This is the start of a new weekly post highlighting some of the news and analysis in the area of cyber security that has caught our attention. Week 30 links follow:
General Keith Alexander speaks cyber security at CSIS
General Keith Alexander, current Director, National Security Agency (DIRNSA), Chief, Central Security Service (CCSS) and Commander, United States Cyber Command, spoke about cyber security and U.S. Cyber Command at the Center for Strategic and International Studies (CSIS). The event was held today at the Center for Strategic and International Studies in Washington DC and his General Alexander’s first public speaking engagement after his recent promotion to the Commander of US Cyber Command.
The video, published on the CSIS web site, is embedded below.
He starts with a brief introduction on events that led to the setting up of the US Cyber Command. He then goes on to define the scope of the role played by Cyber Command as “centralise command of military cyberspace operations, strengthen DoD cyberspace capability and integrate DoD cyberspace expertise.” He mentions the scale of DoD systems – 7 million machines, 15,000 networks, 21 satellite gateways and 20,000 commercial circuits. He mentions that DoD systems are probed by unauthorised people 250,000 times an hour, over 6 million times a day.
General Alexander then goes on to explain a shift in the attack patterns from network penetration targeted at exploiting data to targeting systems for remote sabotage. Cyberspace differs from likes of land and sea in that it is a man made domain and a hotly contested domain. He tries to dispel the concerns of co-locating the cyber command along with NSA, thus involving the intelligence community in securing nation’s cyber infrastructure, by has robust and rigorous procedures to minimise the effect of the intelligence activities on US persons. See the video for more.
From Indian perspective it is interesting that he mentions that cyber command will exercise its power to protect the cyber infrastructure of not just US military but also help allies to do the same. I wonder how much of engagement with India would that translate to and for that matter how much would countries of interest like Pakistan squeeze out of this overture.
- ConcettaJuicy: Hello. I see that you don't update your website t...
- Raymundo: Just desire to say your atclrie is as surprising. ...
- @srijith: At Vyuha "The “mirror” effect" http://t.co/u...
- @srijith: GoI bars international vendors from National Optic...
- @filter_c: I am reminded of an old blogpost by @srijith on th...
- Cyber Security Policy: [...] NSCS’ cyber Security Policy | VyūhaAn...
- (@srijith) (@srijith): At Vyuha - "Use of private companies in cyber ope...
- Srikanth R. (@_R_Srikanth) (@_R_Srikanth): Informative Q&A on Cyberwar by Dr. Martin Libi...
- Rohan Joshi (@filter_c): Hello, Mr. Sachin Pilot. RT @srijith: Over at Vyū...
- Srijith (@srijith) (@srijith): Over at Vyūha - “Hacked and shamed” and beyon...
- Govt to develop own operating system May 12, 2010
- Why did GhostNet succeed? April 22, 2010
- Hardware security and the Chinese May 17, 2010
- In the Beginning April 20, 2010
- Biomimicry on its “side” March 1, 2011
- Security of Indian Electronic Voting Machines May 3, 2010
- Army does 27001 audit, that should make it secure July 21, 2010
- No .xxx please, we are .gov.in April 5, 2011
- System security and fascination with homegrown solutions February 13, 2011
- Cyberwar makes NPT useless? October 22, 2010