SecurityCertified

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, February 3, 2010

DNI Blair Leads with APT as a "Wake-Up Call"

Posted on 7:48 AM by Unknown
AFP is one of the few news outlets that correctly focused on the key aspect of testimony by US Director of National Intelligence Dennis Blair at yesterday's US Senate Select Committee on Intelligence hearing. In his testimony, DNI Blair began his Annual Threat Assessment of the US Intelligence Community with the following. I highlight "began" because this section wasn't buried in the middle of the document. He discussed digital threats right from the start.

The national security of the United States, our economic prosperity, and the daily functioning of our government are dependent on a dynamic public and private information infrastructure... This critical infrastructure is severely threatened.

The recent intrusions reported by Google are a stark reminder of the importance of these cyber assets, and a wake-up call to those who have not taken this problem seriously...

I am here today to stress that, acting independently, neither the US Government nor the private sector can fully control or protect the country’s information infrastructure...

The existing balance in network technology favors malicious actors, and is likely to continue to do so for the foreseeable future. Sensitive information is stolen daily from both government and private sector networks, undermining confidence in our information systems, and in the very information these systems were intended to convey.

We often find persistent, unauthorized, and at times, unattributable presences on exploited networks, the hallmark of an unknown adversary intending to do far more than merely demonstrate skill or mock a vulnerability...

Many have the capabilities to target elements of the US information infrastructure for intelligence collection, intellectual property theft, or disruption...


I'm sure a few readers keyed on the terms "unattributable" and "unknown". Only in the section on China did DNI Blair mention a country that "pose[d] challenges to its neighbors and beyond" with respect to cyber activities. He said:

The PLA’s capabilities and activities in four key areas pose challenges to its neighbors and beyond Taiwan, including China’s military relationships across the developing world; China’s aggressive cyber activities; its development of space and counterspace capabilities; and its expansive definition of its maritime and air space with consequent implications for restricted freedom of navigation for other states...

The other section where "cyber" was mentioned appeared in the International Organized Crime material:

International organized crime (IOC) is threatening US interests by forging alliances with corrupt government officials, undermining competition in key global markets, perpetrating extensive cyber crimes, and expanding their narcotrafficking networks...

International criminal organizations are likely to become more involved in cyber crimes, raising the risk of significant damage to the global financial and trust systems—banking, stock markets, and credit card services—on which the global economy depends.


I highlight the criminal aspect to remind everyone that cyber crime is a real problem that should not be forgotten!

I'm sure there are readers who will dismiss this as "Beltway propaganda," but I think it's important to realize what the nation's top intelligence official -- surely a "grown up" by anyone's standards -- has to say to the Senate about recent digital intrusions.
Email ThisBlogThis!Share to XShare to Facebook
Posted in apt | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Review of Intelligence, 4th Ed Posted
    Amazon.com just posted my five star review of Intelligence: From Secrets to Policy, 4th Ed by Mark Lowenthall . From the review : I was a...
  • DojoCon Videos Online
    Props to Marcus Carey for live streaming talks from DojoCon . I appeared in my keynote , plus panels on incident response and cloud secur...
  • A Book for the Korean Cyber Armies
    I've got a book for the Korean cyber armies, North and South. That's right, it's my first book , The Tao of Network Security Mo...
  • Practice of Network Security Monitoring Table of Contents
    Since many of you have asked, I wanted to provide an updated Table of Contents for my upcoming book, The Practice of Network Security Monito...
  • Mandiant APT1 Report: 25 Best Commentaries of the Last 12 Days
    Two weeks ago today our team at Mandiant was feverishly preparing the release of our APT1 report . In the twelve days that followed public...
  • Tort Law on Negligence
    If any lawyers want to contribute to this, please do. In my post Shodan: Another Step Towards Intrusion as a Service , some comments claim ...
  • Bejtlich's Thoughts on "Why Our Best Officers Are Leaving"
    Twenty-two years ago today I flew to Colorado Springs, CO and reported for Basic Cadet Training with the class of 1994 at the United States ...
  • My Role in Information Warfare during the Yugoslav Wars
    This morning I read a Tweet from @AirForceAssoc reminding me that: Today in Airpower History, August 30, 1995: NATO and U.S. aircraft bega...
  • Review of Crypto Posted
    Amazon.com just posted my four star review of Crypto by Steven Levy. From the review : Steven Levy's "Crypto" is a fascinati...
  • APT Presentation from July 2008
    Some of you may remember me mentioning the 2008 SANS WhatWorks in Incident Response and Forensic Solutions Summit organized by Rob Lee. I ...

Categories

  • afcert
  • Air Force
  • analysis
  • announcement
  • apt
  • attribution
  • bestbook
  • blackhat
  • books
  • breakers
  • bro
  • bruins
  • certification
  • china
  • cisco
  • cissp
  • cloud
  • clowns
  • commodore
  • conferences
  • controls
  • correlation
  • counterintelligence
  • cybercommand
  • cyberwar
  • dfm
  • education
  • engineering
  • feds
  • fisma
  • freebsd
  • GE
  • ge-cirt
  • hakin9
  • history
  • impressions
  • information warfare
  • ipv6
  • law
  • leadership
  • malware
  • mandiant
  • microsoft
  • mssp
  • nsm
  • offense
  • oisf
  • packetstash
  • philosophy
  • pirates
  • powerpoint
  • press
  • psirt
  • reading
  • redteam
  • reviews
  • russia
  • sans
  • sec
  • sguil
  • snorby
  • spying
  • threat model
  • threats
  • Traffic Talk
  • training
  • tufte
  • tv
  • ubuntu
  • usenix
  • verizon
  • vulnerabilities
  • wisdom
  • writing

Blog Archive

  • ►  2013 (16)
    • ►  September (1)
    • ►  August (1)
    • ►  June (2)
    • ►  April (2)
    • ►  March (1)
    • ►  February (3)
    • ►  January (6)
  • ►  2012 (60)
    • ►  December (4)
    • ►  November (5)
    • ►  October (3)
    • ►  September (10)
    • ►  August (2)
    • ►  July (6)
    • ►  June (6)
    • ►  May (4)
    • ►  April (2)
    • ►  March (9)
    • ►  February (6)
    • ►  January (3)
  • ►  2011 (108)
    • ►  December (3)
    • ►  November (7)
    • ►  October (11)
    • ►  September (9)
    • ►  August (18)
    • ►  July (10)
    • ►  June (5)
    • ►  May (4)
    • ►  April (13)
    • ►  March (17)
    • ►  February (2)
    • ►  January (9)
  • ▼  2010 (193)
    • ►  December (14)
    • ►  November (11)
    • ►  October (6)
    • ►  September (16)
    • ►  August (15)
    • ►  July (26)
    • ►  June (15)
    • ►  May (15)
    • ►  April (15)
    • ►  March (16)
    • ▼  February (19)
      • Information Security Jobs in GE-CIRT and Other GE ...
      • Reaction to Cyber Shockwave
      • Review of Intelligence, 4th Ed Posted
      • Offshoring Incident Response
      • Advice for Academic Researchers
      • Answers Regarding Military Service
      • Max Ray Butler Sentenced (Again)
      • Get the Divers Out of the Water
      • A Hacker in Charge of Your Tax Dollars?
      • Thor vs Clown
      • Making Progress Matters Most
      • So Much for China's "Peaceful Rise"
      • APT Presentation from July 2008
      • Review of The Book of Xen Posted
      • Answering APT Misconceptions
      • DFRWS, VizSec, and RAID 2010 Calls for Papers
      • Google and NSA Fulfilling 2008 Predictions
      • DNI Blair Leads with APT as a "Wake-Up Call"
      • Traffic Talk 9 Posted
    • ►  January (25)
  • ►  2009 (123)
    • ►  December (10)
    • ►  November (17)
    • ►  October (21)
    • ►  September (13)
    • ►  August (20)
    • ►  July (21)
    • ►  June (21)
Powered by Blogger.

About Me

Unknown
View my complete profile