Goto

Collaborating Authors

 cyber command


Ex-NSA Chief Paul Nakasone Has a Warning for the Tech World

WIRED

The Trump administration's radical changes to United States fiscal policy, foreign relations, and global strategy--combined with mass firings across the federal government--have created uncertainty around US cybersecurity priorities that was on display this week at two of the country's most prominent digital security conferences in Las Vegas. "We are not retreating, we're advancing in a new direction," Cybersecurity and Infrastructure Security Agency chief information officer Robert Costello said on Thursday during a critical infrastructure defense panel at Black Hat. As in other parts of the federal government, the Trump administration has been combing intelligence and cybersecurity agencies to remove officials seen as disloyal to its agenda. Alongside these shifts, the White House has also been hostile to former US cybersecurity officials. In April, for example, Trump specifically directed all departments and agencies to revoke the security clearance of former CISA director Chris Krebs.


The Tragic Fallout From a School District's Ransomware Breach

WIRED

Ransomware gangs have long sought pain points where their extortion demands have the greatest leverage. Now an investigation from NBC News has made clear what that merciless business model looks like when it targets kids: One ransomware group's giant leak of sensitive files from the Minneapolis school system exposes thousands of children at their most vulnerable, complete with behavioral and psychological reports on individual students and highly sensitive documentation of cases where they've allegedly been abused by teachers and staff. But first, WIRED contributor Kim Zetter broke the news this week that the Russian hackers who carried out the notorious SolarWinds espionage operation were detected in the US Department of Justice's network six months earlier than previously reported--but the DOJ didn't realize the full scale of the hacking campaign that would later be revealed. Meanwhile, WIRED reporter Lily Hay Newman was at the RSA cybersecurity conference in San Francisco, where she brought us stories of how security researchers disrupted the operators of the Gootloader malware who sold access to victims' networks to ransomware groups and other cybercriminals, and how Google Cloud partnered with Intel to hunt for and fix serious security vulnerabilities that underlie critical cloud servers. She also captured a warning in a talk from NSA cybersecurity director Rob Joyce, who told the cybersecurity industry to "buckle up" and prepare for big changes to come from AI tools like ChatGPT, which will no doubt be wielded by both attackers and defenders alike.


Secretive Pentagon research program looks to replace human hackers with AI

#artificialintelligence

The Joint Operations Center inside Fort Meade in Maryland is a cathedral to cyber warfare. Part of a 380,000-square-foot, $520 million complex opened in 2018, the office is the nerve center for both the U.S. Cyber Command and the National Security Agency as they do cyber battle. Clusters of civilians and military troops work behind dozens of computer monitors beneath a bank of small chiclet windows dousing the room in light. Three 20-foot-tall screens are mounted on a wall below the windows. On most days, two of them are spitting out a constant feed from a secretive program known as "Project IKE." The room looks no different than a standard government auditorium, but IKE represents a radical leap forward. If the Joint Operations Center is the physical embodiment of a new era in cyber warfare -- the art of using computer code to attack and defend targets ranging from tanks to email servers -- IKE is the brains. It tracks every keystroke made by the 200 fighters working on computers below the big screens and churns out predictions about the possibility of success on individual cyber missions. It can automatically run strings of programs and adjusts constantly as it absorbs information. IKE is a far cry from the prior decade of cyber operations, a period of manual combat that involved the most mundane of tools.


Twilight of the Human Hacker – Center for Public Integrity

#artificialintelligence

The Joint Operations Center inside Fort Meade in Maryland is a cathedral to cyber warfare. Part of a 380,000-square-foot, $520 million complex opened in 2018, the office is the nerve center for both the U.S. Cyber Command and the National Security Agency as they do cyber battle. Clusters of civilians and military troops work behind dozens of computer monitors beneath a bank of small chiclet windows dousing the room in light. Three 20-foot-tall screens are mounted on a wall below the windows. On most days, two of them are spitting out a constant feed from a secretive program known as "Project IKE." Join the Watchdog newsletter to hear about our latest ground-breaking investigation. The room looks no different than a standard government auditorium, but IKE represents a radical leap forward. If the Joint Operations Center is the physical embodiment of a new era in cyber warfare -- the art of using computer code to attack and defend targets ranging from tanks to email servers -- IKE is the brains. It tracks every keystroke made by the 200 fighters working on computers below the big screens and churns out predictions about the possibility of success on individual cyber missions. It can automatically run strings of programs and adjusts constantly as it absorbs information. IKE is a far cry from the prior decade of cyber operations, a period of manual combat that involved the most mundane of tools.


