<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-4250825996763291813</id><updated>2026-02-14T09:53:27.496+01:00</updated><category term="US"/><category term="Cyberterrorism"/><category term="Cyberwar"/><category term="Information Warfare"/><category term="DHS"/><category term="Information Sharing"/><category term="UK"/><category term="Process Control Systems"/><category term="Power Grid"/><category term="EU"/><category term="Energy"/><category term="Information Security"/><category term="European Commission"/><category term="EPCIP"/><category term="NERC"/><category term="Security Intelligence"/><category term="China"/><category term="SCADA"/><category term="CPNI"/><category term="CIIP"/><category term="Cybersecurity"/><category term="Data Breaches"/><category term="ENISA"/><category term="GMU"/><category term="IMPACT"/><category term="WARP"/><category term="CIP Report"/><category term="NATO"/><category term="SARMA"/><category term="Social Networks"/><category term="BERR"/><category term="CIWIN"/><category term="CSIS"/><category term="Collaboration"/><category term="DG JLS"/><category term="FIRST"/><category term="Home Office"/><category term="NIAC"/><category term="NIPP"/><category term="NL"/><category term="Open Source"/><category term="Russia"/><title type='text'>Critical Infrastructure Protection blog</title><subtitle type='html'>News, documents, papers, events and researches in Europe and US on Critica Infrastructure Protection (CIP) and Critical Nationanal Infrastructure (CNI) programs.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>164</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-8810955301351616195</id><published>2009-07-19T07:12:00.000+02:00</published><updated>2009-07-19T07:12:00.171+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="EU"/><category scheme="http://www.blogger.com/atom/ns#" term="US"/><title type='text'>Cybersecurity: Senate bill would make international cooperation a priority</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;US and EU are both going in the direction of International cooperation. On the 30th of March 2009, European Commission Directorate General Information Society and Media released a &lt;a href=&#39;http://ec.europa.eu/information_society/policy/nis/strategy/activities/ciip/index_en.htm&#39;&gt;communication &lt;/a&gt;on Critical Information Infrastructure Protection. Below you find an articole abou the new US legislation proposal, introduced on July 10. &lt;br/&gt;&lt;br/&gt;Apart from the declarations, we need to define the building blocks of international cooperation. In particular: &lt;br/&gt;a. Research funds that can be obtained by international consortia (all US and UE funds are closed only to US or EU members)&lt;br/&gt;b. Cooperation legislation framework: a new legislation framework should be defined in order to allow exchange of data (data sets for researchers), information sharing (threats, vulnerabilities, incidents) and information exchanges between operators and government agencies from the same sectors&lt;br/&gt;c. Establish clear point of contacts and responsibilities: who do you contact in US or EU in case of incidens/attacks&lt;br/&gt;d. Exercices and simulations&lt;br/&gt;&lt;br/&gt;(&lt;a href=&#39;http://fcw.com/Articles/2009/07/14/Web-Senate-bill-cybersecurity-international-cooperation.aspx&#39;&gt;FederalComputerWeek&lt;/a&gt;) A new Senate bill would encourage the secretary of state to work with other governments to further cooperation on cybersecurity and would require the secretary to submit a report to Congress about those efforts.   &lt;p&gt;&lt;a target=&#39;_blank&#39; href=&#39;http://thomas.loc.gov/cgi-bin/query/z?c111:S.1438:&#39;&gt;The legislation&lt;/a&gt;, introduced by Sen. Kirsten Gillibrand&lt;b&gt; (&lt;/b&gt;D-N&lt;b&gt;.&lt;/b&gt;Y&lt;b&gt;.)&lt;/b&gt; on July 10, states the secretary should work with other governments to: &lt;/p&gt;   &lt;ul type=&#39;disc&#39;&gt;&lt;li&gt;Develop cooperative activities.&lt;/li&gt;&lt;li&gt;Encourage international cooperation for improving cybersecurity.&lt;/li&gt;&lt;li&gt;Develop safeguards for privacy, freedom of speech and commercial transactions to be included in agreements or other cybersecurity activities. &lt;/li&gt;&lt;/ul&gt;   &lt;p&gt;The bill would require the secretary to submit a detailed report to congressional committees about actions taken to meet these goals in 270 days of the legislation’s enactment.&lt;/p&gt;   &lt;p&gt;“Relevant international cybersecurity agreements focus only on issues relating to cyber crime and common operating standards, and have not been signed by certain countries from which cyberattacks may be launched,” the bill states.&lt;/p&gt;   &lt;p&gt;The Obama administration’s &lt;a target=&#39;_blank&#39; href=&#39;http://www.whitehouse.gov/cyberreview/&#39;&gt;cyberspace policy review&lt;/a&gt;, released in May, also emphasized the need for international cooperation to secure cyberspace.&lt;/p&gt;   &lt;p&gt;&quot;International norms are critical to establishing a secure and thriving digital infrastructure,&quot; the policy review states. &quot;The United States needs to develop a strategy designed to shape the international environment and bring like-minded nations together on a host of issues, including acceptable norms regarding territorial jurisdiction, sovereign responsibility, and use of force.&quot;&lt;br/&gt;&lt;/p&gt;   &lt;p class=&#39;default&#39;&gt;The review recommended that the government develop positions for an international cybersecurity policy framework and strengthen its international partnerships related to cybersecurity. &lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/8810955301351616195/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/8810955301351616195' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/8810955301351616195'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/8810955301351616195'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/07/cybersecurity-senate-bill-would-make.html' title='Cybersecurity: Senate bill would make international cooperation a priority'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-3753330239934209593</id><published>2009-07-18T00:00:00.001+02:00</published><updated>2009-07-18T00:00:14.308+02:00</updated><title type='text'>Internet’s Anonymity Makes Cyberattack Hard to Trace</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;(&lt;a href=&#39;http://www.nytimes.com/2009/07/17/technology/17cyber.html?_r=2&#39;&gt;NYTimes&lt;/a&gt;) It is an axiom that “on the Internet nobody knows that you are a dog.” &lt;p&gt;By the same token, it is all but impossible to know whether you are from North Korea or &lt;a title=&#39;More news and information about South Korea.&#39; href=&#39;http://topics.nytimes.com/top/news/international/countriesandterritories/southkorea/index.html?inline=nyt-geo&#39;&gt;South Korea&lt;/a&gt;. &lt;/p&gt;&lt;p&gt;That puzzle is plaguing law enforcement investigators in several nations who are now hunting for the authors of a small but highly publicized Internet denial-of-service attack that briefly knocked offline the Web sites of some United States and South Korean government agencies and companies.&lt;/p&gt;&lt;p&gt;The attack, which began over the Fourth of July weekend and continued into the next week, led to South Korean accusations that the attack had been conducted by North Korean military or intelligence agents, possibly in retaliation for new &lt;a title=&#39;More articles about the United Nations.&#39; href=&#39;http://topics.nytimes.com/top/reference/timestopics/organizations/u/united_nations/index.html?inline=nyt-org&#39;&gt;United Nations&lt;/a&gt; sanctions. American officials quickly cautioned that despite sensational news media coverage, the attacks were no different from similar challenges government agencies face on a daily basis.&lt;/p&gt;&lt;p&gt;Cyberwarfare specialists cautioned this week that the Internet was effectively a “wilderness of mirrors,” and that attributing the source of cyberattacks and other kinds of exploitation is difficult at best and sometimes impossible. Despite the initial assertions and rumors that North Korea was behind the attacks and slight evidence that the programmer had some familiarity with South Korean software, the consensus of most computer security specialists is that the attackers could be located anywhere in the world.&lt;/p&gt;&lt;p&gt;“It would be incredibly difficult to prove that North Korea was involved in this,” said Amrit Williams, chief technology officer for Bigfix, a computer security management firm. “There are no geographic borders for the Internet. I can reach out and touch people everywhere.”&lt;/p&gt;&lt;p&gt;But researchers said that law enforcement investigators were likely to be aided in their pursuit by a second computer security truism — that the only ones who get caught are dumb, unsophisticated or both. &lt;/p&gt;&lt;p&gt;For starters, the attacking system, which cannibalized more than 50,000 computers and which is known as a botnet, was actually small, computer researchers said, compared with similar computer malware programs that are now routinely used by members of the computer underground.&lt;/p&gt;&lt;p&gt; Moreover, independent researchers, who have examined the programmer’s instructions used to lash together the tens of thousands of computers, said that it showed that the program, known as a D.D.O.S., or a distributed denial of service attack, revealed a high degree of amateurism.&lt;/p&gt;&lt;p&gt;That fact suggested that the authors, who hid themselves by masking their actions behind an international trail of Internet-connected computers, might have left telltale fingerprints that will ultimately be their undoing.