Hoje, 8 de julho de 2015, o WikiLeaks libera mais de 1 milhão de e-mails pesquisáveis do fornecedor italiano de malwares de vigilância Hacking Team, que passou pela primeira vez sob escrutínio internacional após a publicação do SpyFiles pelo WikiLeaks. Esses e-mails internos mostram o funcionamento interno da polêmica indústria de vigilância global.



Today, 8 July 2015, WikiLeaks releases more than 1 million searchable emails from the Italian surveillance malware vendor Hacking Team, which first came under international scrutiny after WikiLeaks publication of the SpyFiles. These internal emails show the inner workings of the controversial global surveillance industry.

MINYANVILLE ORIGINAL - No Aspen Security Forum, o General Keith B. Alexander, chefe da Agência de Segurança Nacional e do Comando de Cyber ​​dos Estados Unidos, falou de um aumento de 17 vezes nos ataques cibernéticos contra a infraestrutura americana entre 2009 e 2011. (Se você Se você não estiver familiarizado com a Cybercom, sua declaração de missão, "9ec4c12949a4f31474f299058ce2b22a," é um código MD5 (O MD5 (Message-Digest algorithm 5) é uma função de dispersão criptográfica (ou função hash criptográfica) de 128 bits unidirecional desenvolvido pela RSA Data Security, Inc., descrito na RFC 1321, e muito utilizado por softwares com protocolo ponto-a-ponto (P2P, ou Peer-to-Peer, em inglês) na verificação de integridade de arquivos e logins) ou "message-digest" de 32 caracteres que, quando traduzido, significa:

A USCYBERCOM planeja, coordena, integra, sincroniza e conduz atividades para: dirigir as operações e a defesa de redes de informação específicas do Departamento de Defesa e; preparar-se para, e quando direcionado, realizar operações ciberespaciais militares de espectro total a fim de possibilitar ações em todos os domínios, garantir a liberdade de ação dos EUA / Aliados no ciberespaço e negar o mesmo aos nossos adversários.

O general Alexander disse o que o preocupava sobre o aumento de ataques cibernéticos estrangeiros nos Estados Unidos era que um número crescente visava a "infraestrutura crítica" e que os Estados Unidos continuavam despreparados para evitar uma grande Cyber War. Em uma escala de 1 a 10, ele disse, a preparação americana para uma guerra cibernética em grande escala é "em torno de 3". Ele pediu que a aprovação da legislação, que pode chegar a votação na próxima semana, dê ao governo novos poderes. para defender redes de computadores privadas nos Estados Unidos. A legislação provocou uma luta na medida em que as empresas americanas tentam evitar a regulamentação dispendiosa em suas redes, e alguns grupos de liberdades civis expressam preocupação com o efeito sobre a privacidade.




Re: Which Defense Companies Will Help the US Win the Cyber War?

Email-ID572272
Date2012-08-07 05:55:44 UTC
Fromvince@hackingteam.it
Tomch006@politi.dk, rsales@hackingteam.it
Hi Martin,
I am deleting your account from my list.
Unfortunately I do not have a secondary list limited to our business technologies.
I suggest you check our web site from time to me in order to see announcements of new versions of Remote Control System. A new, major release of RCS will be released due the end of year.
Have a nice day,David
On Aug 6, 2012, at 8:44 AM, MCH006@politi.dk wrote:
Hi David. Thank you for your interesting mails but the frequency is a bit too much could you please unsubscribe me from this list. I would still like to hear news concerning your company and your products. Best regards Martin KraghDanish police Fra: David Vincenzetti [mailto:vince@hackingteam.it]
Sendt: 5. august 2012 15:29
Til: list@hackingteam.it
Emne: Which Defense Companies Will Help the US Win the Cyber War? VERY interesting article from http://www.minyanville.com/articles/print.php?a=42825 , FYI,David
Which Defense Companies Will Help the US Win the Cyber War?
By Justin Rohrlich  JUL 30, 2012 2:35 PM  What a 17-fold increase in cyber attacks against American infrastructure between 2009 and 2011 might mean for the defense industry.
MINYANVILLE ORIGINAL At last week's Aspen Security Forum, General Keith B. Alexander, head of the National Security Agency and the United States Cyber Command, spoke of a 17-fold increase in cyber attacks against American infrastructure between 2009 and 2011. (If you're not familiar with Cybercom, its mission statement, "9ec4c12949a4f31474f299058ce2b22a," is a 32-character MD5 “hash” or “message-digest” code which, when translated, means:
USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.
However, according to the New York Times, which is a media sponsor of the Aspen conference, Gen. Alexander is wholly underwhelmed by our current operational readiness for such endeavors:
General Alexander said that what concerned him about the increase in foreign cyberattacks on the United States was that a growing number were aimed at “critical infrastructure,” and that the United States remained unprepared to ward off a major attack. On a scale of 1 to 10, he said, American preparedness for a large-scale cyberattack is “around a 3.” He urged passage of legislation, which may come to a vote in the next week, that would give the government new powers to defend private computer networks in the United States. The legislation has prompted a struggle as American companies try to avoid costly regulation on their networks, and some civil liberties groups express concern about the effect on privacy.

