This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.This theme is Bloggerized by Lasantha Bandara - Premiumbloggertemplates.com.

Showing posts with label cybersecurity. Show all posts
Showing posts with label cybersecurity. Show all posts

Wednesday, November 14, 2012

Obama secretly signs the most aggressive cybersecurity directive ever


 
Reuters/Rick Wilking

Source: Russia Today
http://rt.com/usa/news/obama-directive-20-cyber-715/

Six years after the White House first started running amok on the computer networks of its adversaries, US President Barack Obama has signed off on a top-secret order that finally offers blueprints for the Pentagon’s cyberwars.

Pres. Obama has autographed an executive order outlining protocol and procedures for the US military to take in the name of preventing cyberattacks from foreign countries, the Washington Post reports, once and for all providing instructions from the Oval Office on how to manage the hush-hush assaults against opposing nation-states that have all been confirmed by the White House while at the same time defending America from any possible harm from abroad.

According to Post’s sources, namely “officials who have seen the classified document and are not authorized to speak on the record,” Pres. Obama signed the paperwork in mid-October. Those authorities explain to the paper that the initiative in question, Presidential Policy Directive 20, “establishes a broad and strict set of standards to guide the operations of federal agencies in confronting threats in cyberspace.”

Confronting a threat may sound harmless, but begs to introduce a chicken-and-the-egg scenario that could have some very serious implications. The Post describes the directive as being “the most extensive White House effort to date to wrestle with what constitutes an ‘offensive’ and a ‘defensive’ action in the rapidly evolving world of cyberwar and cyberterrorism,” but the ambiguous order may very well allow the US to continue assaulting the networks of other nations, now with a given go-ahead from the commander-in-chief. Next in line, the Post says, will be rules of engagement straight from the Pentagon that will provide guidelines for when to carry out assaults outside the realm of what is considered ‘American’ in terms of cyberspace.

“What it does, really for the first time, is it explicitly talks about how we will use cyber operations,” one senior administration official tells the paper of the policy directive. “Network defense is what you’re doing inside your own networks. . . . Cyber operations is stuff outside that space, and recognizing that you could be doing that for what might be called defensive purposes.”

When The New York Times published an exposé on the White House’s so-called Olympics Games program earlier this year, the world became fully aware for once of America’s involvement in international cyberwar, but much to the chagrin of Washington. Officials including members of Pres. Obama’s national security team spoke on condition of anonymity to tell the Times that his predecessor, then-Pres. George W. Bush, began the program in 2006 to target Iran’s nuclear facilities and then passed it along to the current administration to continue under the leadership of the current commander-in-chief.

“From his first months in office,” David Sanger wrote for the Times, Pres. Obama “secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons.”

Congress has fought tooth-and-nail in the months since to plug any leaks that could potentially spill the beans regarding any further secrets with the potential of effecting national security, but those efforts appear unsuccessful given this week’s Post report on Presidential Police Directive 20.

Now take the example of Iran: according to the Post, Pres. Obama’s signature on last month’s directive means the US now has rules and regulations when it comes to protecting its own infrastructure from cyberattack, and can do so by means of launching what appear to be pre-emptive assaults of their own.

“It should enable people to arrive at more effective decisions,” a second senior administration official tells the Post. “In that sense, it’s an enormous step forward.”

That comment echoes US Defense Secretary Leon Panetta’s insistence earlier this year that “defense alone is not enough” in terms of keeping the country safe. But what it also seems to do is put on the books a presidential policy that equates an overzealous offense with a solid defense. While the US has cited Iranian hackers as the key players behind a recent attack on the websites of Capital One Financial Corp. and BB&T Corp., two of the biggest names in the American banking industry, the US has done little — on the record — to reveal any similar assaults from abroad. Instead, rather, it’s relied on fear-mongering to try and convince the country to accept a cybersecurity legislation that will assure American’s safety from foreign hackers, all for the small price of sacrificing their digital-age privacy.

While the Obama White House has failed to acknowledge the Olympic Games program or any involvement in the Stuxnet or Flames viruses linked to the initiative, computer researchers in both the US and Russia have tied Washington to the cripplingly malicious coding. Earlier this month, California-based Chevron, one of the world’s leaders in the oil sector, went public with claims that Stuxnet had infected — but not affected — their computers after the virus was unleashed.

The ability to slow down or speed up centrifuges in nuclear facilities from thousands of miles away made Stuxnet a virus that had very substantial powers. Refusing to speak of the Olympic Games program specifically, former CIA chief Michael Hayden told the Times, “This is the first attack of a major nature in which a cyberattack was used to effect physical destruction.”