&lt;/p&gt;&lt;p&gt;Last week, investigators quickly located computers that were involved with the control of the botnet in Britain and several other countries. However, the Internet service provider whose systems were implicated in the attack quickly issued a news release stating that the attack was actually coming from Miami. The company said that it was cooperating with the Serious Organized Crime Agency, a law enforcement agency that is part of the British government.&lt;/p&gt;&lt;p&gt; But independent investigators who have tracked the botnet cautioned against placing reliance on the locations for the command-and-control computers that have been publicly identified.&lt;/p&gt;&lt;p&gt;“We’re still looking for the initial infection vector,” said Jose Nazario, a network security researcher at Arbor Networks, a computer security provider for large network systems.&lt;/p&gt;&lt;p&gt;Several researchers recalled a similar incident in 2000, when a series of high-profile denial of service attacks were conducted against companies including &lt;a title=&#39;More information about Yahoo Inc&#39; href=&#39;http://topics.nytimes.com/top/news/business/companies/yahoo_inc/index.html?inline=nyt-org&#39;&gt;Yahoo!&lt;/a&gt;, &lt;a title=&#39;More information about Amazon.com Inc&#39; href=&#39;http://topics.nytimes.com/top/news/business/companies/amazon_inc/index.html?inline=nyt-org&#39;&gt;Amazon.com&lt;/a&gt;, Dell, ETrade, &lt;a title=&#39;More information about eBay Inc&#39; href=&#39;http://topics.nytimes.com/top/news/business/companies/ebay_inc/index.html?inline=nyt-org&#39;&gt;eBay&lt;/a&gt; and CNN. The culprit proved to be a 15-year-old Canadian high school student who was identified as a suspect only after publicly bragging about the attacks in an online forum.&lt;/p&gt;&lt;p&gt;Finding attackers who have no desire to reveal their locations — even amateurs — may be far more vexing.&lt;/p&gt;&lt;p&gt;“The truth is, we may never know the true origin of the attack unless the attacker made some colossal blunder,” said Joe Stewart, a director in the Counter Threat Unit at SecureWorks, a computer security consulting organization.&lt;/p&gt;&lt;p&gt;Some experts pointed to an entirely different origin for the attacks, or at least the attention paid to them. Cyberwarfare has become a hot topic in Washington this year, with the Obama administration undertaking a detailed review of the nation’s computer security preparedness.&lt;/p&gt;“There is a U.S. political debate going on right now with high stakes and big payoffs,” said Ronald J. Deibert, director of the Citizen Lab at the Munk Center for International Studies at the University of Toronto. “With the administration cyberreview there are many government agencies orbiting around the policy debate that have an interest in pointing to this incident as evidence with obvious implications.”&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/3753330239934209593/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/3753330239934209593' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/3753330239934209593'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/3753330239934209593'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/07/internets-anonymity-makes-cyberattack.html' title='Internet’s Anonymity Makes Cyberattack Hard to Trace'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-4395159857590469834</id><published>2009-07-16T14:10:00.001+02:00</published><updated>2009-07-16T14:10:19.053+02:00</updated><title type='text'>What CEOs Don&amp;#39;t Know About Cybersecurity</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;&lt;p&gt;(&lt;a href=&#39;http://www.forbes.com/2009/07/13/poneman-cybersecurity-breaches-technology-security-poneman.html&#39;&gt;Forbes&lt;/a&gt;) Being the chief executive has its privileges. And one of them may be a blissful ignorance of your company&#39;s data breach risks.&lt;/p&gt;&lt;p&gt;According to a study to be released Tuesday by the privacy-focused Ponemon Institute, companies&#39; chief executives tend to value cybersecurity just as--if not more--highly than their executive colleagues. But compared to lower-level execs, CEOs also tend to underestimate the frequency of cyberthreats their organization faces. &lt;/p&gt;&lt;p&gt;The survey, which was funded by cybersecurity firm Ounce Labs, asked 213 senior executives about their perceptions of data breach risks. Among those respondents, just 17% of CEOs said their company faced attempts by cybercriminals to steal data at least once every hour, compared with 33% of other executives. By contrast, nearly 50% of CEOs said their company experienced an attack &quot;rarely&quot;--less than once a week--while only 32% percent of other executives reported the same frequency of cyberthreats.&lt;/p&gt;&lt;p&gt;That disconnect, says Ponemon founder and lead researcher Larry Ponemon, isn&#39;t a matter of CEOs not valuing cybersecurity. On the contrary, about 77% of chief execs said that preventing cyber attacks and insider data theft was &quot;important or very important&quot; compared with just 51% of other respondents. &lt;/p&gt;&lt;p&gt;But Ponemon says that CEOs&#39; staffs may not tell them the full extent of a company&#39;s data risks. &quot;Even in the most transparent of companies, there&#39;s a bit of hesitance to give the CEO a report of vulnerabilities or even small breaches,&quot; says Ponemon. &quot;We don&#39;t know how much filtering of bad news happens that keeps CEOs from hearing some of the darker secrets.&quot;&lt;/p&gt;&lt;p&gt;There&#39;s plenty of evidence to support the views of the survey&#39;s more paranoid respondents. Cybersecurity firms, such as Finland&#39;s F-Secure, detect more than 20,000 new variations of malicious software churned out by hackers every day. In fact, the rate of publicly known data breaches has been steadily rising for years, with 646 breaches recorded in 2008, a 46% increase over 2007, according to the Identity Theft Resource Center.&lt;/p&gt;&lt;p&gt;In January, Princeton, N.J.-based payment processor Heartland Payment Systems revealed that it had been the victim of a cybercriminal operation that had gained access to as many as 100 million credit card numbers, potentially the largest data breach of all time.&lt;/p&gt;&lt;p&gt;Despite that sort of high-profile hack, the CEOs interviewed in Ponemon&#39;s survey seemed especially unconcerned about cybercrime as a source of data breaches. While 31% named stolen PCs or thumb drives as a source of data loss, only 3% cited malicious hackers as the top threat for their company&#39;s data security--about a fifth as many as the lower level employees who cited cybercriminals as the most important threat.&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/4395159857590469834/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/4395159857590469834' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/4395159857590469834'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/4395159857590469834'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/07/what-ceos-don-know-about-cybersecurity.html' title='What CEOs Don&amp;#39;t Know About Cybersecurity'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-499828296412411003</id><published>2009-07-16T13:55:00.001+02:00</published><updated>2009-07-16T13:55:30.759+02:00</updated><title type='text'>CIP standards may not be enough to secure electric grid</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;&lt;b&gt;(&lt;a href=&#39;http://gcn.com/articles/2009/07/13/update1-smart-grid-reliability-standards.aspx&#39;&gt;GNC.COM&lt;/a&gt;) Compliance audits that focus on reliability of electric system begin this month&lt;br/&gt;&lt;/b&gt;Industry regulators have begun compliance audits this month on mandatory reliability standards for the nation’s bulk electric power distribution system, a step toward implementing critical infrastructure protection standards for the U.S. power grid. &lt;br/&gt;&lt;p class=&#39;NoSpacing&#39;&gt;“It’s a big step,” said Joe McClelland, director of the Office of Electric Reliability at the Federal Energy Regulatory Commission. “It’s the first time they’ll have a critical infrastructure protection standard.”&lt;/p&gt;   &lt;p class=&#39;NoSpacing&#39;&gt;As the power grid becomes more automated and its control systems networked on a large scale, the system&#39;s cybersecurity is becoming a critical issue. The security standards for the system require that operators identify critical cyber assets that support reliable operation of the electric system, using a risk-based assessment. Violators can be fined as much as $1 million a day.&lt;/p&gt;   &lt;p class=&#39;NoSpacing&#39;&gt;But some security experts say the standards do not go far enough. The technology of the electric grid was designed with the expectation that it would be a private network rather than an interconnected IP-addressable system, and the security standards focus largely on reliability rather than network integrity.&lt;/p&gt;   &lt;p class=&#39;NoSpacing&#39;&gt;“I don’t think in today’s world that is even close to being adequate security,” said Jack Danahy, chief technology officer of Ounce Labs. “There has to be a more expansive understanding of what security means.”&lt;/p&gt;   &lt;p class=&#39;NoSpacing&#39;&gt;The cybersecurity of the power distribution system is taking on more urgency with development of a new interactive smart grid and recent reports that hackers have compromised the current grid.&lt;/p&gt;   &lt;p class=&#39;NoSpacing&#39;&gt;FERC is the government overseer of the U.S. power grid under the Energy Policy Act of 2005, but the audits are carried out by the North American Electric Reliability Corp., the industry’s designated international self-regulatory authority. Despite FERC’s authority, there is still a high degree of self-regulation in the power system. NERC developed the security standards, which FERC can approve or reject.