http://www.geostrategy-direct.com/geostrategy-direct/secure/2011/06_08/ba.as p?
Cyberthreats increasing: Critical U.S.infrastructure being hit often Senior Obama administration security officials said last week that the threat posed by cyber attacks on U.S. computer networks is growing as systems have numerous security vulnerabilities. "The United States confronts a dangerous combination of known and unknown vulnerabilities, strong and rapidly expanding adversary capabilities, and limited comprehensive threat and vulnerability awareness," said three senior officials in prepared testimony to the House Judiciary committee. "Within this dynamic environment, we are confronted with threats that are more targeted, more sophisticated, and more serious." http://www.geostrategy-direct.com/geostrategy-direct/images/2011/crimecyber. jpg "Governments have become as reliant on information technology as corporations have." <http://www.huffingtonpost.com/2011/06/02/cybersecurity-us-diplomatic-priori ty_n_870179.html> Getty _____ The three officials were James A. Baker, associate deputy attorney general, Greg Schaffer, assistant secretary for cyber security at the Homeland Security Department and Ari Schwartz, senior adviser at the National Institute of Standards and Technology. Critical U.S. infrastructure including electrical grids, financial institutions and transportation networks were hit with repeated cyber intrusions and cyber crime has increased dramatically over the past decade, they said at a hearing of two subcommittee that deal with crime and information security May 25. "Sensitive information is routinely stolen from both government and private sector networks, undermining confidence in our information systems, the information collection and sharing process, and the information these systems contain," the officials said. While the lost of intellectual capital is "deeply concerning," the three officials said "we increasingly face threats that are of even greater concern." "Our nation is at risk. The cybersecurity vulnerabilities in our government and critical infrastructure are a risk to national security, public safety, and economic prosperity," Messrs. Baker, Schaffer and Schwartz stated. In later testimony, Robert W. Holleyman, president of the Business Software Alliance, said current cybersecurity threats are gave and fall into four categories: cybercrime, espionage targeting corporations, espionage against governments and cyber warfare. "Cyber attacks against the computers, servers and networks on which companies depend have reached unprecedented levels of sophistication, with the aim of committing extortion or stealing intellectual property and other trade secrets for the benefit of competitors," Holleyman said. "Governments have become as reliant on information technology as corporations have; as a result, advanced persistent threats that penetrate government computers, servers and networks can produce significant intelligence." On cyberwarfare, Hollyman said the dependence of the nation on networks "can be exploited by another to electronically disable its critical infrastructure, essential governmental services and military capabilities." Among the attack trends outlined by Hollyman are: . Targeted attacks: Attackers increasingly identify specific targets and develop sophisticated plans for compromising their computers. They have learned that the easiest vulnerability to exploit is our trust of friends and colleagues. . Social networking: Linked to the first trend is the exploitation of online social networks which provide rich research for tailoring an attack allowing hackers to learn our interests, gain our trust, and convincingly masquerade as friends. . Stealth: Once inside an organization, a targeted attack attempts to avoid detection until its objective is met. Exploiting zero?day vulnerabilities (previously unknown and unpatched security holes) and using rootkits (software that provides privileged access) are two effective ways of evading detection. . Attack kits that are packaged and traded as easy-to-use attack kits in a vast underground economy. [Non-text portions of this message have been removed] ------------------------------------ -------------------------- Want to discuss this topic? Head on over to our discussion list, discuss-os...@yahoogroups.com. -------------------------- Brooks Isoldi, editor biso...@intellnet.org http://www.intellnet.org Post message: osint@yahoogroups.com Subscribe: osint-subscr...@yahoogroups.com Unsubscribe: osint-unsubscr...@yahoogroups.com *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtmlYahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ <*> Your email settings: Individual Email | Traditional <*> To change settings online go to: http://groups.yahoo.com/group/osint/join (Yahoo! ID required) <*> To change settings via email: osint-dig...@yahoogroups.com osint-fullfeatu...@yahoogroups.com <*> To unsubscribe from this group, send an email to: osint-unsubscr...@yahoogroups.com <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/