September 5, 2018 — During these uncertain times of relentless cyber onslaughts against critical US infrastructure and DoD networks and systems, cyber leadership has never been so important to effectively defend and manage the national cybersecurity ecosystem. The intensive and crippling nature of cyber conflict requires cyber leadership not only to defend against cyberattacks of significant consequence but to also generate integrated cyberspace effects in support of operational plans and contingency operations. MORE
|
September 5, 2018 — Budget processes supporting cyberspace operations are uniquely challenged due to their dispersal within Department of Defense (DoD) Services and agencies. This budgetary structure fails to provide the visibility needed to analyze and report on cyberspace investments. Furthermore, this structure fails to provide the resolution, with a high level of confidence, on how the DoD executes money in support of cyberspace operations. Establishing a budgetary process similar to that employed by special operations would synchronize and integrate funding activities to operational functions and tasks. This includes the creation of a cyberspace Major Force Program (MFP) that would provide cyberspace budget lines throughout the department. These proposals would create a budgetary structure that could best serve the unique requirements demanded in cyberspace. Doing so would act to acknowledge the cyberspace domain as a separate environment integrated across all Services. MORE
|
September 5, 2018 — On August 31, 2015, California Governor Jerry Brown signed Executive Order B-34-15, directing the establishment of the California Cybersecurity Integration Center (Cal-CSIC). The new center operates under the auspices of the Office of Emergency Services (OES), with the California Department of Technology, California National Guard, and the California Highway Patrol acting as the key partners in the coordination of cybersecurity related activities within the State.
In his Executive Order, Governor Brown tasks the Cal-CSIC with two primary missions: facilitate information sharing across the state and coordinate statewide responses to cyber incidents. Given the increasing threat from cyberattacks to the State government and all California governments, businesses, and citizens, the Cal-CSIC’s mandate is immediate action to mitigate those risks. It takes significant planning and time to coordinate an incident response capability for statewide deployment, therefore, the immediate focus is to create and implement a statewide information sharing program. MORE
|
September 5, 2018 — When most people think of “honeypots,” they picture a plump Winnie-the-Pooh adorably getting stuck while trying to get honey out of a jug—a honeypot. In recent years, the term “honeypot” has migrated to the lexicon of cyberspace and operations. In the rapidly evolving realities ofcomputer security, the term “honeypot” has come to mean: deception MORE
|
September 5, 2018 — When I owned my advertising agency, I too got the opportunity to pursue a dream of directing. In this case, it was for an advertising commercial, and it taught me a leadership lesson I will never forget. We had been shooting for hours when my producer pulled me over and said we needed to take a half-hour break. “The crew needs it, and it’s Union rules,” he informed me. My assumption was that a break wasn’t necessary and that with the right inspiration, the crew could finish up shortly, saving us money. So, ignoring the advice of the producer, I pulled the entire crew together and gave them what I felt was a highly motivational speech about how great they were doing, how I believed they were up for the challenge, and how if we pulled our energies together, we could finish up shortly. MORE
|
September 5, 2018 — Cyberspace “is a domain characterized by the use of electronics and the electromagnetic spectrum to store, modify, and exchange data via networked systems and associated physical infrastructures.” [1] It is the newest military domain affecting the Operating Environment (OE) and the focus of concern by the President of the United States. In the Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure, President Trump directed the Department of Defense and other agencies across the whole of government to identify a long-term way ahead to address education and retention of cybersecurity professionals. [2] There are two potential programs Chemical, Biological, Radiological, Nuclear (CBRN) Response Enterprise (CRE) [3] and the Civil Air Patrol (CAP), which could provide a framework that supports long-term education and retention of the US government cyber workforce.
MORE
|
September 5, 2018 — In recent history, America witnessed cyber breaches at Snapchat, where employees had personal information stolen by way of a phishing scam; Premier Healthcare, which saw unencrypted data pertaining to more than 200,000 users stolen from a laptop; Verizon Enterprise Solutions, who had the information of 1.5 million customers stolen by hackers; and LinkedIn, who saw a 2012 data breach “come back to haunt them when 117 million e-mail and password combinations stolen by hackers four years ago popped up online [1].” These are just some of the many breaches experienced recently, which also included the hacking of a Presidential candidate by actors of a foreign nation-state, potentially an act of cyber warfare. MORE
|
September 5, 2018 — In the modern military’s highly interconnected and technology-reliant operational environment, cybersecurity is rapidly growing in importance. Moreover, as a number of highly publicized attacks have occurred against complex cyberphysical systems such as automobiles and airplanes, cybersecurity is no longer limited to traditional computer systems and IT networks. While architectural analysis approaches are critical to improving cybersecurity, these approaches are often poorly understood and applied in ad hoc fashion. This work addresses these gaps by answering the questions: 1. “What is cybersecurity architectural analysis?” and 2. “How can architectural analysis be used to more effectively support cybersecurity decision making for complex cyber-physical systems?” First, a readily understandable description of key architectural concepts and definitions is provided which culminates in a working definition of “cybersecurity architectural analysis,” since none is available in the literature. Next, we survey several architectural analysis approaches to provide the reader with an understanding of the various approaches being used across government and industry. Based on our proposed definition, the previously introduced key concepts, and our survey results, we establish desirable characteristics for evaluating cybersecurity architectural analysis approaches. Lastly, each of the surveyed approaches is assessed against the characteristics and areas of future work are identified. MORE
|
September 5, 2018 — Through a concise and straightforward narrative, Dr. Alison Lawlor Russell outlines the major issues threatening the United States cyber system through the lens of an A2/AD perspective. Alison Russell is an Assistant Professor of Political Science and International Studies at Merrimack College.
How can the people of the United States defend their land and physical assets? This traditional question applies not just to American citizens, but to people across the world and throughout history. A recurring answer is the principle of Anti-Access/Area Denial or A2/AD.
The A2/AD strategy is defined as refusing “movement to a theater (anti-access), while [area denial] affects movement within a theater.” Putting these ideas into context, A2 would be the US blocking the Soviet Union’s access to Cuba with a naval quarantine; AD would be hampering the enemy’s ability to maneuver in the Mekong Delta, such as guerilla tactics against US forces in Vietnam. MORE
|
September 5, 2018 — In 2012, then-Secretary of Defense Leon Panetta spoke about the rising dangers of a “cyber Pearl Harbor,” analogizing the potential devastation from a cyberattack to that of the surprise attack on the U.S. naval base in Hawaii in December of
1941. [1] More recently, U.S. Senator John McCain called the Russian meddling in the 2016 elections “an act of war.” [2]The reality of contemporary international relations and the proliferation of cyber operations as an adjunct to both peacetime and wartime operations of states has raised important questions about what would constitute an act of war in the cyber domain, triggering the relevant international legal rules regulating state behavior. As of yet, there is no global consensus about what an act of war carried out by cyber means would look like, versus acts that would fall below the level of an act of war, and although still unlawful, would call for different responses under the law. [3] MORE
|