&lt;/p&gt;   &lt;p class=&#39;NoSpacing&#39;&gt;FERC approved the current Critical Infrastructure Protection Standards this year. FERC will review the audit results and take part in a number of them. “Not every audit,” McClelland said. “Just to check to see how they are being conducted.”&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/499828296412411003/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/499828296412411003' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/499828296412411003'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/499828296412411003'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/07/cip-standards-may-not-be-enough-to.html' title='CIP standards may not be enough to secure electric grid'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-3003790888545309704</id><published>2009-07-16T13:52:00.000+02:00</published><updated>2009-07-16T13:55:49.003+02:00</updated><title type='text'>CIP standards may not be enough to secure electric grid</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;&lt;b&gt;(&lt;a href=&#39;http://gcn.com/articles/2009/07/13/update1-smart-grid-reliability-standards.aspx&#39;&gt;GNC.COM&lt;/a&gt;) Compliance audits that focus on reliability of electric system begin this month&lt;br/&gt;&lt;/b&gt;Industry regulators have begun compliance audits this month on mandatory reliability standards for the nation’s bulk electric power distribution system, a step toward implementing critical infrastructure protection standards for the U.S. power grid. &lt;br/&gt;&lt;p class=&#39;NoSpacing&#39;&gt;“It’s a big step,” said Joe McClelland, director of the Office of Electric Reliability at the Federal Energy Regulatory Commission. “It’s the first time they’ll have a critical infrastructure protection standard.”&lt;/p&gt;   &lt;p class=&#39;NoSpacing&#39;&gt;As the power grid becomes more automated and its control systems networked on a large scale, the system&#39;s cybersecurity is becoming a critical issue. The security standards for the system require that operators identify critical cyber assets that support reliable operation of the electric system, using a risk-based assessment. Violators can be fined as much as $1 million a day.&lt;/p&gt;   &lt;p class=&#39;NoSpacing&#39;&gt;But some security experts say the standards do not go far enough. The technology of the electric grid was designed with the expectation that it would be a private network rather than an interconnected IP-addressable system, and the security standards focus largely on reliability rather than network integrity.&lt;/p&gt;   &lt;p class=&#39;NoSpacing&#39;&gt;“I don’t think in today’s world that is even close to being adequate security,” said Jack Danahy, chief technology officer of Ounce Labs. “There has to be a more expansive understanding of what security means.”&lt;/p&gt;   &lt;p class=&#39;NoSpacing&#39;&gt;The cybersecurity of the power distribution system is taking on more urgency with development of a new interactive smart grid and recent reports that hackers have compromised the current grid.&lt;/p&gt;   &lt;p class=&#39;NoSpacing&#39;&gt;FERC is the government overseer of the U.S. power grid under the Energy Policy Act of 2005, but the audits are carried out by the North American Electric Reliability Corp., the industry’s designated international self-regulatory authority. Despite FERC’s authority, there is still a high degree of self-regulation in the power system. NERC developed the security standards, which FERC can approve or reject.&lt;/p&gt;   &lt;p class=&#39;NoSpacing&#39;&gt;FERC approved the current Critical Infrastructure Protection Standards this year. FERC will review the audit results and take part in a number of them. “Not every audit,” McClelland said. “Just to check to see how they are being conducted.”&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/3003790888545309704/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/3003790888545309704' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/3003790888545309704'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/3003790888545309704'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/07/cip-standards-may-not-be-enough-to_16.html' title='CIP standards may not be enough to secure electric grid'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-4156646305717307249</id><published>2009-07-16T01:06:00.001+02:00</published><updated>2009-07-16T01:06:25.712+02:00</updated><title type='text'>US and UK prepare fightback against eastern hackers</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;&lt;p&gt;&lt;b&gt;Hackers are being targeted for attack by US and UK security authorities eager to launch a cyber counteroffensive to kick them off the net&lt;/b&gt;&lt;/p&gt;&lt;p&gt;(&lt;a href=&#39;http://www.guardian.co.uk/technology/2009/jun/04/hacking-security-authorities&#39;&gt;Guardian&lt;/a&gt;) Hackers who attack defence or commercial computers in the US and UK in future may be in for a surprise: a counterattack, authorised and carried out by the police and defence agencies that aims to disrupt and even knock them off the net.&lt;/p&gt;&lt;p&gt;The secret plans, prompted by the explosion in the number of computer-crime incidents from east Asia targeting commercially or politically sensitive information, are known as &quot;strikeback&quot;, and are intended to target hackers&#39; computers and disrupt them, in some cases involving denial of service attacks.&lt;/p&gt;&lt;p&gt;According to well-placed sources, work on &quot;strikeback&quot; has already begun in the UK, with the Serious Organised Crime Agency (Soca) and the Metropolitan police&#39;s e-crime unit working to deploy teams. The measures are being adopted because of the unprecedented level of attacks being suffered from &lt;a href=&#39;http://www.guardian.co.uk/technology/hacking&#39;&gt;hacking&lt;/a&gt; groups in China, Russia and North Korea, which are suspected of being state sponsored. Among intelligence circles in Washington, DC, the idea of hitting back at foreign hacking groups is being described as the hottest topic in cyberspace.&lt;/p&gt;&lt;p&gt;&quot;This is considered to be a key activity,&quot; said a former CIA officer actively involved in the debate. &quot;We are being penetrated and it is not in our tradition to sit back and do nothing. (&lt;a href=&#39;http://www.guardian.co.uk/technology/2009/jun/04/hacking-security-authorities&#39;&gt;continue...&lt;/a&gt;)&lt;br/&gt;&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/4156646305717307249/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/4156646305717307249' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/4156646305717307249'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/4156646305717307249'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/07/us-and-uk-prepare-fightback-against.html' title='US and UK prepare fightback against eastern hackers'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-1451232566532793096</id><published>2009-07-16T00:54:00.001+02:00</published><updated>2009-07-16T00:54:14.226+02:00</updated><title type='text'>Cyber attacks on South Korea and U.S. &amp;#39;could have originated in Britain&amp;#39;</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;(&lt;a href=&#39;http://www.dailymail.co.uk/news/worldnews/article-1199905/Cyber-attacks-South-Korea-U-S-originated-Britain.html&#39;&gt;Mail Online&lt;/a&gt;) Britain was the likeliest origin of last weeks crippling cyber attacks on the US and South Korea, a Vietnamese security firm has claimed.  The Korea Communications Commission said the information had come from Vietnamese firm Bach Khoa Internetwork Security. &lt;br/&gt;&lt;p&gt;&#39;The (British) server appears to have controlled compromised handler servers which spread viruses,&#39; said Park Cheol-Soon, a network protection team leader of the government-run communications commission. &lt;img src=&#39;http://i.dailymail.co.uk/i/pix/2009/07/15/article-0-05A9E6A3000005DC-984_468x330.jpg&#39; style=&#39;max-width: 800px;&#39;/&gt;&lt;/p&gt;&lt;p&gt;&#39;However, it needs more investigation to confirm whether this server was the final attacker server or not.&#39;&lt;/p&gt;&lt;p&gt;Seoul had previously laid the blame for the attacks - which briefly crippled major government and commercial websites - on its Communist neighbour.&lt;br/&gt;&lt;/p&gt;&lt;p&gt;But according to Park Cheol-Soon, the apparent discovery of a master server in Britain neither exonerated nor implicated North Korea. &lt;br/&gt;&lt;/p&gt; &lt;p&gt;&#39;It does not either bolster or undermine claims that someone has done the attacks,&#39; he said.  