DOD to Lay Foundation for AI-based Cybersecurity

#artificialintelligence

The Defense Department's artificial intelligence strategy, released in February, calls for the use of standardized processes in areas such as data, testing and evaluation, and cybersecurity. Now, the DOD is starting to make that a reality. The Pentagon's Joint Artificial Intelligence Center plans to work with the National Security Agency, U.S. Cyber Command and numerous DOD cybersecurity vendors to standardize data collection across the department, JAIC chief Lt. Gen. Jack Shanahan said earlier this month, as Nextgov reports. Speaking earlier this month at the Billington CyberSecurity Summit in Washington, D.C., Shanahan discussed how the DOD wants to create a consistent way to curate, share and store cybersecurity data from across the Pentagon's entire IT environment. Doing so will make it to easier to deploy AI-powered cybersecurity programs, he said.


US cyberattack brought down Iranian database used to target ships in Persian Gulf: reports

FOX News

Jennifer Griffin predicts Trump's military response to Iran shooting down a U.S. drone would be much different if an American had been injured or killed. Iran is still feeling the pain after U.S. cyber military forces brought down a database used by its Revolutionary Guard Corps to target ships in the Persian Gulf, hours after the Islamic Republic shot down an American drone, officials say. The retaliatory cyberattack on June 20 focused on a system that Iran uses to determine which oil tankers and marine traffic it should go after, a senior U.S. official told the New York Times. As of Thursday, Iran has yet to recover all of the data lost in the attack and is trying to restore military communication networks linked to the database, the newspaper added. President Trump reportedly signed off on the U.S. Cyber Command's strike though the government has not publicly acknowledged it happened, according to the Washington Post.


How the (Likely) Next NSA/CyberCom Chief Wants to Enlist AI

#artificialintelligence

The Army general likely to be tapped to head U.S. Cyber Command and the NSA has some big plans for deploying cyber forces and using artificial intelligence in information attacks. Lt. Gen. Paul Nakasone, who currently leads U.S. Army Cyber Command, is expected to nominated in the next few months to replace Adm. Michael Rogers, as first reported by The Cipher Brief (and confirmed by the Washington Post and a Pentagon source of our own). But caution is in order: the rumor mill says several other contenders are in the running, including Army Lt. Gen. William Mayville. Neither Cyber Command nor the Pentagon would comment about the potential nomination. UPDATE: As @TheCipherBrief reported, Lt. Gen. Paul Nakasone is expected to be Trump's nominee.


US military to send cyber soldiers to the battlefield

Daily Mail - Science & tech

The US Army will soon send teams of cyber warriors to the battlefield, officials said Wednesday, as the military increasingly looks to take the offensive against enemy computer networks. While the Army's mission is generally to'attack and destroy,' the cyber troops have a slightly different goal, said Colonel Robert Ryan, who commands a Hawaii-based combat team. How can I influence by non-kinetic means? How can I reach up and create confusion and gain control?' he told reporters. The US Army will soon send teams of cyber warriors to the battlefield, officials said Wednesday, as the military increasingly looks to take the offensive against enemy computer networks. The cyber soldiers have been integrated for six months in infantry units, and will tailor operations according to commanders' needs, said Colonel William Hartman of the Army's Cyber Command.


Artificial Intelligence and Cyber Defense

#artificialintelligence

The current year has seen an unprecedented amount of hacker/ransomware attacks on government as well as private enterprises spread all across the world. Shadow Brokers came in form this year by leaking alleged NSA tools, which included a Windows exploit known as EternalBlue. In May, WannaCry ransomware crippled hundreds of thousands of computers belonging to public utilities, large corporations, and private citizens. It also affected National Health Service hospitals and facilities in the United Kingdom. It was halted in its tracks by utilizing its flaws and activating a kill switch.


Machine-Learning Technologies Help Agencies Develop Highly Intelligent Security Postures

#artificialintelligence

The cyberwarfare landscape is changing -- here's how to prepare The cyberwarfare landscape is changing -- here's how to prepare The cyberwarfare landscape is changing -- here's how to prepare Get the latest federal technology news delivered to your inbox. Machine learning makes life much more manageable for network security operators. If the recent spate of alleged Russian cyberattacks has taught us anything, security breaches can happen so quickly and stealthily, the damage will be done before anyone even realizes there was a hack. In fact, as malicious actors become more insidious, federal network security managers are finding the reaction time between identifying and mitigating potential threats has gone from minutes to milliseconds. Factor in the volume and complexity of the threats, and it becomes evident the challenge has grown well beyond what can be managed through manual intervention.