From: Homeland Security News Wire
To: Scott Jenkins,
Subject: Cybersecurity Report: Cyberspooks dilemma | Cyber recruiting | The Snowden industry
Date: Wed May 21 17:24:08 MDT 2014
Body:
Homeland Security News Wire Home  | About us  |  Subscribe  |  Advertise  |  Contact
Cybersecurity Report
Wednesday, 21 May 2014
China pulls out of U.S.-China cyber dialogue

China has decided to suspend its involvement in a cybersecurity working group with the United States after the United States accused Chinese government hackers of commercial espionage. The Chinese decision threatens to undo efforts to find common ground to tackle hacking. The United States on Monday indicted five Chinese military officials for stealing trade secrets. China’s Foreign Ministry called the U.S. move a “serious violation of the basic norms of international relations,” while China’s State Internet Information Office likened the U.S. actions to “a thief yelling ‘Catch the thief.’”

U.S. cyber spooks' dilemma

There is a debate going on inside U.S. government agencies whether the U.S. government -- more specifically, the NSA and U.S. Cyber Command -- should stockpile Internet vulnerabilities or disclose them to the public and fix them. Experts say this dilemma illustrates the difficulty of separating attack and defense in cyberspace. A software vulnerability is a programming mistake which allows an adversary access into that system. Hundreds such vulnerabilities are discovered every year. When someone discovers a vulnerability, he can either use it for defense or for offense. Defense means alerting the vendor and getting it patched. Offense means using the vulnerability to attack others.

U.S. cybersecurity practices are hobbled by rigid human resources policies

Experts say that the U.S. government cybersecurity practices are hobbled by rigid human resources policies which must be changed if agencies are more effectively to recruit, train, and keep talented IT professionals. Part of the problem has been that agencies such as the DHS, the National Institute of Standards and Technology, and the U.S. Office of Personnel Management, among others, have not had a common terminology for positions or a common expectation of the skills that a given position should include. A NIST-led program by the National Initiative for Cybersecurity Education, or NICE, is beginning to merge these differences into a shared definition, the experts noted.

U.S. critical infrastructure firms dangerously complacent

Warnings about dangerous vulnerability to hacking of the U.S. electric grid and other critical infrastructure have been issued for years, but security experts worry that it may take a major destructive attack to jolt CEOs out of their complacency. Awareness about cybersecurity has markedly increased in recent years, but infrastructure consultants say the industry remains reluctant to spend the money needed to upgrade aging equipment -- especially in the absence of much pressure from the U.S. government, regulators, or shareholders.

view counter
Snowden revelations have created a mini "Snowden industry"

The Edward Snowden revelations changed lives in the cyber community, from slowdowns in obtaining high-level security clearances to providing material for a "really good comedy routine." Experts at the cybersecurity forum this week were asked how Snowden altered their worlds. The creation of a mini "Snowden industry" is one on them.

Protecting the supply chain

The U.S. government has launched an initiative designed to protect the supply chain of both civilian and military agencies from potential cyberattacks. The effort is important in the e-commerce procurement process. The information and communications technology segment of the federal IT market potentially covered by the program involves 322 products and services with a total FY2013 value of $62.8 billion. The initiative is being managed jointly by the General Services Administration and the U.S. Department of Defense.

Homeland Security, Criminal Justice, Law & Public Policy - Master of Science Legal Studies 100% online - CALU Global Online
view counter
IDF tries to regulate cyberwarfare

The Israeli military last year appointed a legal adviser for cyber warfare, whose main task is to regulate cyber warfare activities based on principles of international law. The IDF has refused to confirm whether one of this adviser’s tasks is to approve targets, as it is for most of the IDF's legal advisers in operational positions. Many of the military's field commanders have been critical of these legal advisers’ work.

Also noted

Cyber warfare a greater threat to the US than terrorism: cyber expert | Cyber attack costs the Gulf Arab countries $1b per year | Why IT security contractors don't fear cyber warfare | Politico pegs Maryland as cyber leader | Tokyo to boost cybersecurity role | Expert says Chinese hackers used some simple tricks | Cybersecurity threats pose real danger to hedge fund firms | Veterans and the cybersecurity gap

 

view counter
Legion of the Rearguard - Dissident Irish Republicanism from ISBS
view counter
view counter
Homeland Security, Criminal Justice, Law & Public Policy - Master of Science Legal Studies 100% online - CALU Global Online
view counter
Progress and Modernity in Arab Societies
view counter
State, Political Community and Foreign Relations in Modern and Contemporary Syria
view counter
BIOMETRICS | BORDERS | Business | Cybersecurity | Detection | Disasters | Government | Immigration
Infrastructure | Public health | Public Safety | Sci-Tech | SECTOR REPORTS | Surveillance | Transportation
Homeland Security News Wire Home | About us | Subscribe | Advertise | Contact

Forward email

This email was sent to sjenkins@utahsenate.org by hsnewswire@newswirepubs.com |  

Homeland Security News Wire | 200 Old Country Road | Suite 200 | Mineola | NY | 11501