The attacks, which involved sending multiple requests for website access from 166,000 &#39;zombie&#39; computers  in 74 countries, crippled 14 major U.S. sites. These included the State Department, the Homeland Security Department, the Federal Aviation Administration and the Federal Trade Commission. In addition to government sites, the New York Stock Exchange, the Nasdaq electronic exchange and the Washington Post newspaper were also hit. The Korea Communications Commission  downgraded its alert against the cyber attacks on Monday, saying they were &#39;fizzling out&#39;, and most targeted sites had normal traffic restored. &lt;br/&gt;&lt;/p&gt;&lt;p&gt;&lt;img src=&#39;http://i.dailymail.co.uk/i/pix/2009/07/15/article-0-05B3E764000005DC-85_468x286.jpg&#39; style=&#39;max-width: 800px;&#39;/&gt;&lt;br/&gt;&lt;/p&gt;&lt;p/&gt;&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/1451232566532793096/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/1451232566532793096' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/1451232566532793096'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/1451232566532793096'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/07/cyber-attacks-on-south-korea-and-us.html' title='Cyber attacks on South Korea and U.S. &amp;#39;could have originated in Britain&amp;#39;'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-8749465416781245097</id><published>2009-07-15T22:13:00.000+02:00</published><updated>2009-07-15T22:13:00.613+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cybersecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyberwar"/><category scheme="http://www.blogger.com/atom/ns#" term="EU"/><title type='text'>UK Cyber-security strategy launched</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;(&lt;a href=&#39;http://news.bbc.co.uk/2/hi/uk_news/politics/8118348.stm&#39;&gt;BBC&lt;/a&gt;) &lt;p class=&#39;first&#39;&gt;&lt;b&gt;Britons face a growing online threat from criminals, terrorists and hostile states, according to the UK&#39;s first cyber security strategy.&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Businesses, government and ordinary people are all at risk, it says. &lt;/p&gt;&lt;p&gt;The strategy has been published alongside an updated, wider National Security Strategy. &lt;/p&gt;&lt;p&gt;Its publication is a sign of the growing recognition within government of the need to bolster defences against a growing threat. &lt;/p&gt;&lt;p&gt;In line with a wider focus within the National Security Strategy on not just protecting the state but also citizens, the cyber-strategy encompasses protecting individuals from forms of fraud, identity theft and e-crime committed using technology as well as defending government secrets and businesses. &lt;/p&gt;&lt;p&gt;&lt;b&gt;&#39;Attack capability&#39;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Launching the strategy, cyber security minister Lord West said: &quot;We know that various state actors are very interested in cyber warfare. The terrorist aspect of this is the least (concern), but it is developing.&quot; &lt;/p&gt;&lt;p&gt;He warned that future targets could include key businesses, the national power grid, financial markets and Whitehall departments. &lt;br/&gt;&lt;/p&gt;&lt;p&gt;He said: &quot;We know terrorists use the internet for radicalisation and things like that at the moment, but there is a fear they will move down that path (of cyber attacks). &lt;/p&gt;&lt;p&gt;&quot;As their ability to use the web and the net grows, there will be more opportunity for these attacks.&quot; &lt;/p&gt;&lt;p&gt;He confirmed that the UK government has already faced cyber attacks from foreign states such as Russia and China. &lt;/p&gt;&lt;p&gt;But he denied that hackers had successfully broken into government systems and stolen secret information. &lt;/p&gt;&lt;p&gt;He also said he could not deny that the government had its own online attack capability, but he refused to say whether it had ever been used. &lt;/p&gt;&lt;p&gt;&quot;It would be silly to say that we don&#39;t have any capability to do offensive work from Cheltenham, and I don&#39;t think I should say any more than that.&quot; &lt;/p&gt;&lt;p&gt;&lt;b&gt;&#39;Missed opportunity&#39;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Among those the government has turned to for help on cyber crime are former illegal hackers, Lord West added. &lt;/p&gt;&lt;p&gt;He said the government listening post GCHQ at Cheltenham had not employed any &quot;ultra, ultra criminals&quot; but needed the expertise of former &quot;naughty boys&quot; he said. &lt;/p&gt;&lt;p&gt;&quot;You need youngsters who are deep into this stuff... If they have been slightly naughty boys, very often they really enjoy stopping other naughty boys,&quot; he said. &lt;/p&gt;&lt;p&gt;Dame Pauline Neville-Jones, for the Conservatives, called the strategy was a &quot;missed opportunity&quot;. &lt;/p&gt;&lt;p&gt;&quot;It is impossible to know how significant these announcements are because we do not know what funding will be made available to enhance our ability to tackle cyber threats. It is also not clear how these new cyber security structures fit into the existing national security machinery.&quot; &lt;/p&gt;&lt;p&gt;Her colleague in the Commons, Crispin Blunt, called it a &quot;pale imitation&quot; of an initiative launched by US President Barack Obama. &lt;/p&gt;&lt;p&gt;Lib Dem home affairs spokesman Tom Brake said: &quot;This new cyber security strategy could lead to an extension of the Government&#39;s invasive counter-terrorism powers which already pose significant threats to our civil liberties. &lt;/p&gt;&lt;p&gt;&quot;The cyber security strategy uses broad, undefined terms that risk creating panic among the public and a demand for further government powers. We must not retreat into a Cold War mentality.&quot; &lt;/p&gt;&lt;p&gt;&lt;b&gt;&#39;Forensics&#39;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Officials said e-crime crime is estimated to costs the UK several billion pounds a year. &lt;/p&gt;&lt;p&gt;Two new bodies will be established in the coming months as part of the strategy. &lt;/p&gt;&lt;p&gt;A dedicated &lt;b&gt;Office of Cyber Security &lt;/b&gt;in the Cabinet Office will co-ordinate policy across government and look at legal and ethical issues as well as relations with other countries. &lt;br/&gt;&lt;/p&gt;&lt;p&gt;The second body will be a new Cyber Security Operations Centre (CSOC) based at GCHQ. &lt;/p&gt;&lt;p&gt;This will bring people together from across government and from outside to get a better handle on cyber security issues and work out how to better protect the country, providing advice and information about the risks. &lt;/p&gt;&lt;p&gt;&quot;CSOC&#39;s aim will be to identify in real time what type of cyber attacks are taking place, where they come from and what can be done to stop them&quot;, according to a Whitehall security official. &lt;/p&gt;&lt;p&gt;Experts say the &quot;forensics&quot; of detecting who is behind a cyber attack and attributing responsibility remains extremely difficult. &lt;/p&gt;&lt;p&gt;Officials said it would require input from those who had their own expertise in hackers. &quot;We need youngsters,&quot; an official said. &lt;/p&gt;&lt;p&gt;The range of potentially hostile cyber activity - from other states seeking to carry out espionage through criminal gangs to terrorists - is daunting. &lt;/p&gt;&lt;p&gt;&lt;b&gt;Critical information&lt;/b&gt;&lt;/p&gt;&lt;p&gt;At one end of the spectrum, military operations - such as Russia&#39;s conflict with Georgia last year - are now accompanied by attacks on computer systems. &lt;/p&gt;&lt;p&gt;The UK&#39;s critical national infrastructure is also more reliant on technology than it was even five years ago and terrorists who have used the internet for fundraising and propaganda are also believed to have the intent - if not yet the capability- to carry out their own cyber-attacks. &lt;/p&gt;&lt;p&gt;Officials declined to give a figure of how many attacks on government computer networks take place each day. &lt;/p&gt;&lt;p&gt;In a speech in 2007, the head of MI5, Jonathan Evans, explicitly mentioned Russia and China in the context of a warning that that &quot;a number of countries continue to devote considerable time and energy trying to steal our sensitive technology on civilian and military projects, and trying to obtain political and economic intelligence at our expense. They do not only use traditional methods to collect intelligence but increasingly deploy sophisticated technical attacks, using the internet to penetrate computer networks.&quot; &lt;/p&gt;&lt;p&gt;Officials said they were not aware of any &quot;key pieces of information&quot; that had gone missing yet but said that British companies had lost critical information. &lt;/p&gt;&lt;p&gt;The new Cyber Security Operations Centre will work closely with the designated parts of the critical national infrastructure and wider industry and officials say that business are keen for the government to take a lead but also share as much information as possible. &lt;/p&gt;&lt;p&gt;US President Barack Obama has been carrying out a similar re-organisation for defending US computer networks and British officials said the two countries were co-ordinating closely not least because of the intimate relationship between GCHQ and its US equivalent. &lt;/p&gt;&lt;p&gt;British officials believe that their government systems may also have fewer vulnerabilities than their US counterparts partly because they moved online later and have fewer connections between the internal government system and the rest of cyberspace to monitor. &lt;/p&gt;&lt;p&gt;Officials in the US and UK are also thought to be working on forms of offensive cyber-warfare capability but officials are unwilling to go into any details of what this might involve. &lt;/p&gt; &lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/8749465416781245097/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/8749465416781245097' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/8749465416781245097'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/8749465416781245097'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/07/uk-cyber-security-strategy-launched_15.html' title='UK Cyber-security strategy launched'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-4551340282522024077</id><published>2009-07-15T01:19:00.001+02:00</published><updated>2009-07-15T01:19:28.191+02:00</updated><title type='text'>UK Cyber-security strategy launched</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;(&lt;a href=&#39;http://news.bbc.co.uk/2/hi/uk_news/politics/8118348.stm&#39;&gt;BBC&lt;/a&gt;) &lt;p class=&#39;first&#39;&gt;&lt;b&gt;Britons face a growing online threat from criminals, terrorists and hostile states, according to the UK&#39;s first cyber security strategy.