Showing posts with label virus. Show all posts
Showing posts with label virus. Show all posts

GCIS INTELLIGENCE BRIEFING: Securing critical infrastructure no short term fix, experts say


 

ISSUED BY: GCIS Communications Command Center

SOURCE: Homeland Security NewsWire

01April2011 8:59amEST

GCIS INTELLIGENCE UPDATE: Federal officials have long sought to secure critical infrastructure from potential attack, and recent events like the 2003 blackouts and the Stuxnet virus have added increasing urgency to government and private sector efforts; speaking on a panel at the Government Security conference and expo in Washington, D.C., security experts that specialize in critical infrastructure discussed the challenges of protecting infrastructure and steps that both governments and businesses can take; experts discussed addressing vulnerabilities in the smart grid, Stuxnet as a game changing cyber attack, and protecting critical infrastructure as a portfolio management problem. (read full report)

"GCIS INTELLIGENCE UPDATE" is an intelligence briefing presented by Griffith Colson Intelligence Service, and provided to the public for informative purposes only. All subject matter is credited to it's source of origin, and is not intended to represent original content authored by GCIS, it's partners or affiliates. All opinions presented are those of the author, and not necessarily those of GCIS or it's partners.

GCIS INTELLIGENCE BRIEFING: DOD Agency Chief Outlines Threat Reduction Strategy

ISSUED BY: GCIS Communications Command Center

SOURCE: DOD

25February2011 4:00pmEST

GCIS INTELLIGENCE UPDATE: WASHINGTON  – The Defense Threat Reduction Agency is at work around the clock to protect American forces and citizens from nuclear, chemical and biological threats, the agency’s director said today.

Speaking to the Defense Writers Group, Kenneth A. Myers III, who also is director of the U.S. Strategic Command Center for Combating Weapons of Mass Destruction, said the “lines of defense” strategy aims to detect, interdict and defend against weapons of mass destruction.

“How do we make it harder, how do we create more lines of defense between the threats and the American people?” he asked.

The value and effectiveness of countering any threat from weapons of mass destruction is much greater at the source, Myers said.

“The first line of defense is at the source. The second line is detection [and] interdiction of these threats before they reach the American people,” he said. “But the other major part of the DTRA responsibility is that last line of defense, here at home, and that’s consequence management.”

In the nuclear arena, one task his agency performs is nuclear inspections. With the New Strategic Arms Reduction Treaty now in force, Myers said, his people are trained and ready to take on the inspection duties it authorizes.

Carrying out nuclear weapons inspections in Russia is a verification mission, Myers explained, adding that his agency’s teams also will escort Russian teams on their inspections in the United States.

“It’s a mission that we’ve had for a number of years,” he said. “It is one that we’re constantly trained for.”

In recent months that training has intensified, Myers said, as inspectors prepare to verify stockpiles of Russian nuclear weapons.

“We’ve been involved with this treaty for quite some time,” Myers said. “We’ve understood from the beginning of the process what would be required, … [and] we’re ready to go.”

New START provides for fewer inspections than the previous START treaty, he said, in part because the new treaty combines some types of inspections, and also because “we’re talking about fewer weapons. The numbers are coming down.”

Judgments on treaty compliance are not part of his agency’s mission, the director said. “We are the inspectors -- we don’t make verification judgments,” he said. “We report the facts. Judgments on compliance are made by other members.”

His agency’s inspectors, Myers said, are the best in the world. “I’m confident we’ll get all the information we need,” he added.

While the first inspections have not been scheduled, he said, teams are “waiting for the call.”

In contrast to the verification mission his agency will perform under the new START, much of the threat reduction effort focuses on finding and countering risks involving weapons of mass destruction, Myers said. His agency is responsible for much of the science and technology development in countering chemical and biological weapons, he explained, and also is the banker for chemical and biological defense funds.

The threat is diverse, and countermeasure development is spread across a range of efforts, Myers said.

He explained that whether a threat involves samples of harmful viruses or stockpiles of fissionable materials, his agency aims to build as many walls as possible between that threat and American citizens and service members.

For example, in countering biological weapons, the agency works both to contain the possible spread of disease agents, and also to develop vaccines against those diseases, he said, adding that the Ebola and Marburg viruses are an area in which the agency has seen “first-level success.”

It may take 15 to 20 years for the pharmaceutical industry to develop an effective drug to mitigate a threat, he said. “Our No. 1 goal is to shorten these timeframes -- that is, to try to get solutions to the warfighter … and the American people, should we face these types of threats,” he said.

Weapons of Mass DestructionThe potential for biological or nuclear weapons to be used against U.S. citizens spurs his agency to move quickly in putting defenses in place, Myers said.

