|By Bob Gourley||
|December 2, 2012 10:03 PM EST||
By jose nazario
It’s been yet another busy month for all of us, and especially in this space (cyber conflict and cyber warfare). DARPA’s PlanX BAA was released along with a new BAA dubbed ‘VET’ to investigate hardware security based on the Congressional report on Huawei and ZTE, Syria cut off Internet for their citizens, and much more. The links below caught my eye as being notable events in the past month.
The three-day all-India executive meeting of the Rashtriya Swayamsevak Sangh (RSS), the 87-year-old organisation, came to an end at suburban Kelambakkam here on Sunday, with a call to formulate a comprehensive national security policy.
Contending that China posed a threat in cyber technology and communications, a resolution said the neighbouring country, with huge investments in cyber warfare security, had become so strong that it could cripple the technological capabilities of even advanced nations such as the U.S.
In a bid to boost cooperation in the cyber security domain, India and the UK today decided to to conduct their Cyber Dialogue on a bi-annual basis to achieve objectives such as reducing the risk of threats from cyberspace to international security and tackle cyber crime. This was announced after a comprehensive discussion between external affairs minister Salman Khurshid and his British counterpart William Hague on wide-ranging issues, including defence, counter-terrorism and cyber security.
A Joint Statement on Cooperation between India and the United Kingdom on Cyber Issues was also issued on the occasion.
MADISON, SD – Cyber warfare isn’t just a Hollywood plot line. It’s real. The United States is ramping up protection against a growing number of attacks on federal defense and security networks. If successful, foreign attackers could severely cripple those networks, leaving the nation vulnerable.
DAMASCUS – Syrian Internet and mobile phone links remained cut for a third straight day on Saturday, an AFP correspondent in Damascus reported, amid US accusations the government is deliberately seeking to deprive the opposition of communications.
Note: Over the weekend of December 1-2, 2012, Syrian connectivity was restored.
“DoD relies on millions of devices to bring network access and functionality to its users,” said Tim Fraser, DARPA program manager. ”Rigorously vetting software and firmware in each and every one of them is beyond our present capabilities, and the perception that this problem is simply unapproachable is widespread. The most significant output of the VET program will be a set of techniques, tools and demonstrations that will forever change this perception.”
DARPA is soliciting innovative research proposals in the area of understanding, planning, and managing military cyber operations in real-time, large-scale, and dynamic network environments. Plan X will conduct novel research into the nature of cyberwarfare and support development of fundamental strategies needed to dominate the cyber battlespace. Proposed research should investigate innovative approaches that enable revolutionary advances in science, devices, or systems. Specifically excluded is research that primarily results in evolutionary improvements to the existing state of practice.
Blogs & Opinion Pieces
Interestingly, the U.S. is in a good position to outspend its adversaries on proactive defense. Proactive defense can be our differentiator and a serious deterrent to war.
Cybersecurity policy must focus on solving the software security problem — fixing our broken systems first. We must refocus our energy on addressing the glass house problem instead of focusing on building faster, more accurate rocks to throw. We must identify, understand and mitigate computer-related risks. We must begin to solve the software security problem.
The Middle East is increasingly on the receiving end of cyber-warfare strikes, more so than any other region in the world, experts estimate. And the attacks have been among the most damaging.
The experts are now publishing their views. A draft manual outlining how existing international laws can be applied to conflicts in cyberspace was published by Cambridge University Press in September. Prepared by an international group of experts at the invitation of the North Atlantic Treaty Organization Cooperative Cyber Defence Centre of Excellence, the 215-page study “The Tallinn Manual on the International Law Applicable to Cyber Warfare” examines existing international law that allows countries to legally use force against other nations, as well as laws governing the conduct of armed conflict. The rules of conventional warfare are more difficult to apply in cyberspace, making this analysis critical.
Why Your Intuition About Cyber Warfare is Probably Wrong
by Matthew Miller, Jon Brickey and Gregory Conti
The laws of physics, however, are counterintuitive in cyberspace. In cyberspace, our understanding of the “laws of physics” is turned on its head. Weapons can be reproduced instantly, “bullets” travel at near the speed of light, destroyed targets can be brought back from the dead, and a seventeen year old can command an army. As human beings we are at a distinct disadvantage when thinking intuitively about cyber warfare. In this article we study where our intuition fails us in cyber warfare and suggest alternate ways to think about the conduct of cyber war that account for the vast differences between the kinetic and the non-kinetic fight. A correct understanding and appreciation of these differences and common misconceptions is absolutely necessary to conduct cyber warfare and to integrate cyber effects into the kinetic battlefield.
- Worldwide Indoor Location Market Growing at 46.0% CAGR to 2019 Says a New Research Report Available at RnRMarketResearch.com
- Mobility News Weekly – Week of August 17, 2014
- Tango Networks to Demonstrate Its Business Mobility Solutions at the CCA Annual Convention During CTIA 2014 Super Mobility Week
- Wireless Opportunities in Healthcare (The Market for Bluetooth, RFID, Zigbee, UWB WWAN, WMAN, WLAN and other technologies)
- IAB Mixx Awards 2014 Shortlist Showcases the Best in Digital Marketing Creativity That Works
- CEM - Customer Experience Management Market Growing at 17.3% CAGR to 2019: Forecast in New Research Report Available at RnRMarketResearch.com
- Digital Advertising Market (Online) Growing at 11.9% CAGR to 2019 Says a New Research Report Available at ReportsnReports.com
- CTIA Announces Emerging Technology, Hot for the Holidays and the MobITs Award Finalists
- Global Cyber Security Industry
- Wearable Technology Ecosystem: 2014 - 2020 - Opportunities, Challenges, Strategies, Industry Verticals & Forecasts
- Freelancer.com Fast 50 reveals a rise in data and engineering jobs as the Internet of Things takes off
- Customer Experience Management Market (VOC Analytics, Feedback Management, Web Analytics, Text Analytics, Speech Analytics) - Advanced Technologies, Touch Points, Adoption Trends, Market Size & Forecasts (2014 - 2019)
- MMA Global 2014 Smarties Shortlist Unveils The Best In Mobile Marketing From Around The Globe
- Global System-On-A-Chip Industry
- Lawful Interception Market 2014-2019 Forecasts (Network Technologies and Devices, Communication Content, End Users)
- Tiger Woods Sues Christensen Shipyards for Breaking Privacy Agreement
- Highlights From Ft. Lauderdale International Boat Show
- Cloud Expo 2011 East To Attract 10,000 Delegates and 200 Exhibitors
- Cloud Expo, Inc. Announces Cloud Expo 2011 New York Venue
- Virtualization Expo New York Call for Papers to Expire January 15, 2010
- Jim Liddle's Symbian Blog: Is the "Mobile Web" Already With Us ?
- Google Gang Unveils "gPhone" Platform, Android
- Jim Liddle's Symbian Blog: "GMAIL Mobile"
- Symbian Welcomes the Availability of Nokia's N72
- Jim Liddle's Symbian Blog: Opera Releases New Wireless Development Platform
- Best-Selling Author Scott McKain Joins Ulitzer
- Symbian & Open Source: The Momentum Grows
- How To Use Social Media in Your Job Search
- Unisys: A Clear Vision for Cloud Computing
- Surface RT: even more awesome with Windows RT 8.1