&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Businesses, government and ordinary people are all at risk, it says. &lt;/p&gt;&lt;p&gt;The strategy has been published alongside an updated, wider National Security Strategy. &lt;/p&gt;&lt;p&gt;Its publication is a sign of the growing recognition within government of the need to bolster defences against a growing threat. &lt;/p&gt;&lt;p&gt;In line with a wider focus within the National Security Strategy on not just protecting the state but also citizens, the cyber-strategy encompasses protecting individuals from forms of fraud, identity theft and e-crime committed using technology as well as defending government secrets and businesses. &lt;/p&gt;&lt;p&gt;&lt;b&gt;&#39;Attack capability&#39;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Launching the strategy, cyber security minister Lord West said: &quot;We know that various state actors are very interested in cyber warfare. The terrorist aspect of this is the least (concern), but it is developing.&quot; &lt;/p&gt;&lt;p&gt;He warned that future targets could include key businesses, the national power grid, financial markets and Whitehall departments. &lt;br/&gt;&lt;/p&gt;&lt;p&gt;He said: &quot;We know terrorists use the internet for radicalisation and things like that at the moment, but there is a fear they will move down that path (of cyber attacks). &lt;/p&gt;&lt;p&gt;&quot;As their ability to use the web and the net grows, there will be more opportunity for these attacks.&quot; &lt;/p&gt;&lt;p&gt;He confirmed that the UK government has already faced cyber attacks from foreign states such as Russia and China. &lt;/p&gt;&lt;p&gt;But he denied that hackers had successfully broken into government systems and stolen secret information. &lt;/p&gt;&lt;p&gt;He also said he could not deny that the government had its own online attack capability, but he refused to say whether it had ever been used. &lt;/p&gt;&lt;p&gt;&quot;It would be silly to say that we don&#39;t have any capability to do offensive work from Cheltenham, and I don&#39;t think I should say any more than that.&quot; &lt;/p&gt;&lt;p&gt;&lt;b&gt;&#39;Missed opportunity&#39;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Among those the government has turned to for help on cyber crime are former illegal hackers, Lord West added. &lt;/p&gt;&lt;p&gt;He said the government listening post GCHQ at Cheltenham had not employed any &quot;ultra, ultra criminals&quot; but needed the expertise of former &quot;naughty boys&quot; he said. &lt;/p&gt;&lt;p&gt;&quot;You need youngsters who are deep into this stuff... If they have been slightly naughty boys, very often they really enjoy stopping other naughty boys,&quot; he said. &lt;/p&gt;&lt;p&gt;Dame Pauline Neville-Jones, for the Conservatives, called the strategy was a &quot;missed opportunity&quot;. &lt;/p&gt;&lt;p&gt;&quot;It is impossible to know how significant these announcements are because we do not know what funding will be made available to enhance our ability to tackle cyber threats. It is also not clear how these new cyber security structures fit into the existing national security machinery.&quot; &lt;/p&gt;&lt;p&gt;Her colleague in the Commons, Crispin Blunt, called it a &quot;pale imitation&quot; of an initiative launched by US President Barack Obama. &lt;/p&gt;&lt;p&gt;Lib Dem home affairs spokesman Tom Brake said: &quot;This new cyber security strategy could lead to an extension of the Government&#39;s invasive counter-terrorism powers which already pose significant threats to our civil liberties. &lt;/p&gt;&lt;p&gt;&quot;The cyber security strategy uses broad, undefined terms that risk creating panic among the public and a demand for further government powers. We must not retreat into a Cold War mentality.&quot; &lt;/p&gt;&lt;p&gt;&lt;b&gt;&#39;Forensics&#39;&lt;/b&gt;&lt;/p&gt;&lt;p&gt;Officials said e-crime crime is estimated to costs the UK several billion pounds a year. &lt;/p&gt;&lt;p&gt;Two new bodies will be established in the coming months as part of the strategy. &lt;/p&gt;&lt;p&gt;A dedicated &lt;b&gt;Office of Cyber Security &lt;/b&gt;in the Cabinet Office will co-ordinate policy across government and look at legal and ethical issues as well as relations with other countries. &lt;br/&gt;&lt;/p&gt;&lt;p&gt;The second body will be a new Cyber Security Operations Centre (CSOC) based at GCHQ. &lt;/p&gt;&lt;p&gt;This will bring people together from across government and from outside to get a better handle on cyber security issues and work out how to better protect the country, providing advice and information about the risks. &lt;/p&gt;&lt;p&gt;&quot;CSOC&#39;s aim will be to identify in real time what type of cyber attacks are taking place, where they come from and what can be done to stop them&quot;, according to a Whitehall security official. &lt;/p&gt;&lt;p&gt;Experts say the &quot;forensics&quot; of detecting who is behind a cyber attack and attributing responsibility remains extremely difficult. &lt;/p&gt;&lt;p&gt;Officials said it would require input from those who had their own expertise in hackers. &quot;We need youngsters,&quot; an official said. &lt;/p&gt;&lt;p&gt;The range of potentially hostile cyber activity - from other states seeking to carry out espionage through criminal gangs to terrorists - is daunting. &lt;/p&gt;&lt;p&gt;&lt;b&gt;Critical information&lt;/b&gt;&lt;/p&gt;&lt;p&gt;At one end of the spectrum, military operations - such as Russia&#39;s conflict with Georgia last year - are now accompanied by attacks on computer systems. &lt;/p&gt;&lt;p&gt;The UK&#39;s critical national infrastructure is also more reliant on technology than it was even five years ago and terrorists who have used the internet for fundraising and propaganda are also believed to have the intent - if not yet the capability- to carry out their own cyber-attacks. &lt;/p&gt;&lt;p&gt;Officials declined to give a figure of how many attacks on government computer networks take place each day. &lt;/p&gt;&lt;p&gt;In a speech in 2007, the head of MI5, Jonathan Evans, explicitly mentioned Russia and China in the context of a warning that that &quot;a number of countries continue to devote considerable time and energy trying to steal our sensitive technology on civilian and military projects, and trying to obtain political and economic intelligence at our expense. They do not only use traditional methods to collect intelligence but increasingly deploy sophisticated technical attacks, using the internet to penetrate computer networks.&quot; &lt;/p&gt;&lt;p&gt;Officials said they were not aware of any &quot;key pieces of information&quot; that had gone missing yet but said that British companies had lost critical information. &lt;/p&gt;&lt;p&gt;The new Cyber Security Operations Centre will work closely with the designated parts of the critical national infrastructure and wider industry and officials say that business are keen for the government to take a lead but also share as much information as possible. &lt;/p&gt;&lt;p&gt;US President Barack Obama has been carrying out a similar re-organisation for defending US computer networks and British officials said the two countries were co-ordinating closely not least because of the intimate relationship between GCHQ and its US equivalent. &lt;/p&gt;&lt;p&gt;British officials believe that their government systems may also have fewer vulnerabilities than their US counterparts partly because they moved online later and have fewer connections between the internal government system and the rest of cyberspace to monitor. &lt;/p&gt;&lt;p&gt;Officials in the US and UK are also thought to be working on forms of offensive cyber-warfare capability but officials are unwilling to go into any details of what this might involve. &lt;/p&gt; &lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/4551340282522024077/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/4551340282522024077' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/4551340282522024077'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/4551340282522024077'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/07/uk-cyber-security-strategy-launched.html' title='UK Cyber-security strategy launched'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-5986119356233800638</id><published>2009-07-14T14:05:00.001+02:00</published><updated>2009-07-14T14:05:15.434+02:00</updated><title type='text'>What CEOs Don’t Know About Cybersecurity</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;(Forbes) http://www.forbes.com/2009/07/13/poneman-cybersecurity-breaches-technology-security-poneman.html &lt;p&gt;Being the chief executive has its privileges. And one of them may be a blissful ignorance of your company’s data breach risks.&lt;/p&gt; &lt;p&gt;According to a study to be released Tuesday by the privacy-focused Ponemon Institute, companies’ chief executives tend to value cybersecurity just as–if not more–highly than their executive colleagues. But compared to lower-level execs, CEOs also tend to underestimate the frequency of cyberthreats their organization faces.&lt;br/&gt;The survey, which was funded by cybersecurity firm Ounce Labs, asked 213 senior executives about their perceptions of data breach risks. Among those respondents, just 17% of CEOs said their company faced attempts by cybercriminals to steal data at least once every hour, compared with 33% of other executives. By contrast, nearly 50% of CEOs said their company experienced an attack “rarely”–less than once a week–while only 32% percent of other executives reported the same frequency of cyberthreats.