It was only about a year ago, when, at the 2011 RSA Conference -- an annual expo hosted by RSA Security, a division of the EMC Corporation (EMC) -- Deputy Defense Secretary William Lynn III said the DoD now recognized cyberspace as “a new and official warfare domain,” joining the ranks of air, land, sea, and space.

Secretary Lynn maintained that, "The threat is moving up a ladder of escalation, from exploitation to disruption to destruction,” and is fully aware that “a couple dozen talented programmers wearing flip-flops and drinking Red Bull can do a lot of damage,” and that “we have to assume that if they have the means to strike, they will do so."
Still, some believe the concern, while real, is being ginned up to unrealistic threat levels by self-interested parties.

Susan P. Crawford, a former special assistant to President Obama for science, technology, and innovation policy, maintains that, "[a]s terrestrial wars wind down, military contractors are looking for new revenue streams."

In a recent editorial in Bloomberg View, Crawford wrote: "They have become cyberwar doomsayers, banging the drums of fear and claiming that cybersecurity must be our highest priority. They are also buying tools and code that our government can use to attack other countries online."

Professor Peter Sommer of the London School of Economics, a digital forensics expert, believes, "There's quite a lot in it," but that the threat is "also extensively hyped."

As he told the BBC last year:
In terms of the involvement of the big military companies, you have to realize that they are finding it extremely difficult to sell big, heavy equipment of the sort they are used to because the type of wars that we're involved in tend to be against insurgents.

And so they are desperately looking for new product areas -- and the obvious product area, they think, is cyber warfare -- I'm not so sure about that."

And Tom Mahnken, professor of strategy at the US Naval War College, expressed his doubts that cyber warfare is even much of a threat to developed nations at all. Writing in Foreign Policy, Mahnken warned against what he terms "cyber hysteria":
Although many view cyber weapons as tools of the weak, they are likely to be most effective when wielded by the strong. That is because cyber means cannot compensate for weakness in other instruments of power. In other words, if a cyber attack by a weaker power on a stronger one fails to achieve its aim, the attacker is likely to face retaliation. In such a situation, the stronger power will possess more, and more lethal, options to retaliate -- what is known in nuclear deterrence terminology as escalation dominance. A weak power might be able to cause a stronger power some annoyance through cyber attack, but in seeking to compel an adversary through cyberwar, it would run the very real risk of devastating escalation.

Whether or not cyber warfare will be the destructive force some fear, what is certain is that other countries are pursuing it with focus.
China
"Every military district of the Peoples' Liberation Army runs a competition every spring," says Alan Paller of the non-profit SANS (SysAdmin, Audit, Network, Security) Institute outside Washington, DC, "and they search for kids who might have gotten caught hacking… [We found one of the winners] hacking into the Pentagon. So they find them, they train them, and they get them into operation very, very fast."
North Korea

A 2004 study by Lieutenant Christopher Brown of the Naval Postgraduate School titled “Developing a Reliable methodology for Assessing the Computer Network Operations Threat of North Korea,” reads, in part:
The KCC (Korea Computer Center) was established in 1990 by Kim Il Sung to promote computerization in the DPRK. At its inception, the KCC employed approximately 800 employees whose average age was 26. Today Kim Jong Il’s son, Kim Jong Nam -- who also heads North Korea’s intelligence service, the State Security Agency (SSA) -- heads the KCC. He is also the chairman of North Korea’s Computer Committee. In May 2001, the South Korean newspaper the Chosun Ilbo reported that Kim Jong Nam had moved the SSA’s overseas intelligence gathering unit, which operates primarily by hacking and monitoring foreign communications, into the KCC building. In 2001, the South Korean media reported that the KCC was nothing less than the command center for Pyongyang’s cyber warfare industry, masquerading as an innocuous, computer geek-filled software research facility.