“Our strategy is to cut the timelines, to move faster,” he said. “At the end of the day, you have a threat, and you have a solution. Trying to match them up as quickly as possible is the challenge.”

The Ebola virus, which occurs naturally in sub-Saharan Africa, may be as great a threat as a manmade weapon elsewhere, Myers pointed out.

“It’s hard for me to tell you that a biological weapon or a virulent disease is not a threat,” he said.

"They’re all threats. A lot of the [relative risk involves] the likelihood of finding them in nature, and the ease or complex nature of manipulating them.”

Many health facilities in Africa store samples of diseases that occur naturally in the region, he said, noting such facilities often are close to areas that may be terrorist recruiting or operating grounds.

The Defense Threat Reduction Agency develops tools for the services to use in countering weapons of mass destruction, Myers said, citing the “massive ordnance penetrator,” a weapon the agency funded, tested, found effective, then handed off to the Air Force. The weapon is designed to attack hardened concrete bunkers and tunnels, where weapons of mass destruction components may be stored, he explained.

“The goal is to hold deeply buried targets and other potential threats … at risk. … I think we’ve proven we can hold deeply buried targets at risk,” Myers said. “We want to work to change the behavior, change the efforts by some to use facilities to develop weapons of mass destruction.”

The fact that the United States has not suffered a serious biological or nuclear attack is significant, though the threat remains real, Myers said.

“I go to work every day with 2,000 people whose job is to stop that from happening,” he said.

Agency programs focus on developing tools and strategies to detect, interdict and counter weapons of mass destruction, he said, in line with the president’s focus on defending against nuclear and biological threats.

“I believe that the policies [and] the programs that we have in place are making a big difference,” Myers said. “I think the people [and] the skill sets that we have focused on this problem are making a big difference.”

One thing that makes the agency effective, the director said, is that it has both a research and development arm and a full operations side.

“You walk down the hallway and you have a nuclear physicist, a microbiologist, and a former Special Forces operator sitting there talking together, trying to solve problems,” he said. “It really is a very unique institution.”

His agency’s partners in defending against weapons of mass destruction include the military services, the Department of Homeland Security, the National Security Agency, the Centers for Disease Control and Prevention, and embassies around the world, Myers said.

“To protect the American people, we need to develop as many lines of defense as possible,” he said. (read full report)

"GCIS INTELLIGENCE UPDATE" is an intelligence briefing presented by Griffith Colson Intelligence Service, and provided to the public for informative purposes only. All subject matter is credited to it's source of origin, and is not intended to represent original content authored by GCIS, it's partners or affiliates. All opinions presented are those of the author, and not necessarily those of GCIS or it's partners.

GCIS CYBER-SECURITY BRIEFING: Latest Attacks, Hacks, and Tracks

ISSUED BY: GCIS Communications Command Center

18February2011 12:23pmEST

 

Senate Bill Would Make Leaks a Felony

GCIS CYBER-SECURITY UPDATE: Legislation introduced in the Senate this week would broadly criminalize leaks of classified information.  The bill (S. 355) sponsored by Sen. Benjamin Cardin bill would make leaking information a felony(D-MD) would make it a felony for a government employee or contractor who has authorized access to classified information to disclose such information to an unauthorized person in violation of his or her nondisclosure agreement.

Under existing law, criminal penalties apply only to the unauthorized disclosure of a handful of specified categories of classified information (in non-espionage cases).  These categories include codes, cryptography, communications intelligence, identities of covert agents, and nuclear weapons design information.  The new bill would amend the espionage statutes to extend such penalties to the unauthorized disclosure of any classified information. (Source: Secrecy News/read full report)

 

U.S. Preparing Cyberwar Strategy Before Threat Grows

GCIS CYBER-SECURITY UPDATE: Deputy Defense Secretary William Lynn said Tuesday that the US prepares for Cyber war threatU.S. government is "moving aggressively" to counter evolving cyberthreats and is currently in the final stages of a comprehensive cyberstrategy review. The time to act is now while cyberattacks are still "relatively unsophisticated in nature, short in duration, and narrow in scope," he said.
The danger is that powerful cybertools already exist that one day could be deployed by the nation's adversaries to potentially cause severe economic damage, physical destruction, and even loss of life, Lynn said in a keynote address at the RSA security  conference in San Francisco.

"We must have the capability to defend against the full range of cyberthreats," Lynn said. "This is indeed the goal of the Defense Department's new cyberstrategy, and it is why we are pursuing that strategy with such urgency." (Source: CIO Today/read full report)

Antony Asks Forces to Gear Up to Fight Cyber War

GCIS CYBER-SECURITY UPDATE: The Defence Minister Shri AK Antony has called upon the Indian ArmyArmed Forces to be vigilant against emerging cyber threats. Addressing the centenary celebrations of the Corps of Signals here today, he called upon the forces to keep abreast of latest technologies. Terming the Corps of Signals as the “21st century arm of our forces”, Shri Antony said it has a major role in promoting inter-Service synergy and joint operations.