&lt;/p&gt; &lt;p&gt;That disconnect, says Ponemon founder and lead researcher Larry Ponemon, isn’t a matter of CEOs not valuing cybersecurity. On the contrary, about 77% of chief execs said that preventing cyber attacks and insider data theft was “important or very important” compared with just 51% of other respondents.&lt;/p&gt; &lt;p&gt;But Ponemon says that CEOs’ staffs may not tell them the full extent of a company’s data risks. “Even in the most transparent of companies, there’s a bit of hesitance to give the CEO a report of vulnerabilities or even small breaches,” says Ponemon. “We don’t know how much filtering of bad news happens that keeps CEOs from hearing some of the darker secrets.”&lt;/p&gt; &lt;p&gt;There’s plenty of evidence to support the views of the survey’s more paranoid respondents. Cybersecurity firms, such as Finland’s F-Secure, detect more than 20,000 new variations of malicious software churned out by hackers every day. In fact, the rate of publicly known data breaches has been steadily rising for years, with 646 breaches recorded in 2008, a 46% increase over 2007, according to the Identity Theft Resource Center.&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/5986119356233800638/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/5986119356233800638' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/5986119356233800638'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/5986119356233800638'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/07/what-ceos-dont-know-about-cybersecurity.html' title='What CEOs Don’t Know About Cybersecurity'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-223829101400925468</id><published>2009-04-23T13:32:00.001+02:00</published><updated>2009-04-23T13:32:54.346+02:00</updated><title type='text'>RSA 2009: Why the Top U.S. Cyber Official is Losing Sleep</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;&lt;a target=&#39;_blank&#39; href=&#39;http://ad.uk.doubleclick.net/click%3Bh=v8/3806/3/0/%2a/j%3B212839118%3B0-0%3B13%3B14150425%3B4252-336/280%3B30093744/30111621/1%3B%3B%7Esscs%3D%3fhttp://managingrisk.computing.co.uk/&#39;&gt; &lt;/a&gt;&lt;div id=&#39;post&#39;&gt; 						 						&lt;div class=&#39;content&#39;&gt;(&lt;a href=&#39;http://www.csoonline.com/article/490356/RSA_Why_the_Top_U.S._Cyber_Official_is_Losing_Sleep&#39;&gt;CSO&lt;/a&gt;) &lt;br/&gt;&lt;h2&gt;Melissa Hathaway has led an extensive review of the nation&#39;s cybersecurity. Her dreams are haunted by what she has discovered&lt;/h2&gt; 						 						 												&lt;div id=&#39;comment_links&#39;&gt;» &lt;a class=&#39;commentsLink&#39; href=&#39;http://comments.csoonline.com/?q=node/490356&#39;&gt;Comments &lt;/a&gt;&lt;/div&gt; 												 												&lt;h2 id=&#39;byline&#39;&gt; 					        					          By &lt;a class=&#39;author&#39; href=&#39;http://www.csoonline.com/author/380013/Bill+Brenner&#39;&gt;Bill Brenner&lt;/a&gt;, Senior Editor 					        						&lt;/h2&gt; 											 					 					 					&lt;div id=&#39;article_body&#39;&gt; 					&lt;p&gt; 																		&lt;span class=&#39;date&#39;&gt;April 22, 2009&lt;/span&gt; 							— 																											&lt;a href=&#39;http://www.csoonline.com/article/490356/www.csoonline.com&#39;&gt;CSO&lt;/a&gt; 								— 																							 					&lt;/p&gt;&lt;p&gt;SAN FRANCISCO -- The United States&#39; top cybersecurity official already knew the world&#39;s digital infrastructure needed help before she took on a 60-day cyberspace policy review. With the review now complete, she admits the gravity of the situation seeps into her dreams and disturbs her sleep.&lt;/p&gt; &lt;p&gt;&quot;I worry about [questions surrounding cyber security] every night; they infiltrate my dreams,&quot; Melissa Hathaway, acting senior director for cyberspace for the National Security and Homeland Security Councils, said in a keynote speech at the RSA Conference Wednesday. &quot;I often wake up at 2:30 or 4:30 in the morning having worked the problem in my sleep, and sometimes even develop a good idea.&quot;&lt;/p&gt; &lt;p&gt;President Obama tapped Hathaway, a Bush administration official who helped develop a multi-billion-dollar classified initiative to better secure federal systems and critical-infrastructure networks against online threats, to lead a 60-day review of the government&#39;s cybersecurity efforts in February. [See &lt;a href=&#39;http://www.csoonline.com/article/480180&#39;&gt;Obama Taps Bush Aide to Review Federal Cybersecurity Efforts&lt;/a&gt;]&lt;/p&gt; &lt;p&gt;She acknowledged what everyone attending RSA already knew: The nation&#39;s digital infrastructure -- the world&#39;s, for that matter -- is full of security holes that leave us vulnerable to those who would steal personal data for financial gain or to compromise national security. [See &lt;a href=&#39;http://www.csoonline.com/article/489402&#39;&gt;Botnets: 4 Reasons It&#39;s Getting Harder to Find and Fight Them&lt;/a&gt;]&lt;/p&gt; &lt;p&gt;&quot;Despite all of our efforts, our global digital infrastructure, based largely upon the Internet, is neither secure enough nor resilient enough for what we use it for today and will need in to the future,&quot; she said. &quot;This poses one of the most serious economic and national security challenges of the 21st century.&quot;&lt;/p&gt; &lt;p&gt;She offered several examples: The design of today&#39;s digital infrastructure was driven more by considerations of interoperability and efficiency than of security, she said. As a result, a growing array of state and non-state actors can compromise, steal, change, or destroy information. She cited &quot;countless intrusions that have allowed criminals to steal hundreds of millions of dollars and allowed nation states and others to steal intellectual property and sensitive military information.&quot; Digital miscreants even have the ability to threaten or damage portions of the nation&#39;s critical infrastructure, she said, a recent example being a November 2008 incident where 130 automated teller machines in 49 cities around the world were illicitly emptied in the space of a half hour. These and other risks have the potential to undermine consumer confidence in the information systems that underlie our economic and national security interests, she said.&lt;/p&gt;  					 					 										 					&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=3428d94d-9dab-813f-862c-1e664030b693&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/223829101400925468/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/223829101400925468' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/223829101400925468'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/223829101400925468'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/04/rsa-2009-why-top-us-cyber-official-is.html' title='RSA 2009: Why the Top U.S. Cyber Official is Losing Sleep'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-6154232905556981839</id><published>2009-04-20T07:14:00.001+02:00</published><updated>2009-04-20T07:14:47.327+02:00</updated><title type='text'>White House cyber security review goes to Obama</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;&lt;a target=&#39;_blank&#39; href=&#39;http://ad.uk.doubleclick.net/click%3Bh=v8/3806/3/0/%2a/j%3B212839118%3B0-0%3B13%3B14150425%3B4252-336/280%3B30093744/30111621/1%3B%3B%7Esscs%3D%3fhttp://managingrisk.computing.co.uk/&#39;&gt; &lt;/a&gt;&lt;div id=&#39;post&#39;&gt; 						 						&lt;div class=&#39;content&#39;&gt;(&lt;a href=&#39;http://www.google.com/hostednews/ap/article/ALeqM5gEjd5sfWB4ELyH5byMWE77yQ40_AD97KJ5I80&#39;&gt;AP&lt;/a&gt;) The White House says a 60-day review of the nation&#39;s cyber security is finished and a report has been submitted to the president.&lt;p&gt;The report comes amid dire warnings that the U.S. is ill-prepared for a cyber attack. The study looked at how the government can better manage and use technology to protect everything from the nation&#39;s electrical grid and stock markets to tax data, airline flight systems and nuclear launch codes.&lt;/p&gt;&lt;p&gt;Officials have acknowledged that government computer networks are constantly assailed by attacks and scans, ranging from nuisance hacking to more nefarious assaults, possibly from other nations, such as China.&lt;/p&gt;&lt;p&gt;President Barack Obama last month ordered the review and put former Bush administration aide Melissa Hathaway in charge of the effort. Hathaway met with industry leaders, Capitol Hill staff and other experts, seeking guidance on what the federal government&#39;s role should be in protecting information networks against an attack.&lt;/p&gt;&lt;p&gt;Her report is expected to recommend how the government should be organized and who should control cyber issues. Members of Congress have said they believe it will say cyber matters should be coordinated through the White House.&lt;/p&gt;&lt;p&gt;Officials have acknowledged that government computer networks are constantly assailed by attacks and scans, ranging from nuisance hacking to more nefarious assaults, possibly from other nations, such as China.