Global, asymmetrical threats now dominate attacks on nations and businesses alike, and the enemy is not always immediately knowable, identifiable or even seen. These realities are forcing leaders to invest more resources into analytics, as well as intelligence, surveillance, reconnaissance and other 21st century responses to cyber bombardments today.
Cyber is fundamentally changing the national security landscape. David Sanger, national security correspondent for The New York Times and author of The Perfect Weapon, used his keynote address on day two of the AFCEA-GMU C4I and Cyber Center Symposium not to explain what is happening, but why this is happening.
To illustrate the new age of weaponizing information, Sanger described the differences between Watergate and the hack of the DNC in December 2016. The Russians didn’t have to do anything the Watergate hackers did.
Millions of times every single day, antagonists search for entry into the U.S. Defense Department’s networks. They come from all over: Russia, China, North Korea, Iran. Some are sponsored by nation-states; others are terrorist groups.
Medical technologies such as electronic devices implanted or injected into the human body are the next growth area for hackers pursuing money or control of individual people. With nanotechnology implants already being used for some medical treatments, advances in their application could pose as great a cybersecurity threat as what faces the Internet of Things, experts say.
The recent dissemination of classified information through media outlets and social media indicate that contemporary insider threat management has entered a new phase. Unlike previous generations that adhered to a strict code of silence, some millennials in charge of keeping U.S. secrets safe have the urge to share information they deem the public has the right to know. Rather than going through official channels to reveal actions they believe are wrong, people like Chelsea Manning, Edward Snowden and Reality Winner leak classified material through media and are just the first indication of information management processes that must change with the times.
Modern information and networking technologies bring exciting functionalities to everyone, everywhere, all the time. Manufacturers, service providers and users alike welcome the advancements because they boost business opportunities and enable new and better computing capabilities that offer convenience, increase independence and save time.
Plainly, innovations are appealing, but important security aspects are being pushed into the background. Security adds complexity and limitations to functionality. It requires more resources and seems to slow innovation and increase cost. In a military environment, these hurdles can seriously affect mission success.
Governments, banks, transportation systems and critical infrastructure entities reeled Tuesday from yet another wide-sweeping disruptive cyber attack—one that echoed the WannaCry breach in May but is potentially far more crippling.
Cyber experts began bracing for the effects of a massive attack that hit Ukraine first, and then rippled throughout other European nations before going global.
Vetted computer security specialists from across the United States and select partner nations are invited to hack some of the U.S. Air Force’s key public websites. The initiative is part of the Cyber Secure campaign the service’s chief information officer is sponsoring to further operationalize the domain and leverage talent from inside and outside of the Defense Department. HackerOne Incorporated, a security consulting firm, is managing the contest.