“The Corps is at the forefront of transforming the Indian Army to a network-centric force. It must continuously enhance its ability to absorb latest technologies in collaboration with the Industry and R&D establishment. The Corps has done commendable work, be it in fielding futuristic strategic defence communication networks, or development of state-of-the-art tactical communication systems. The contribution of the Corps in enhancing cyber security is worth a mention. However, the Corps needs to be ever vigilant, as cyber threats continue to multiply and intensify by the day,” Shri Antony said. (Source: Defense Aerospace/read full report)

Trent Franks Launches Caucus to Address EMP Threat – Introduces SHIELD Act

GCIS CYBER-SECURITY UPDATE: Congressman Trent Franks (AZ-02) today released the following statement, following the official launch of the Congressional EMP Caucus and the EMP Threatintroduction of H.R. 668, the Secure High-voltage Infrastructure for Electricity from Lethal Damage (or SHIELD) Act.

“The threat of an electromagnetic pulse weapon represents the single greatest asymmetric capability that could fall into the hands of America’s enemies. Should a nuclear weapon from a rogue state such as Iran be detonated in Earth’s atmosphere at a sufficient height above the continental United States, the blast of electromagnetic energy could immediately cripple America’s electric power grid. Currently, the vast majority of the United States’ infrastructure is unsecured and exposed.

“According to some experts, just one properly placed EMP blast could disable so large a swath of American technology that between 70-90% of the United States’ population could become unsustainable. (Source: National Terror Alert/read full report)

Cyber Crime Costs UK £27 Billion Study Finds

GCIS CYBER-SECURITY UPDATE: According to a joint government and industry report, the annual The Cost of Cyber crimeloses to cyber crime in the United Kingdom are of £27 billion, of which £21 billion comes from the business sector.

The report was drafted by the Office of Cyber Security and Information Assurance in collaboration with Detica, a company specializing in information intelligence.


 The study shows that the main victim of cyber crime is the business sector, which accounts for over ¾ of the loses.

Intellectual property theft is the most costly form of cyber crime to businesses and results in £9.2 billion annual losses.

In this case, IP theft does not refer to illegal file sharing, but to the theft of trade secrets, ideas, designs, methodologies and so on.

The industry sectors most affected by this type of crimes are pharmaceutical/biotech, with over £1.8bn loses, electronic and electrical equipment, with over £1.7bn, and software and computer services, with £1.6bn. (Source: Softpedia/read full report)

Cloud is security battleground for organizations

GCIS CYBER-SECURITY UPDATE: Organizations want to use cloud services to benefit from costs savings and increased efficiency, but security staff are concerned about the risks associated with the cloud, noted Dan Schoenbaum, vice president for business development at Tripwire.
Cloud security
“The business folks want to go there for the obvious benefits, but the security team still views the cloud as new. They don’t quite understand how they can get visibility into the cloud”, Schoenbaum told Infosecurity.

Security teams want to take a more measured approach to the cloud than the business people. They want to start with less critical applications. “The tension between the two sides is on the timing and the criticality of the applications that go there”, he noted.

Organizations “trust themselves for security but they might not necessarily have an established relationship with a cloud provider. It’s hard to build trust with someone you only started working with recently. So these things have been inhibitors for going to the cloud”, he said. (Source: Info Security/read full report)

CBC Reports Canadian Government Hacked By Chinese

GCIS CYBER-SECURITY UPDATE: The Canadian Broadcasting Corp. is reporting that key government agencies in Canada were the targets of a sophisticated cyber attack aimed at stealing sensitive government information.

Canada hacked by chinese?The attack was first detected in January, 2011, and prompted Canada's Finance Department and Treasury Board off the Internet temporarily in order to clean up after the attack. Among the targets of the attacks were Defence Research and Development Canada, a civilian agency that is part of the Canadian Department of National Defence.

According to the BBC report, issued Thursday, the attacks on the Finance Department started with spear phishing attacks aimed at senior Finance Department personnel, but spread to other targets.

Canadian officials are still trying to assess the damage caused by the attacks, including the quantity and type of data that is believed to have been siphoned from Canadian government networks. (Source: ThreatPost/read full report)

 

"GCIS INTELLIGENCE UPDATE" is an intelligence briefing presented by Griffith Colson Intelligence Service, and provided to the public for informative purposes only. All subject matter is credited to it's source of origin, and is not intended to represent original content authored by GCIS, it's partners or affiliates. All opinions presented are those of the author, and not necessarily those of GCIS or it's partners.