Russia

Just ask Estonian defense minister Jaak Aaviksoo, who, in 2007, saw a cyber attack, allegedly originating within the Kremlin, paralyze his country’s vital infrastructure.
"All major commercial banks, telcos, media outlets, and name servers -- the phone books of the Internet -- felt the impact, and this affected the majority of the Estonian population. This was the first time that a botnet threatened the national security of an entire nation,” he told a reporter.
While White House cybersecurity czar Howard Schmidt may believe that "Cyber war is a terrible metaphor,” whether or not that happens to be the case is germane to few people other than English professors and armchair linguists. McAfee (MFE) estimates that about 120 countries are using the Internet for state-sponsored information operations, primarily espionage.

So, who are the players hoping to help fight the cyber war, which, depending on who you believe, may or may not eventually happen?

While Boeing (BA) and Lockheed Martin (LMT) have been expanding their cyber warfare capabilities for some time, Boeing derives roughly half its revenue from the civilian aviation market, which provides a bit of a cushion if military spending drops -- a luxury Lockheed Martin, which relied on government contracts for 82% of its revenue in 2011, doesn't have.

Other names, like ManTech International Corporation (MANT), a provider of cyber security for military, intelligence, and law enforcement, based in Fairfax, Virginia, seem to view their glasses as both half-empty and half-full. From ManTech's's latest 10-K:
We expect growth in revenues in 2012 as a result of our recent acquisitions and recent and anticipated contract awards in the areas of C4ISR and cyber security. However we recognize that the government has expressed its intention to decrease its budgets related to professional and technical services contracts in the coming years. Additionally, US combat troops withdrew from Iraq at the end of 2011 and the United States Secretary of Defense has announced the planned withdrawal of US combat troops from Afghanistan in 2013.

The KEYW Holding Corporation (KEYW) of Hanover, Maryland, a cyber security firm which counts the NSA and the DoD among its many (and often classified) customers, reported 2011 revenues of $191 million as compared to $108 million in FY 2010, an increase of 77%. From KEYW's latest 10-Q, filed May 1:
Although our heritage is in the signals intelligence (SIGINT) domain, through a combination of organic growth and acquisitions, we have expanded our footprint within the intelligence agency market to become a true “multi-INT” company (signals intelligence, geospatial intelligence, etc.), and we currently have active contracts with 11 of the 16 intelligence agencies. We believe our innovative solutions, understanding of intelligence and national security missions, management’s long-standing and successful customer relationships and significant management and operational capabilities position us to continue our growth.

Other, similar names in the cyber warfare sector include CACI International (CACI), Kratos Defense and Security (KTOS), and SAIC Inc. (SAI).

For all the concern that shrinking budgets and decreasing military expenditures will have on defense contractors' bottom lines, there is one additional threat from an entity that could be more dangerous than North Korea, Russia, et al: hackers.

But instead of stealing information, the black hats may be chipping away at defense industry jobs one day soon.

Conference-hopping Gen. Alexander who warned of cyber attacks on Thursday in Aspen seemed to find just the right people to combat the threat the next day in Las Vegas.

"This is the world's best cyber security community," Gen. Alexander told the attendees of the Defcon hacker conference in Las Vegas last Friday. "In this room right here is the talent our nation needs to secure cyber space....That's the real reason why I came here. To solicit your support. You have the talent. You have the expertise."
No positions in stocks mentioned. The information on this website solely reflects the analysis of or opinion about the performance of securities and financial markets by the writers whose articles appear on the site. The views expressed by the writers are not necessarily the views of Minyanville Media, Inc. or members of its management. Nothing contained on the website is intended to constitute a recommendation or advice addressed to an individual investor or category of investors to purchase, sell or hold any security, or to take any action with respect to the prospective movement of the securities markets or to solicit the purchase or sale of any security. Any investment decisions must be made by the reader either individually or in consultation with his or her investment professional. Minyanville writers and staff may trade or hold positions in securities that are discussed in articles appearing on the website. Writers of articles are required to disclose whether they have a position in any stock or fund discussed in an article, but are not permitted to disclose the size or direction of the position. Nothing on this website is intended to solicit business of any kind for a writer's business or fund. Minyanville management and staff as well as contributing writers will not respond to emails or other communications requesting investment advice. 

Comentários

Postagens mais visitadas deste blog