DARPA Is Using Oculus Rift To Build The ‘Mega Man Battle Network’ Of Cyberwarfare

oculus-mega-man In a surprising amount of futuristic visions of how hacking will work in the future, the experience is immersive, rather than something done hunched over a computer looking at lines of code scroll by. DARPA appears to agree with the full-body submersion vision of hacking’s future, as it’s working on an Oculus Rift-based interface for use by U.S. military hackers, one part of its Plan… Read More

The Stuxnet Worm Had an Evil Secret Twin

The Stuxnet Worm Had an Evil Secret Twin

It’s been over three years since the discovery of the Stuxnet worm, but new revelations continue to trickle out from the cybersecurity community. Actually, this latest one is more of a torrent than a trickle: Turns out Stuxnet had an evil secret twin.

Read more…


    



UK cyber defense unit promises to ‘strike back’ at enemies

UK cyber defense unit promises to 'strike back' at enemies

The UK government announced last December that it was building a “Cyber Reserve” to protect itself, and now it has a few more details to divulge. Crucially, rather than merely focusing on defending the country from attacks, it’ll also have an “offensive capability” to help it act as a deterrent. Speaking to the Daily Mail, Defense Secretary Philip Hammond said Britain needs to be able to “strike back in cyber space against enemies who attack us, putting cyber alongside land, sea, air and space as a mainstream military activity.”

Although it’s a fair guess to suspect that other countries are honing offensive cyber skills too, the Financial Times reckons that the UK is the first nation to admit it’s doing so. According to Hammond, the strikes could be used to disable enemy chemical weapons, communications, planes, ships and hardware. As for the forces carrying them out, they could be given a budget of up to £500 million ($800 million). Work on the Joint Cyber Reserve is already underway, with reservist recruitment scheduled to start next month. If the required physical military test intimidates you, there’s nothing to worry about: a less rigorous version will be used to let those of us with desk-bound physiques protect (and fight for) the Queen.

Filed under:

Comments

Via: Financial Times

Source: Daily Mail

Washington Post report details how often security agencies break into other networks

The latest national security related revelation to come from the documents leaked by Edward Snowden is an account of how offensive computer operations work, and how many there are. The Washington Post reports that in 2011, 231 took place with about three quarters of them against “top-priority” targets, which its sources indicate include Iran, Russia, China and North Korea. Also interesting are details of software and hardware implants designed to infiltrate network hardware, persist through upgrades and access other connected devices or networks. The effort to break into networks is codenamed Genie, while the “Tailored Access Operations” group custom-builds tools to execute the attacks. One document references a new system “Turbine” that automates control of “potentially millions of implants” to gather data or execute an attack. All of this access isn’t possible for free however, with a total cyber operations budget of $1.02 billion which includes $25.1 million spent this year to purchase software vulnerabilities from malware vendors. Get your fill of codenames and cloak-and-dagger from the article posted tonight, or check out the “Black Budget” breakdown of overall intelligence spending.

Filed under:

Comments

Source: Washington Post (1), (2)

Banks brace for cyberwarfare drill Quantum Dawn 2

Banks brace for cyberwarfare drill Quantum Dawn 2

Come June 28th, Wall Street outfits including the likes of Citigroup and Bank of America will be under siege — from fake hackers, that is. Representatives from a total of 40 companies along with the Federal Reserve, Securities and Exchange Commission, US departments of Treasury and Homeland Security will take part in Quantum Dawn 2: a simulated cyberattack on faux trading and information systems. Led by the Securities Industry and Financial Markets Association, the drill will test the ability of participants to cooperate via email and phone to suss out what’s going on and hatch a plan. The exercise will momentarily pause so that those involved can decide on a course of action, and then it’ll speed up and model the effects of the decision over a longer period of time. With the recent flurry of hacking incidents and international finger pointing, something tells us this won’t be the last we hear of drills like Quantum Dawn.

[Image credit: MoneyBlogNewz, Flickr]

Filed under:

Comments

Via: AllThingsD

Source: Reuters

Obama ordered cyber attack target list to be created, according to leaked document

Obama ordered cyber attack target list to be created

President Obama hasn’t been shy about engaging the public and other nations on digital issues, and that includes the idea of cyber warfare. While his administration has been pretty aggressive in building up our cyber defenses, our offensive capabilities have remained somewhat more mysterious. According to a leaked document obtained by the Guardian, the White House has made moves to seriously step up its digital arsenal. In fact, it appears that a Presidential Policy Directive issued in October (though, never released for public consumption) ordered that a list of over-seas targets be drawn up for potential future offensives. Offensive Cyber Effects Operations (or OCEOs) are cited in the directive as having “unique and unconventional capabilities to advance US national objectives around the world.” It then goes on to say that the government will, “identify potential targets of national importance where OCEO can offer a favorable balance of effectiveness and risk as compared with other instruments of national power.”

