2013-09-26

NSA's globalized internet security

9.26: news.cyb/sec/NSA's globalized internet security:
Sept. 25, 2013, Army Gen. Keith B. Alexander,
Cybercom commander, and director of NSA,
at the National Press Club
or 4th Annual Cybersecurity Summit .

. in the past year, we saw more than 300
distributed denial-of-service attacks
on Wall Street.
We saw destructive attacks against
Saudi Aramco and RasGas [Co. Ltd.],
and against South Korea .

. U.S. Cyber Command (Cybercom)
has activated the headquarters for
one of its 3 Cyber Force branches:
Cyber National Mission Force,
that defends the nation;
Cyber Protection Force
defends DOD's information environment.
and Cyber Combat Mission Force
will provide assistance to the military
to implement cyber counterattacks .
Cybercom teams are now fully operational
and working side by side with NSA
to defend the nation.
The Army, Navy and Marines
trained about a third of the force in 2013
and they will train a third in 2014
and another third in 2015.
"Cyber Command provides cyber support to
every combatant command today,"
"We're refining our operational concepts
and our command and control.
And coming up with command and control
is absolutely vital to the future.'

The second area critical to cybersecurity,
especially in the Defense Department,
is to move from the legacy
information technology architecture
to a defensible architecture .
In fact, the Defense Information Systems Agency,
working with Cybercom, NSA and the services,
is beginning to implement a
Joint Information Environment
that will upgrade the DOD legacy system.

. the same thin virtual cloud environment
used by the intelligence community
is what should also be protecting
our nation's private sector .
[26:
. "thin" likely means
the clients use few local resources;
ie, most functionality -- esp'ly security assurance --
is handled by remote service providers .]
In such an environment,
patching all computers on the net
could be instantanious and automated;
and, we can dynamically relocate resources
to hide from being scanned by an adversary:
hiding networks, databases, and phone systems
will make exploitation very difficult .

. the third area of critical importance
is shared situational awareness,
a common way for people to understand events
that happen in cyberspace.
Where is the adversary coming from?
Where are they getting into the country?
What is Cyber Command's role?
What is NSA's role?
How do our allies see that?
How do we work together? .
. Cybercom, NSA and the DOD,
are developing a common operational picture
and will share it with the FBI,
the Department of Homeland Security,
the CIA, with all the combatant commands,
and with some U.S. allies.

The fourth area critical in cybersecurity
is that government must work with industry,
Industry manages more than 85% of our networks;
but cybercom has to be responsible
for defending the country from attack;
so they need cooperation from ISP's
(Internet service providers)
-- "Not just here but with our allies and others".

The fifth area in need of work
involves Congressional authorization
regarding cybersecurity and private industry
-- specifically, how Cybercom will share information
how Cybercom will provide liability protection,
and what Cybercom's rules of engagement are .
This is a difficult topic politically,
as everyone believes Cybercom should be
responsible to the politicians;
but Wall Street's security needs are urgent!
--- "we don't want NSA and Cyber Command
waiting for the authorities" .
. just as if this were a missle attack,
Cybercom has to defend the nation first,
and ask permission later .
[26:
. keep in mind the possibility
that Snowden was a deliberate leak
to get people used to pervasive surveillance,
so that people would feel watched
and would be less likely to conspire
to overthrow the governement
as they lead up to WWIII and the
highly taxing inflationary depression .
. sure they are defending Wall Street,
but they are also defending Zionism
for the march to a New World Order .]

No comments: