 BC Lotteries CEO Michael Graydon failed to immediately inform the government about the July 15 security breach at its online casino, [...] |
Who Is a Big Fan of ArcSight? The CIA Posted: InfoSec News: Who Is a Big Fan of ArcSight? The CIA: http://blogs.wsj.com/venturecapital/2010/09/14/who-is-a-big-fan-of-arcsight-the-cia/ By Michael Corkery Venture Capital Dispatch The Wall Street Journal September 14, 2010 How good is ArcSight’s security software? Well, good enough for the Central Intelligence Agency. [...] |
Siemens: Stuxnet worm hit industrial systems Posted: InfoSec News: Siemens: Stuxnet worm hit industrial systems: http://www.csoonline.com/article/614064/siemens-stuxnet-worm-hit-industrial-systems By Robert McMillan IDG News Service September 14, 2010 A sophisticated worm designed to steal industrial secrets and disrupt operations has infected at least 14 plants, according to Siemens. [...] |
Advice to Security Pros: Learn Chinese Posted: InfoSec News: Advice to Security Pros: Learn Chinese: http://www.bankinfosecurity.com/articles.php?art_id=2914 By Upasana Gupta Contributing Editor Bank Info Security September 14, 2010 Stephen Northcutt, CEO of SANS Technology Institute, has a piece of advice for up and coming security professionals. "Learn Chinese; you are going to need it. [...] |
Sienna Miller set to sue 'News of the World' over phone hacking Posted: InfoSec News: Sienna Miller set to sue 'News of the World' over phone hacking: http://www.independent.co.uk/news/media/press/sienna-miller-set-to-sue-news-of-the-world-over-phone-hacking-2079555.html By Ian Burrell Media Editor The Independent 15 September 2010 The actress Sienna Miller is poised to become the latest litigant to [...] |
You are subscribed to email updates from [ISN] InfoSec News Mailing List To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |
0 comments:
Post a Comment