&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=c66a6932-ffc6-820d-bd4a-78186392535d&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/6154232905556981839/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/6154232905556981839' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/6154232905556981839'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/6154232905556981839'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/04/white-house-cyber-security-review-goes.html' title='White House cyber security review goes to Obama'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-6588208808226028717</id><published>2009-04-05T21:36:00.001+02:00</published><updated>2009-04-05T21:36:03.379+02:00</updated><title type='text'>EU pledges to protect cyber infrastructure</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;&lt;a target=&#39;_blank&#39; href=&#39;http://ad.uk.doubleclick.net/click%3Bh=v8/3806/3/0/%2a/j%3B212839118%3B0-0%3B13%3B14150425%3B4252-336/280%3B30093744/30111621/1%3B%3B%7Esscs%3D%3fhttp://managingrisk.computing.co.uk/&#39;&gt; &lt;/a&gt;&lt;div id=&#39;post&#39;&gt; 						 						&lt;div class=&#39;content&#39;&gt;&lt;p&gt;(&lt;a href=&#39;http://www.vnunet.com/vnunet/news/2239455/eu-pledges-protect-cyber&#39;&gt;VNUNET&lt;/a&gt;) The &lt;a title=&#39;European Commission&#39; target=&#39;_blank&#39; href=&#39;http://ec.europa.eu/information_society/policy/nis/strategy/activities/ciip/index_en.htm&#39;&gt;European Commission&lt;/a&gt; (EC) has unveiled a new strategy to prepare the region to act in case of major disruptions or attacks against critical information infrastructure.&lt;/p&gt;&lt;p&gt;Purchases and sales over electronic networks in Europe amounted to 11 per cent of the total turnover of European Union companies in 2007, while over three quarters of businesses accessed banking services via the internet and two thirds used online public services.&lt;/p&gt;&lt;/div&gt; 						 						 	 	 		 		 		 	  						 						&lt;div class=&#39;content&#39;&gt;&lt;p&gt;Electronic communication services and networks provide the backbone of the European economy, according to the EC, and the risks posed by natural disasters, terrorist attacks, malicious human action and hardware failure could have a devastating impact if they are not dealt with quickly.&lt;/p&gt;&lt;p&gt;&quot;The information society brings us countless new opportunities, and it is our duty to ensure that it develops on a solid and sustainable base,&quot; said Viviane Reding, commissioner for Information Society and Media.&lt;/p&gt;&lt;p&gt;&quot;Europe must be at the forefront in engaging citizens, businesses and public administrations to tackle the challenges of improving the security and resilience of Europe&#39;s critical information infrastructures. There must be no weak links in Europe&#39;s cyber security.&quot;&lt;/p&gt;&lt;p&gt;The strategy follows high-profile cyber attacks against Estonia, Lithuania and Georgia last year, and predictions that there is a 10 to 20 per cent chance that telecoms networks will be hit by a major breakdown in the next decade.&lt;/p&gt;&lt;/div&gt; 						 						  						&lt;div class=&#39;content&#39;&gt;&lt;p&gt;Reding warned that, even putting aside the threat of cyber terrorism, damage to submarine data cables could easily be a potential source of disruption, as could other hardware failures or natural disasters.&lt;/p&gt;&lt;p&gt;The EC pointed out that the approaches and capacities of member states differ widely, and that a low level of preparedness in one country can make others more vulnerable, while a lack of co-ordination reduces the effectiveness of any countermeasures.&lt;/p&gt;&lt;p&gt;The new initiative builds on the &lt;a title=&#39;Strategy for a Secure Information Society&#39; target=&#39;_blank&#39; href=&#39;http://ec.europa.eu/information_society/doc/com2006251.pdf&#39;&gt;Strategy for a Secure Information Society&lt;/a&gt; (PDF) developed by the Commission in 2006. The EC wants businesses, public administrations and citizens to focus on being prepared for all eventualities through the exchange of information and transfer of good policy practices between member states via a European forum.&lt;/p&gt;&lt;p&gt;It also aims to set up a European Public-Private Partnership for Resilience, which will help foster co-operation between businesses, and share information with public authorities to ensure that adequate and consistent levels of preventive, detection, emergency and recovery measures are in place in all member states.&lt;/p&gt;&lt;p&gt;The initiative also supports the development of a European information sharing and alert system, as well as regular exercises for large-scale network security incident response and disaster recovery.&lt;/p&gt;&lt;p&gt;Finally, the initiative seeks to drive a Europe-wide debate to set EU priorities for the long-term resilience and stability of the internet. The EC will propose principles and guidelines to be promoted internationally, and establish criteria for European critical infrastructure in the ICT sector as the approaches currently vary across member states.&lt;/p&gt;&lt;/div&gt;  					&lt;/div&gt;&lt;a target=&#39;_blank&#39; href=&#39;http://ad.uk.doubleclick.net/click%3Bh=v8/3806/3/0/%2a/j%3B212839118%3B0-0%3B13%3B14150425%3B4252-336/280%3B30093744/30111621/1%3B%3B%7Esscs%3D%3fhttp://managingrisk.computing.co.uk/&#39;&gt; &lt;/a&gt; &lt;a target=&#39;_blank&#39; href=&#39;http://ad.uk.doubleclick.net/click%3Bh=v8/3806/3/0/%2a/j%3B212839118%3B0-0%3B13%3B14150425%3B4252-336/280%3B30093744/30111621/1%3B%3B%7Esscs%3D%3fhttp://managingrisk.computing.co.uk/&#39;&gt; &lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=b6ef3cd4-a4dd-847c-ad1e-4a8b0e80f35a&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/6588208808226028717/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/6588208808226028717' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/6588208808226028717'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/6588208808226028717'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/04/eu-pledges-to-protect-cyber_05.html' title='EU pledges to protect cyber infrastructure'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-7772319311243016120</id><published>2009-04-05T21:31:00.001+02:00</published><updated>2009-04-05T21:31:43.600+02:00</updated><title type='text'>Cybersecurity bill seeks to give president new powers over private-sector networks</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;&lt;p id=&#39;first_paragraph&#39;&gt;&lt;span class=&#39;date&#39;&gt;April 3, 2009  (&lt;a href=&#39;http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;taxonomyName=security&amp;amp;articleId=9131070&amp;amp;taxonomyId=17&amp;amp;intsrc=kc_top&#39;&gt;Computerworld&lt;/a&gt;)  &lt;/span&gt;   	A wide-ranging &lt;a href=&#39;http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;articleId=9130958&#39;&gt;cybersecurity bill&lt;/a&gt; introduced in the U.S. Senate this week would give the president unprecedented new powers to disconnect government and private-sector networks from the Internet in the event of security emergencies. But that provision is expected to be a hard sell in Congress.&lt;/p&gt; &lt;p&gt;The proposed bill, formally known as the Cybersecurity Act of 2009, was filed on Wednesday by Sens. &lt;a href=&#39;http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;articleId=9130080&#39;&gt;Jay Rockefeller (D-W.Va.)&lt;/a&gt; and &lt;a href=&#39;http://www.computerworld.com/action/article.do?command=viewArticleBasic&amp;amp;articleId=9131061&amp;amp;intsrc=news_ts_head&#39;&gt;Olympia Snowe (R-Maine)&lt;/a&gt;. The legislation includes a long list of provisions that would give federal officials significant new authority to set and enforce data security standards for federal agencies, government contractors and key parts of the private sector.&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=12c6da98-4d9c-8d69-8b8f-782b04956336&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/7772319311243016120/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/7772319311243016120' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/7772319311243016120'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/7772319311243016120'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/04/cybersecurity-bill-seeks-to-give.html' title='Cybersecurity bill seeks to give president new powers over private-sector networks'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-1750397339753258222</id><published>2009-04-05T21:30:00.001+02:00</published><updated>2009-04-05T21:30:55.175+02:00</updated><title type='text'>Markle Foundation Report on Information Sharing</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;http://www.markle.org/events/20090310_nar/20090304_mtf_report.pdf&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=94318c3e-d06b-8ab5-a198-4de520a3b1b1&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/1750397339753258222/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/1750397339753258222' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/1750397339753258222'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/1750397339753258222'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/04/markle-foundation-report-on-information.html' title='Markle Foundation Report on Information Sharing'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-5369070724241138691</id><published>2009-03-19T23:42:00.001+01:00</published><updated>2009-03-19T23:42:46.163+01:00</updated><title type='text'>US: Hackers Penetrating Control Systems</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;&lt;p&gt;Interesting article, for the first time someone claims that an attack to a Process Control System killed people. &lt;br/&gt;&lt;/p&gt;&lt;p&gt;Joe Weiss, a very well known expert on SCADA and process control systems, said this during a testimony in front of the US Senate committee.&lt;/p&gt;&lt;p&gt;Good reading:&lt;br/&gt;&lt;/p&gt;&lt;p&gt;&lt;br/&gt;&lt;/p&gt;&lt;p&gt;(from &lt;a href=&#39;http://www.pcworld.com/businesscenter/article/161584/expert_hackers_penetrating_control_systems.html&#39;&gt;pcworld.com&lt;/a&gt;) The networks powering industrial control systems have been breached more than 125 times in the past decade, with one resulting in U.S. deaths, a control systems expert said Thursday.