Tuesday, March 19, 2013

Worldwide Cyber Attacks


The Government Security News published an article titled: "German Telecom Company Provides Real-Time map of Cyber-attacks". If it is credible, and at this point I have no reason to doubt its credibility, it is a fascinating bit of technology. Deutsche Telekom (the folks behind T-Mobile) indicates that there are about 450,000 cyber-attacks worldwide per day.
The portal has a digital map which reveals the alleged country origin of the cyber-attacks. I found it interesting- in the last month, the top 5 countries conducting attacks were listed as:
  1. Russian Federation
  2. Taiwan, Province of China
  3. Germany
  4. Ukraine
  5. Hungary
The United States was 6th and China came in a distant 12th. Granted China might be "laying low" because of the Mandiant_APT1_Report - But I doubt it.
The number one attack type was the Server Message Block (SMB) Network services attack against port 445. Of the short time I monitored the portal, there were numerous hits from Australia, Bosnia and Herzeg, and Columbia.
This capability tends to concern me greatly- What about you?
The article can be found at: http://www.gsnmagazine.com/node/28720?c=cyber_security&utm_source=Homeland+Security+Insider+--+March+14%2C+2013&utm_campaign=Feb.+27%2C+2013&utm_medium=email 
Check it out....

Thursday, February 28, 2013

The Deep Web; an Intelligence Challenge

There is a great deal of well deserved, comment, about Cyberspace Security. The White House as planted a stake in the ground that will affect how we respond to this threat to our National Security and Economy.  The President stated “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America's economic prosperity in the 21st century will depend on cyber security.”  America faces a very unique challenge. We need to proactively secure our physical cyber infrastructure and deal with those who clandestinely and vigorously attack our cyberspace from external and internal sources. This puts us on the horns of a dilemma. As a country of laws and people who value their privacy; Anonymity travels in close relationship to “Freedom of Information.” We can get a handle on the former (it will be a monumental effort but not insurmountable).The latter raises the classic intelligence conundrum of not only defining capability but determining intent. If approximately 99% of the information to be analyzed is within an environment that is designed for anonymity and obscurity, we have our work cut out for us. I speak of the Deep Web. Several companies have gone where none have gone before and began mapping this galaxy, but much remains to be done. Traditional search and indices are not enough. Big Data analytical techniques are going to be needed. Ways to safely disseminate this information to those who need it must be found and most of all, diligent vigilance and respect for our laws must be maintained.