According to the Post’s latest, though, future assaults by way of Stuxnet or similar worms could be considered by Washington as defense mechanisms to make sure Iran doesn’t retaliate for what America has long-been lashing out with. One source tells the Times that, before last month’s directive, severing any link between a US-computer and an overseas server by any means possible would be an act that would put America on the offensive. Now even a preemptive attack that disconnects other countries could be considered a defensive ploy according to the president.

“That was seen as something that was aggressive…particularly by some at the State Department,” one defense official tells the Post. With the signing of Pres. Obama’s latest order, though, the paper writes that the directive “effectively enables the military to act more aggressively to thwart cyberattacks on the nation’s web of government and private computer networks.”

It is thought that, through the directive, any systems linked even remotely with America’s can be fair game for an assault. Given the expansion of cloud computing and the ever-expanding interconnection of communities across the globe on the Web, though, that could essentially enable Uncle Sam’s cybersquad to get away with a whole new slew of tricks to try and topple adversaries of any kind that threaten the American way of life. When and where those actions are necessary, of course, remains another topic of discussion. Will those orders be signed in secrecy as well, though?

 

Monday, September 17, 2012

White House doesnt address privacy concerns in cybersecurity executive order draft


 

Reuters / Lucas Jackson

Source: Russia Today
http://rt.com/usa/news/cybersecurity-executive-order-sharing-362/

A copy of the cybersecurity executive order currently being written by the Obama administration has been leaked to the Web, and the contents do little to calm the fears of those who suspected their privacy concerns wouldn’t be considered.

Only days after journalists with both Federal News Radio and TechDirt.com claimed to have come into possession with a copy of a cybersecurity executive order being readied by the White House, a draft assumed to be authored for the president has been leaked, and in it the Obama administration lays down the groundwork for interim cybersecurity measures following Congress’ failure to come to agreement on legislation of their own. But while the alleged executive order does not discuss the specifics of what the White House has in mind for protecting the country’s e-grid, it also fails to provide any safe guards for making sure that any sharing of personal information does not raise privacy concerns or cause any civil rights violations.

“It is therefore essential that a mutually beneficial arrangement for public-private collaboration be further developed,” the introduction of the draft declares. Over the course of the 18 pages that follow, the Obama administration authors repeatedly remark about the necessity for streamlining the sharing of information held by private sector companies with the federal government. Nowhere, however, has the White House explained how it plans to protect the rights of Americans.

Under earlier cyber legislation considered by Congress, private-sector entities, including businesses and telecom providers, would be offered federal incentives for openly providing the government with personal details offered up by their customers — the American public. Although the leaked copy does not describe any specific-handouts, it heavy handedly avoids explaining anything that will be done to handle the privacy concerns that were caused by earlier attempts at cyber bills.

In one excerpt of the draft, the establishment of a “risk management framework” is discussed, explaining it as something that would “facilitate streamlined collaboration and information sharing mechanisms,” as well as “address interdependencies among critical infrastructure sectors.”

“Because the majority of the Nation’s crucial infrastructure is owned and operated by the private sector, efforts to strengthen and maintain secure, functioning and resilient critical infrastructure required effective and routine collaboration and information exchange between all levels of government and critical infrastructure owners and operators,” it continues.

Elsewhere in the draft, “information sharing”between private and federal entities is considered imperative and a call to arms it made to “facilitate an optimization of resources to advance our collective ability to act when a threat is present or an incident occurs.” Not only does the vague wordage included in the draft leave the possibility of information collection and sharing open-ended, but suggests that this act is only the starting point of what sort of cyber-sharing protocols are yet to be put to use.

The draft, according to the copy released by TechDirt, also calls for the establishment of a “24/7 situational awareness and crisis monitor” system managed by the US Department of Homeland Security, which will “facilitate information sharing, interaction and collaboration among and between SSAs and other Federal department agencies, critical infrastructure, owners and operators and international partners.” In another section, the White House rallies for a National Cybersecurity Center to exist with “the ability to enable and support situational awareness and a common operating picture for cyberspace across private sector, Federal, SLTT and international entities y integrating information obtained from such entities and providing cyber information to support the Secretary of Homeland Security.”

The process, writes the White House, will include “an institutionalized capability to facilitate information sharing.” Nowhere, though, do they discuss how they will facilitate the civil liberties concerns raised by the sharing of sensitive intelligence.

Although the White House has not yet weighed in on the authenticity of the alleged draft, the Obama administration does admit to be at work on readying a copy for release.

"Following congressional inaction, the President is determined to use existing executive branch authorities to protect our nation against cyber threats," National Security Adviser John Brennan confirmed in a letter sent from the White House on Friday. "Specifically, we are exploring an Executive Order to direct executive branch departments and agencies to secure our nation's critical infrastructure by working with the private sector."