menu

Topic:

Critical Infrastructure

Black Cyber Ops on Rise

Black Cyber Ops on Rise – DoD Buzz
Black-Cyber-Operations have become all too common, launching highly sophisticated cyber actions against their targets that go undetected for months or years. A black operation is generally accepted worldwide by militaries and intelligence agencies to represent specific types of covert operations typically involving activities that are either secret or of questionable legitimacy and often violate international law and demand deniability.

Spill of National Significance SONS 2010 Exercise Begins Today

Spill of National Significance SONS 2010 Exercise Begins Today – iCommandant
Today, the Coast Guard-sponsored DHS Tier II Spill of National Significance (SONS) 2010 exercise begins. The exercise is based upon a scenario in New England involving a collision between an oil tanker and a car carrier causing a catastrophic oil spill. It is an operations-based, full-scale exercise intended to stress all levels of the response organization.

Senators press for increased cybersecurity attack planning

Senators press for increased cybersecurity attack planning – NextGov
The federal government should work with the owners and operators of critical infrastructure to develop a comprehensive plan to respond to major attacks on cybersecurity networks, according to legislation unveiled Wednesday by Senate Commerce Committee Chairman John (Jay) Rockefeller, D-W.V., and Sen. Olympia Snowe, R-Maine.

Terrorists Use the Internet But Not How You Might Think

I have to admit that in the past I have been guilty of a sin of omission that has plagued many commentators in the cyber arena. I have spoken and written many times about the terrorist threats I see as strong and dangerous possibilities. I have always mentioned the present terrorist use of the internet as an aside, and so much a lesser issue as to be unworthy of too much worry. I will stand up and admit that I have been WRONG. Yes, the terrorists have not used the cyber world for an attack as we might envision, but the threat presented by what they do now is real and chilling.

LTG Russel Honore’s Candor on Communications

In what was one of his typically colorful appearances, ret. US Army LTG Russel Honore, the famed “Ragin Cajun” of Hurricane Katrina fame did not disappoint the assembled audience of the 4th Annual DHS University Network Summit. Before a packed hotel ballroom of PhDs, graduate students, DHS S&T leaders, industry reps and more, Honore dropped one-liners and candid, colorful observations that literally had the audience roaring in laughter. Amidst the laughter though were some very frank observations about our nation’s preparedness and overall resilience posture.

Cyber Threat Vectors: Are we looking at them all?

We often talk about cyber threats in different ways. Some speak of them based on who the bad guys are: hackers, terrorists, cyber criminals or nation states. Others use the bad guys’ technical approach as a means to define them: SQL injection, Memory Scrappers, DDoS Attacks, etc. A third way, one based on distance from targets, was used by Steven Chabinsky of the FBI recently in several venues. I think it adds to the depth of our analysis, and bring to the fore some key areas that are often overlooked.

The Comforting Feeling at NEMA

There is a comforting feeling in attending a meeting with the National Emergency Managers Association (NEMA). You are literally surrounded by some of the world’s best and brightest emergency managers in the public and private sectors. Probably no where else in the world could you assemble the talent, experience, and character in one room and fulfill the Allstate marketing adage of “you’re in good hands.” Such was my experience last weekend at NEMA’s annual mid-year conference in Alexandria, VA.

The O’Toole Budget Hearing – Steady as She Goes…

In one of her first appearances on Capitol Hill since becoming DHS’ Under Secretary for Science & Technology, Tara O’Toole showed herself to be in complete comfort with the issues and challenges that face her. Her demeanor and candor at a FY2011 Budget Hearing before the House Subcommittee on Emerging Threats, Cyber Security and Science & Technology, also exhibited calm, cool and collected confidence in the programs she has inherited. This is just the reassurance that many from industry were looking for.

Rand Beers commits candor – and it was refreshing

Following his testimony before the Senate Homeland Security and Government Affairs committee where he testified about chemical security, DHS Under Secretary Rand Beers met with national security bloggers for an “on the record” session hosted by the Heritage Foundation. It was a remarkably refreshing session – not only because Beers acknowledged the importance of reaching out to a wide range of critical thinkers (which occasionally includes bloggers), but also because he was characteristically candid. Would that other DHS officials followed his lead.

California Issues Telework Policy to Curb Cyber-Security Risks

California Issues Telework Policy to Curb Cyber-Security Risks – Government Technology
To bolster security and create consistency in California’s IT infrastructure, the Office of the State Chief Information Officer (OCIO) issued a new policy Tuesday, March 2, that includes telework and remote access security standards as well as a compliance form that state agencies must submit by July 1.