• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2022

CYBER WARFARE, EW, CLOUD AND HOMELAND SECURITY UPDATE

December 5, 2014 by

03 Dec 14. DISA takes on defense of DOD networks. The Defense Information Systems Agency is taking on a new role in cyber defense as part of an arrangement with the U.S. Cyber Command intended to centralize and integrate the cyber operations of the Defense Department and military services. The initiative will create a Joint Force Headquarters for DOD Information Networks, with DISA focusing on network defense, AFCEA’s Signal Magazine reported. Adm. Michael Rogers, head of the Cyber Command and the National Security Agency, worked out the plan with acting DOD CIO Terry Halvorsen and Air Force Lt. Gen. Ronnie Hawkins, DISA’s director, according to the report. Rogers, who took over the Cyber Command and NSA in April, began talking about the need for an integrated cyber defense shortly after. In June, he said that making DISA—mostly an acquisition and engineering organization with some control of DOD’s networks—an “operationalized entity focused on maneuvering and defending the networks” would free up the Cyber Command to do more than focus on tactical-level details. “We have to give DISA the ability to come up with a command-and-control node that can coordinate with others in defending the DOD information networks,” he said at the time. DISA “could enable U.S. Cyber Command to function at the operational level of war. That’s our niche and that’s where I think we generate the best return and the best outcome.”
The move to a coordinated joint forced, which includes the cyber commands of each of the military services, is driven by the growing threats from nation-states, terrorists, criminal organizations and others not only to DOD networks, but to private-sector networks and the nation’s infrastructure. Rogers has compared the Cyber Command’s role in defending the nation to that of traditional military defense, which means defending the entire infrastructure, most of which is controlled by commercial organizations. “What I think we need to do,” he said in August, “is create an operational construct that creates a direct linkage [between] U.S. Cyber Command, DISA and U.S. Cyber Command service components.” (Source: Open Source Information Report/Defense Systems)

04 Dec 14. Why Regin isn’t the next Stuxnet. Recently Symantec issued a report about the Regin family of malware. The malware appears to be sophisticated and many security analysts and researchers believe it to have been developed by a western Government specifically for cyber espionage. This family of malware has been compared to Stuxnet; however, this is a poor comparison since Regin does not spread the way Stuxnet did. In fact, the purposes of each malware are quite different. Stuxnet was designed for sabotage, whereas Regin was likely designed for espionage and as a result was deployed with a great deal more of precision. If anything, the purpose and behavior of the malware is similar to Flame, another malware family, specifically designed for espionage purposes. There is still very little known about the initial attack vector used to deploy Regin. It appears to have been dropped using a variety of methods, including social engineering, an exploit in Yahoo Messenger and a link to a fake LinkedIn page that functioned as a watering hole. Although Regin was designed to be stealthy, the various phases of the malware deployment can still be detected. The Regin malware actually makes a lot of ‘noise’ given the number of changes it makes on a host system if you have the right tools in place to monitor these changes on host systems. Many of the methods used by Regin are not necessarily new and from conversations with developers are actually more like general best practices for developing Windows drivers. The sophistication of the malware isn’t necessarily in the technical implementation, but in what appears to be a mature software development lifecycle. The malware has evolved and adapted, using best practices for development, borrowing techniques from other successful malwar

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • InVeris
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • DSEi
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
Hilux DVD2022 GlobalMilSat

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    July 1, 2022
    Read more
  • VETERANS UPDATE

    July 1, 2022
    Read more
  • MANAGEMENT ON THE MOVE

    July 1, 2022
    Read more

Copyright BATTLESPACE Publications © 2002–2022.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT