July 27, 2015 — Recent headlines provide a virtually unlimited source of material for Hollywood’s latest trend: the cyber-thriller. From the paranoia-fueled Person of Interest, to the widely-panned CSI:Cyber, these shows attract a huge audience and often inform a significant segment of the population on all things technical. They also, as discussed in a previous Cyber Defense Review post, have the potential to educate users about the risks of information security on a very large scale. USA Networks’ newest cyberpunk thriller, Mr. Robot is one of the newest entrants into the fray. The show has already received rave reviews, not only for its immersive and dark tone, but also for its unusual technical accuracy. MORE
|
July 17, 2015 — In 1920, the then CPT Dwight Eisenhower wrote an article, titled “Tank Discussion”, for the United States Infantry Association’s Infantry Journal championing the integration of motorization (particularly tanks) into combat arms maneuver. As a member of the minority, his faith in the potential of motorization and the tank resulted in intense scrutiny from the Infantry establishment, which almost ended his career early. Undoubtedly, the tank later proved critical to the Army’s success in WWII.
The Strategic Initiatives Group at the Army Cyber Institute conducted a short experiment with the first three paragraphs of “A Tank Discussion”. We replaced occurence of “tank” with “cyber” and updated some language to modern terminology and context. The result is a remarkably relevant commentary given the current tensions in Army during the growth of the Cyber branch.
MORE
|
July 2, 2015 — I have sat through many briefings and discussions on how the Army is short of Cyber warriors and how it will take extraordinary incentives and methods to fill the ranks. There are committees studying this issue and lots of discussion occurring. All of it is well intentioned and motivated by the perception of being behind schedule. However, I think some tactical patience is required and a pause taken to think critically about this issue before we make hasty decisions we may regret. MORE
|
June 11, 2015 — I have been asked multiple times what my emotions were the night I learned that I would be branching cyber. The night was like any other branch night at West Point with all of the First Class cadets anxiously awaiting their fate as army officers. The only difference with this branch night as opposed to the previous decades of them was the inclusion of the new branch, Cyber, to the list of possibilities. I knew going into this night that there were roughly forty to fifty cadets that were competing for Army Cyber slots. All of us had put in work through a selection process known as the Cyber Leader Development Program in which our talents, experiences and skills were assessed by a mentor. I thought my chances were decent because I had put hours into my application packet and had done everything I had been asked to do. I knew I would branch either Army Signal or Army Cyber. My grandpa had been an officer in the Army Signal Corps so I had a historical connection to Army Signal, but my hope and dream was to branch Army Cyber. MORE
|
May 29, 2015 — This paper discusses the benefits and drawbacks of quantum computing and quantum cryptography, subsets of the field of Quantum Information Processing (QIP). This field uses quantum mechanics for information processing rather than classical mechanics and portends game-changing implications to technologies long-relied on by military organizations, including computing, communication, and cryptographic systems. Quantum information processing may provide advantageous to Army operations in two areas: massive parallel processing and secure key distribution.
Quantum mechanics allows a single quantum computer to compute as dozens or even hundreds of classical computers, known as ‘quantum parallelism.’ This is leading to a new paradigm in computing as these computers undermine current cryptographic systems. Continuing work in other families of cryptographic systems shows promise for being unaffected by quantum processing and quantum mechanics allows for the creation and distribution of completely secret keys. This solution may require fielding a new generation of cryptographic hardware systems throughout the Army. Quantum parallelism applies to data searching, providing a polynomial speed-up for searching large databases, such as cloud storage, personnel systems, or intelligence repositories.
“If a quantum computer is ever built, much of conventional cryptography will fall apart!” (Giles Brassard, 1984)
MORE
|
May 11, 2015 — What is it like to fight in cyberspace? Almost every paper regarding cyberwarfare depicts a battlefield, wild and open, where “cyberwarriors” move like a hunting pack; smart, sharp and agile. Reality is obviously far from that. Thus, the digital battle is usually compared to what happens in real life and the strategic approach of cyberspace stresses the parallel with the open spaces and naval theories. It may seem relevant up to a certain point, but at the tactical level, we surely have to change our mind, and start to think “outside the box”. MORE
|
May 5, 2015 — The reports on the new Department of Defense (DoD) Cyber Strategy were typical; each highlighted what was put in or left out of the document in accordance to what their authors wanted to report. On the whole they hit the mark in pointing out that this 2015 cyber strategy was more transparent, emphasized deterrence and innovation, and that DoD would partner for a “whole of government approach.” Presumably this is what the DoD, and this Administration, wanted. MORE
|
May 1, 2015 — Fighting evil consistently requires you to proactively investigate it, hunt it down, and kick in the door where you find it. Organizations must evolve their security operations to hunt intruders and either eradicate them from the network or confirm that they were not there in the first place.
By integrating timely threat intelligence, security practitioners can deploy an active defense specifically targeted at critical resources rather than focusing on the outer perimeter. Defenders will improve their effectiveness, and attackers will seek out softer targets.
The term “Active Defense” has been used, abused, and misconstrued. Learn how to expose your cyber enemies and eradicate them from your network by leveraging anomaly analysis, active hunting, cyber-recon by fire, and clear-and-hold missions. We’ll discuss these and other tactics to show why the best defense is an active defense.
MORE
|
April 28, 2015 — Recently, a group claiming association with ISIS called the “Cyber Caliphate” began a campaign of online vandalism by announcing that they hacked several government accounts, seized sensitive documents and was actively monitoring U.S. troop movement.[1] But does their recent attention mean that an ISIS-sponsored cyber-attack is imminent? No – far more likely is these account managers fell victim to less technical attacks such as phishing emails, or perhaps had a password in the 25 most popular passwords list. The most noteworthy episode occurred with the hijacking of the U.S. Central Command’s (CENTCOM) Twitter account. Purporting that they had ‘hacked’ CENTCOM, ISIS sympathizers changed the military organization’s banner to that of a masked ISIS member. MORE
|
April 7, 2015 — Technology has provided ease in accessing media, financial markets, and global communication. Society and criminals have benefited from these same developments in technology, causing an increase in cyber-criminal activity. In 2014, McAfee estimated that the cost of global cybercrime is 0.8% of global GDP;[1] making cyber crime a national and international security threat. The Russians, Nigerians, Ghanaians, and Chinese are some of the best-known cyber criminals, and while groups use similar tactics, their motivations, organizational structures, and culture differ. In analyzing why individuals and organized criminal groups participate in cyber crime, and the culture and history behind the groups policy makers and the international community can make more personalized approaches in combating transnational cyber crime. Right now there are many difficulties in combating cyber crime including attribution, lack of international cooperation, and limited resources in law enforcement. Cyber crime is becoming accepted as the ‘cost’ of doing business online, with stakeholders underestimating the impact it has on security, economy, and innovation. Unless the barriers to entry and cost for cyber criminals is raised, cyber crime will continue to threat international security, economic growth, and technological innovation. MORE
|