US building a Cyber Maginot Line.
Maginot Line WHICH during WWII the Germans just walked around.
US building a Cyber Maginot Line.
US building a Cyber Maginot Line.
MY COMMENTS IN CAPS, FOR EASE OF READING. G
However it seems that the US is too concerned with the problem of cyber defense in comparison with other countries. On April 26, the CIA unveiled its plans to new initiatives in the fight against Web-based attacks. The document outlines the plans for the next five years and director of the CIA Leon Pannetta said that it was “vital for the CIA to be one step ahead of the game when it comes to challenges like cyber space security". (2)
CORRECTION THE NUMBER OF AND DEPTH OF PENETRATIONS INTO MIL AND GOV AND COM DOMAINS INDICATE USA AND SECURITY VENDORS HAVE BEEN ONE STEP BEHIND HACKERS FOR 10 YEARS.
“Our statistics show that Trojans and rogueware ('fake' antivirus programs) amounted to almost 85 per cent of all malware activity in 2009. 2009 was also the year of Conficker, though this belies the fact that worms ranked at just 3.42 per cent of last year's malware creation”, the magazine read.
“The Conficker worm has caused serious problems in both domestic and corporate environments, with more than 7 million computers infected worldwide, and it is still spreading rapidly”.(1)
CONFICKER ISN'T EVEN TRYING, 3.42% OF MALWARE, AND 7 MILLION ZOMBIES.
The report outlined a new comprehensive framework to facilitate coordinated responses by government, the private sector, and allies to a significant cyber incident. CIVILIAN AND GOVERNMENT DOMAINS RELYING ON SECURITY
VENDORS ARE DEFRAUDing. THERE IS NOT EVEN ONE SECURITY SUITE THAT PROVIDES COMPREHENSIVE SECURITY AGAINST KNOWN, AGAIN I REPEAT KNOWN EXPLOITS AND THREATS.
AT BEST THEY PROVIDE SPORADIC PROTECTION AGAINST KNOWN EXPLOITS, NOT ONE SECURITY VENDOR PROVIDES PROTECTION AGAINST BOTS, KEYSTROKERS, ROOTKITS, ALL KNOWN EXPLOITS, MALWARE AND VIRUS. NONE. WE NEED GOVERNMENT REGULATION OF THE SECURITY VENDORS, TO PRODUCE MINIMUM STANDARDS OF REAL PROTECTION.
“Our statistics show that Trojans and rogueware ('fake' antivirus programs) amounted to almost 85 per cent of all malware activity in 2009. SECURITY VENDORS ARE NOT CAPABLE OF PROTECTING EVEN THEIR OWN TURF.
When commenting this article analysts point out that “The capabilities being sought would allow U.S. cyber-warriors to "deceive, deny, disrupt, degrade and destroy" information and computers around the globe”.(5)
Gen. Keith Alexander, the head of the Pentagon's new Cyber Command (ARFORCYBER) said: "We have to have offensive capabilities, to, in real time, shut down somebody trying to attack us," Earlier Keith Alexander compared cyber attacks with weapons of mass destruction and according to his recent statements the US is planning offensive application of the new warfare.
AND YET 3 YRS AFTER CONFICKER THEY CAN'T TOUCH IT DESPITE THE INVOLVEMENT OF TOP SECURITY VENDORS AND SECURITY MINDS FROM ACROSS THE CYBER DOMAIN. WHERE ARE THOSE OFFENSIVE CAPABILITIES?
SECURITY PROGRAMS ARE A
Cyber Maginot Line.
THEY ARE NOT A DETERRENT.
OFFENSIVE OPERATIONS ARE, AND HAVE NOT BEEN DEPLOYED.
In May 2009, the White House approved Cyberspace Policy Review (3), submitted to the US president by the members of a special commission. The document summed up the state of things in the US cyberspace and national information security. It was proposed to a appoint cyber security policy official responsible for coordinating the US cyber security policies and activities.
Numerous publications in the US mass media show that the reform of the national cyber defense forces as well as the introduction of the doctrine and strategy of the cyber war are soon to be completed.
William Lynn III in his article "The Pentagon's Cyberstrategy", published in Foreign Affairs journal (September/October 2010), outlined five basic principles of the future strategy:
- Cyber must be recognized as a warfare domain equal to land, sea, and air;
- Any defensive posture must go beyond “good hygiene” to include sophisticated and accurate operations that allow rapid response;
- Cyber defenses must reach beyond the department’s dot-mil world into commercial networks, as governed by Homeland Security;
- Cyber defenses must be pursued with international allies for an effective “shared warning” of threats; and
- The Defense Department must help to maintain and leverage U.S. technological dominance and improve the acquisitions process to keep up with the speed and agility of the information technology industry.
- Any defensive posture must go beyond “good hygiene” to include sophisticated and accurate operations that allow rapid response;
- Cyber defenses must reach beyond the department’s dot-mil world into commercial networks, as governed by Homeland Security;
- Cyber defenses must be pursued with international allies for an effective “shared warning” of threats; and
- The Defense Department must help to maintain and leverage U.S. technological dominance and improve the acquisitions process to keep up with the speed and agility of the information technology industry.
YEARS LATE AND MILLIONS OF DOLLARS SHORT. ( DAY LATE AND DOLLAR SHORT )
The command - made up of 1,000 elite military hackers and spies under one four-star general - is the linchpin of the Pentagon's new strategy and is slated to become fully operational Oct. 1. - Washington Post reports (6). The Defense Department has “15,000 networks and 7 million computing devices in use in dozens of countries, with 90,000 people working to maintain them and it depends heavily on commercial industry for its network operations” (7). Attracting allies and private companies working in the sphere of IT and security the US plans to establish the new order in the global cyber space.
PRIVATE COMPANIES AND IT SECURITY? THE SAME SECURITY VENDORS PIMPING ALL OF US WITH THEIR INCOMPLETE, PARTIAL, UNIMPRESSIVE, FRAUDULENT CRAP SECURITY PROGRAMS.
I HAVE ONE THING TO SAY "LONG TERM PERSISTENT ROOTKITS".
THE SECURITY VENDORS NEED TO BE HISTED ON THEIR OWN PETARDS.
LACK OF RESPONSIBILITY AND INTEGRITY IN THE SECURITY VENDOR INDUSTRY PUTS THE WWW AT RISK.
PROTECTION AGAINST ALL KNOWN THREATS AND EXPLOITS SHOULD BE A MINIMAL STANDARD, BUT SADLY, CURRENTLY IS THE QUEST FOR THE GOLDEN SHROUD. AND SOME HOW BEYOND SECURITY VENDORS?
GERALD
Internet Anthropologist
Tactical Internet Systems analyst.
GOOGLE FORMATTING STILL SCREWING UP , WTF?
.
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home