The more aggressive approach to battling foreign nations through the internet is likely to raise concerns in certain circles about the weaponization of the web. Of course, such fears about militarization aren’t completely unwarranted. But with countries like China posing serious digital threats, government officials will likely see the moves as necessary. The document also says that any operations must abide by US and international law, though, we doubt any suggestions that our government blatantly ignore such rules would ever be put down on paper. The leak of the document follows hot on the heels of the growing PRISM scandal, which has put the nations digital policies front and center in the public’s mind.

Filed under:

Comments

Source: The Guardian

South Korea defense ministry reportedly crafts a cyber policy group to unify its security

South Korea defense ministry reportedly crafts a cyber policy group to unify its security

If you hadn’t heard, South Korea’s under a lot of pressure lately, including a spate of internet-based attacks against banks and broadcasters on March 20th that some worry (though can’t confirm) was the result of a large-scale hacking campaign. The country won’t simply stand idle and brace for another hit, according to the Yonhap News Agency. It understands from an unnamed senior official that South Korea’s Ministry of Defense is complementing its Cyber Command division with a policy group, not unlike a UK equivalent, that would coordinate online security across different military sections, including the refinement of a defensive cyberwarfare strategy and recruiting more people to bulk up the digital front lines. Provided the claim is accurate, the division would be up and running before the first half of the year is over — and likely not a moment too soon.

[Image credit: John Pavelka, Flickr]

Filed under: ,

Comments

Via: The Next Web

Source: Yonhap News Agency

Tallinn Manual defines the legal groundwork for cyberwarfare

Tallinn Manual defines the legal groundwork for cyberwarfare

The advent of cyberwarfare raises any number of legal quandaries, let alone ethical ones: when it’s possible to do serious damage without crossing a border or firing a shot, where do you stop? NATO’s Cooperative Cyber Defence Centre of Excellence (CCDCOE) is publishing the finished version of a non-binding guide, the Tallinn Manual, that could settle at least the legal disputes. For the most part, it demands a measured, one-for-one response and attempts to minimize collateral damage. Digital retaliation is appropriate if the state is a victim of a hacking attack, but bombs and guns should only come into play if virtual combat leads to real casualties. Any attacks should likewise steer clear of civilians, and simply having the capacity or desire for a hacking campaign doesn’t make someone a target — there has to be an “imminent” threat to justify a preemptive strike. NATO isn’t formally adopting the Tallinn Manual as policy, and it’s difficult to know whether the organization’s member nations (or any other country) would honor the guidelines when parties on all sides have been pushing the boundaries of cyberwarfare for years. Still, we’ll have to start somewhere if we want to draw a line in the silicon.

[Image credit: US Army, Flickr]

Filed under: ,

Comments

Via: TechWeek Europe

Source: CCDCOE

China claims its defense sites face constant US hacking attacks

China claims its defense sites face constant US hacking attacks

China is routinely accused of launching concerted hacking campaigns against the US, many of them reportedly tied directly to the army’s Unit 61398 in Shanghai. If you believe the Ministry of Defense’s spokesman Geng Yansheng, however, just the opposite is true. Along with claiming that China would never hurt (or rather, hack) a fly, he asserts that the Ministry and China Military Online sites faced an average of 144,000 hacking attempts per month from foreign sources in 2012, 62.9 percent of which allegedly came from the US. The Ministry’s man stops short of leveling cyberwarfare charges, although he notes the US’ recent plans to expand and formally define its cyberwar strategy. There’s some ‘splainin to do, he argues. While there isn’t a formal US response, we suspect that neither side is an innocent dove here — China is just the most recent to cry foul.

Filed under:

Comments

Via: Reuters

Source: Ministry of National Defense (translated)

Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare

Kaspersky Labs preps its own OS to guard industry against cyberwarfare

Kaspersky Labs’ namesake Eugene Kaspersky is worried that widely distributed and potentially state-sponsored malware like Flame and Stuxnet pose dire threats to often lightly protected infrastructure like communication and power plants — whatever your nationality, it’s clearly bad for the civilian population of a given country to suffer even collateral damage from cyberattacks. To minimize future chaos and literally keep the trains running, Kaspersky and his company are expanding their ambitions beyond mere antivirus software to build their own, extra-secure operating system just for large-scale industry. The platform depends on a custom, minimalist core that refuses to run any software that isn’t baked in and has no code outside of its main purposes: there’ll be no water supply shutdowns after the night watch plays Solitaire from an infected drive. Any information shared from one of these systems should be completely trustworthy, Kaspersky says. He doesn’t have details as to when the OS will reach behind-the-scenes hardware, but he stresses that this is definitely not an open-source project: some parts of the OS will always remain confidential to keep ne’er-do-well terrorists (and governments) from undermining the technology we often take for granted.

Filed under:

Kaspersky Labs preps its own OS to guard vital industry against cyberwarfare originally appeared on Engadget on Tue, 16 Oct 2012 13:28:00 EDT. Please see our terms for use of feeds.

Permalink The Next Web  |  sourceEugene Kaspersky, Securelist  | Email this | Comments