WASHINGTON — During the five-month period between October and February, there were 86 reported attacks on computer systems in the United States that control critical infrastructure, factories and databases, according to the Department of Homeland Security, compared with 11 over the same period a year ago.
Innovations in technology are changing the tactics of modern-day conflict. There are new tools in today's arsenal of weapons. Helped by advances in electro-magnetics and modern information and communications technology, a new form of electronic warfare has been created. It is called cyberwar and is increasingly recognized by governments and the military as posing a potentially grave threat.
SAN FRANCISCO — Deputy Defense Secretary Ashton B. Carter told the security industry at the RSA Conference that protecting cyberspace is a cooperative effort between the government and the private sector, and that the Defense Department is preparing to play an active role in both military and civilian systems.
Few would argue against the need to improve U.S. cybersecurity, but the current partisan divide on how to accomplish this goal threatens to stall much-needed legislation in this area. On February 14th, Sen. Joseph Lieberman (I-CT) and Sen. Susan Collins (R-ME) introduced the Cybersecurity Act of 2012, a bill that aims to improve US cyber defense, clarify responsible government oversight authorities, raise issue awareness, and promote information sharing between the private sector and the government.
When a Greeneville, Tenn., man saw that e-mails he sent were different from what the intended recipient received, he immediately suspected his soon-to-be ex-wife. His suspicions turned out to be true: She had installed snooping software on his computer, intercepted his e-mails and altered them, according to federal court records.
Never before in history has there been a more complex form of warfare than Cyberwarfare. The cyber battlefield is an ever evolving and seemingly insurmountable obstacle. At 361Security we have dedicated this section to writings from IT professionals from the US and European defense communities. They have volunteered to offer 361 and its readers a professional approach to current and future Cyber threats. Additionally we will provide ample updates to others writings.