• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER WARFARE AND HOMELAND SECURITY UPDATE

November 14, 2011 by

10 Nov 11. Lockheed Martin has unveiled its latest NexGen Cyber Innovation and Technology Centre (NCITE) facility in Canberra, joining existing sites in the United States and United Kingdom. The A$10m ($10.38m) center, known as NCITE AU, occupies a reconfigurable, 900-square-meter area of the company’s new headquarters in the nation’s capital. When fully operational, about 200 people will work in the facility. The official opening will occur in March, when the center will reach full operational capability. The company said it will link with the other two labs and bring together leading technologies and talent in a secure environment. (Source: Defense News)

07 Nov 11. The Pentagon’s advanced research arm, which played a key role in developing the Internet 40 years ago, said Nov. 8 it will boost efforts to build offensive cyber arms for possible use against enemy targets by the U.S. military. Kinetic is military parlance for such things as bombs, bullets and troops. The U.S. needs “more and better options” to deal with what she described as the growing threat to industrial and other physical systems controlled by computers that may be penetrated by foes, Dugan told the session. (Source: Aviation Week)

04 Nov 11. I wrote a year ago that Stuxnet demonstrated the difficulties and dangers of offensive cyber warfare. The weapons are too difficult to control to make them effective tools for legitimate warfare. I have changed my opinion somewhat since then. Yes, there have been nearly 50,000 reported infections by the worm outside of the apparent targets in Iranian uranium processing plants, but its apparent success in disrupting those processors without resorting to bombs or bullets and lack of serious collateral damage from the unplanned infections makes it hard to argue with the fact that Stuxnet worked. But the arrival of Son of Stuxnet is a serious reminder that sophisticated malware is a dangerous commodity. Like a bomb, whether it is a threat or a defense depends on who controls it. And the public has no idea who is behind Duqu. Duqu, discovered in the wild in October, appears to share genetic material with the groundbreaking Stuxnet worm, which tells us a little something about its authors, although the new worm appears to be a tool for espionage rather than a weapon. (Source: GCN)

07 Nov 11. The Pentagon’s far-out research agency and its brand new military command for cyberspace have a confession to make. They don’t really know how to keep U.S. military networks secure. And they want to know: Could you help them out? Darpa convened a “cyber colloquium” at a swank northern Virginia hotel on Monday for what it called a “frank discussion” about the persistent vulnerabilities within the Defense Department’s data networks. The Pentagon can’t defend those networks on its own, the agency admitted. Because it’s the blue-sky research agency that helped create the internet, Darpa framed the problem as a deep, existential one, not a pedestrian question of insecure code. “It is the makings of novels and poetry from Dickens to Gibran that the best and the worst occupy the same time, that wisdom and foolishness appear in the same age, light and darkness in the same season,” mused Regina Dugan, Darpa’s director. She’s talking about the internet. “These are the timeless words of our existence. We know it is true of everything.” Put in a blunter way, U.S. networks are “as porous as a colander,” Richard
Clarke, the former White House counterterrorism chief turned cybersecurity Cassandra, told a packed ballroom. (Source: GCN)

09 Nov 11. Countries need to have a good understanding of the cyber capabilities being developed by opponents, said a leading Israeli government official, because “you can’t block an attack by waiting for the attack to come, including in cyber defense.” Isaac Ben-Israel, a senior cybersecurity adviser to the Israeli prime minister, was speaking at a Security and Defence Agenda event on cybersecurity. Maj. G

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    February 3, 2023
    Read more
  • VETERANS UPDATE

    February 3, 2023
    Read more
  • MANAGEMENT ON THE MOVE

    February 3, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT