Qioptiq logo Raytheon Global MilSatCom

CYBER WARFARE, CLOUD COMPUTING AND HOMELAND SECURITY UPDATE

01 Jul 13. Brussels orders bugging sweep after US spying claims. The European Commission has ordered a sweep of its facilities in Brussels following revelations that US intelligence agencies have been tapping data feeds and bugging communications of EU offices and missions. The commission’s move came as European recriminations intensified over the claims of US surveillance of EU and European offices in Washington and New York. The German government on Monday summoned the US ambassador to explain the spying allegations. The US ambassador to the EU was also called in to see the EU’s top diplomat. Steffan Seibert, spokesman for Chancellor Angela Merkel, said such conduct, if true, was “unacceptable”. Mr Seibert said Berlin wanted to see “trust restored” with Washington. (Source: FT.com)

27 Jun 13. Policies that inhibit interoperability in the cyber domain with coalition partners and other agencies are worthy of re-examination, a senior U.S. Cyber Command official said at the 2013 Armed Forces Communications and Electronics Association cyber symposium here yesterday. Army Maj. Gen. Jennifer L. Napper, Cybercom’s director of plans and policy, said reassessing the purpose of information sharing comes down to setting basic standards for connectivity and operability. Napper said the initial policies came to be during a time that predated modern technology, which now more astutely determines that only people on a “need-to-know” basis can access certain information. (Source: Open Source Information Report/Defense.gov)

28 Jun 13. Dempsey says cyberattacks are the new normal. The chairman of the Joint Chiefs of Staff laid out the growing threat posed by
cyberattacks and how, “when asked,” it will respond to attacks on U.S. networks. Gen. Martin Dempsey said on June 27 that cyber incidents have steadily increased over the last year, culminating with Shamoon malware attack last August, “the first large-scale destructive cyberattack” that wiped clean the hard drives of 3,000 computers at the Saudi Arabian State Oil Co. The attack is widely believed to have been launched from Iran. Cyber experts such as James Andrew Lewis of the Center for Strategic and International Studies said the Saudi attack and others against South Korean banks underscore for Pentagon planners the threat posed by cyberattacks on the nation’s critical infrastructure. More than 20 nations now have military units dedicated to employing cyber
defenses as toxic malware proliferates among hackers. “This is the new normal in cyberspace,” Gen. Dempsey said during a speech at the Brookings Institution in Washington. (Source: Defense Systems)

26 Jun 13. Security experts are confident that the Chinese hackers group known as Comment Crew is still operating under cover. “The Comment Crew is back again” this is the rumor within Intelligence community, researchers suspect the involvement of the group of hackers in the recent cyber dispute between U.S. and China. Let’s make a step back, last February Mandiant Intelligence firm released an interesting report that revealed an enterprise-scale computer espionage campaign
dubbed APT1. Mandiant linked the APT1 attacks, that compromised 141 organizations in seven years, to Chinese military unit called “61398”. The is very interesting is that the security firm identified a common pattern for the attacks conducted by Chinese hackers group, it was also able to define a series of key indicators for identifying ongoing APT attacks. Mandiant security firm had monitored the group during last years and report details its operations, it wasn’t the only one FireEye is another company which is distinguished in this type of investigation. (Source: Open Source Information Report)

02 Jul 13. BAE Systems Detica has launched its Advanced Threat Detection (ATD) service in Australia in response to growing concerns around targeted cyber attacks with the Australian Government citing cyber security as one of its highest national security prio

Back to article list