&lt;/p&gt;&lt;p&gt;Joseph Weiss, managing partner of control systems security consultancy Applied Control Solutions, didn&#39;t detail the breach that caused deaths during his testimony before a U.S. Senate committee, but he did say he&#39;s been able to find evidence of more than 125 control systems breaches involving systems in nuclear power plants, hydroelectric plants, water utilities, the oil industry and agribusiness.&lt;/p&gt;&lt;p&gt;&quot;The impacts have ranged from trivial to significant environmental damage to significant equipment damage to deaths,&quot; he told the Senate Commerce, Science and Transportation Committee. &quot;We&#39;ve already had a cyber incident in the United States that has killed people.&quot; [...]&lt;br/&gt;&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=6beff5da-c82f-4e15-9d3c-becefc112dc8&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/5369070724241138691/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/5369070724241138691' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/5369070724241138691'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/5369070724241138691'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/03/us-hackers-penetrating-control-systems.html' title='US: Hackers Penetrating Control Systems'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-2499567605255678050</id><published>2009-03-18T21:18:00.003+01:00</published><updated>2009-03-18T21:18:25.210+01:00</updated><title type='text'>2008 And The New (Old) Nature Of Critical Infrastructure</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;Interesting presentation on DNS as a critical component of Cyberspace. Dan Kaminsky talks about DNSSEC in its presentation given to Black Hat federal&lt;br/&gt;&lt;br/&gt;Link to the &lt;a href=&#39;http://www.scribd.com/doc/12697237/2008-And-The-New-Old-Nature-Of-Critical-Infrastructure&#39;&gt;presentation&lt;/a&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=904918bb-167d-49ab-a3bd-ffb1658802a4&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/2499567605255678050/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/2499567605255678050' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/2499567605255678050'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/2499567605255678050'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/03/2008-and-new-old-nature-of-critical_18.html' title='2008 And The New (Old) Nature Of Critical Infrastructure'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-6273548918650731535</id><published>2009-03-18T21:12:00.003+01:00</published><updated>2009-03-18T23:39:48.307+01:00</updated><title type='text'>US: Pentagon Official Warns of Risk of Cyber Attacks</title><content type='html'>&lt;div xmlns=&quot;http://www.w3.org/1999/xhtml&quot;&gt;&lt;p&gt;(from &lt;a href=&quot;http://www.washingtonpost.com/wp-dyn/content/article/2009/03/17/AR2009031702715.html&quot;&gt;washingtonpost.com&lt;/a&gt;) The head of the Pentagon&#39;s Strategic Command warned Congress today that the United States is vulnerable to cyberattacks &quot;across the spectrum&quot; and that more needs to be done to defend against the potential of online strikes, which could &quot;potentially threaten not only our military networks, but also our critical national networks.&quot; &lt;/p&gt;  &lt;p&gt;But Air Force Gen. Kevin Chilton made clear to a House Armed Services subcommittee that he has not been asked to defend most government Web sites nor the commercial and public infrastructure networks whose destruction could cripple the nation. &lt;/p&gt; &lt;p&gt;Chilton&#39;s command, instead, has the responsibility &quot;to operate and defend the military networks only and be prepared to attack in cyberspace when directed,&quot; he said, adding, &quot;I think the broader question is, who should best do this for the other parts of America, where we worry about defending power grids, our financial institutions, our telecommunications, our transportation networks, the networks that support them.&quot; &lt;/p&gt; &lt;p&gt;The responsibility of protecting civilian networks currently rests with the Department of Homeland Security, but Chilton&#39;s testimony comes at a time when a presidential-chartered 60-day study of cybersecurity is underway. A report from that study is expected next month. &lt;/p&gt; &lt;p&gt;Asked whether Homeland Security&#39;s cyber role fits within his command structure, Chilton responded, &quot;It does not fit at all today.&quot; But that may change after the 60-day review is completed, he added. [...]&lt;br /&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class=&quot;zemanta-pixie&quot;&gt;&lt;img src=&quot;http://img.zemanta.com/pixy.gif?x-id=3bca375a-4880-4ef9-a3ee-39e3c8e6e19b&quot; class=&quot;zemanta-pixie-img&quot; /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/6273548918650731535/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/6273548918650731535' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/6273548918650731535'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/6273548918650731535'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/03/us-congress-warned-most-government-us.html' title='US: Pentagon Official Warns of Risk of Cyber Attacks'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-5673433370857076989</id><published>2009-03-12T22:52:00.001+01:00</published><updated>2009-03-12T22:52:04.069+01:00</updated><title type='text'>Former FBI chief: NSA can&amp;#39;t run cybersecurity alone</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;&lt;p&gt;(From &lt;a href=&#39;http://news.cnet.com/8301-13578_3-10195208-38.html&#39;&gt;cnet.com&lt;/a&gt;) WASHINGTON--Echoing recent comments from &lt;a href=&#39;http://news.cnet.com/8301-13578_3-10191170-38.html&#39;&gt;government&lt;/a&gt; and &lt;a href=&#39;http://news.cnet.com/8301-13578_3-10194459-38.html&#39;&gt;industry&lt;/a&gt; representatives, a former FBI chief on Thursday said the intelligence community would be the wrong place to put complete responsibility for cybersecurity. &lt;/p&gt;&lt;p&gt;  &lt;/p&gt;&lt;div style=&#39;width: 150px;&#39; class=&#39;cnet-image-div image-medium float-right&#39;&gt;&lt;img height=&#39;200&#39; width=&#39;150&#39; alt=&#39;Louis Freeh&#39; src=&#39;http://i.i.com.com/cnwk.1d/i/bto/20090312/Freeh.jpg&#39; class=&#39;cnet-image&#39;/&gt;&lt;p class=&#39;image-caption&#39;&gt;Louis Freeh in his FBI days.&lt;/p&gt;&lt;span class=&#39;image-credit&#39;&gt;(Credit: FBI)&lt;/span&gt;&lt;/div&gt;  &lt;p&gt; Louis Freeh, who &lt;a href=&#39;http://www.fbi.gov/libref/directors/freeh.htm&#39;&gt;served as FBI director&lt;/a&gt; from 1993 to 2001, told audiences at the FOSE 2009 conference here that when the director of the Homeland Security Department&#39;s National Cyber Security Center resigned last week, he tapped into a strong historical resistance in the United States to centralized power, particularly in intelligence and military units. In his &lt;a href=&#39;http://news.cnet.com/8301-13578_3-10191170-38.html&#39;&gt;resignation letter, Rod Beckström&lt;/a&gt; said he opposes what he perceives as attempts by the National Security Agency to control DHS cyber efforts. &lt;/p&gt;&lt;p&gt; &quot;The comments (Beckström) made really went to the heart of this centuries-old nationwide dilemma,&quot; Freeh said. &quot;It is still the same debate we were having 200 years ago--is the military going to be responsible for this, or do we need to set up an independent civilian entity?&quot; &lt;/p&gt;&lt;p&gt;Cybersecurity responsibility should be left up to a consortium of government and industry players, he said, and the private industry has had too much difficulty maintaining reliable cooperation with the intelligence community. He cited as an example the &lt;a href=&#39;http://news.cnet.com/8301-13578_3-9986716-38.html&#39;&gt;uncertainty&lt;/a&gt; over whether telecommunications firms were to receive immunity for agreeing to unlawfully open their networks to the NSA. &lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=92f64558-01ad-4f2e-9d72-2b8bb899dcfd&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/5673433370857076989/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/5673433370857076989' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/5673433370857076989'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/5673433370857076989'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/03/former-fbi-chief-nsa-can-run.html' title='Former FBI chief: NSA can&amp;#39;t run cybersecurity alone'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-5281196612110500657</id><published>2009-03-12T09:01:00.001+01:00</published><updated>2009-03-12T09:01:11.708+01:00</updated><title type='text'>DHS Appoints Microsoft Executive to Secure Government Computers</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;&lt;p&gt;(from &lt;a href=&#39;http://blog.wired.com/27bstroke6/2009/03/dhs-appoints-mi.html&#39;&gt;wired.com&lt;/a&gt;) You might not think it&#39;s newsworthy when the Department of Homeland Security fills a job vacancy. But it&#39;s news when a department that has security in its name actually appoints someone with security in his background.&lt;/p&gt;  &lt;p&gt; Unfortunately, in this case, the security background comes courtesy of Microsoft, which might cause some to ponder the phrase &quot;unclear on the concept.&quot;&lt;/p&gt;  &lt;p&gt; DHS Secretary Janet Napolitano announced today that she was appointing Philip Reitinger to the position of deputy undersecretary of the department&#39;s National Protections Program Directorate. The job requires Reitinger to oversee the protection of the government&#39;s computer networks and work with the private sector to help secure critical infrastructures.&lt;/p&gt;  &lt;p&gt; Reitinger comes to DHS from his job as chief trustworthy infrastructure strategist for Microsoft, a job that required him in part to help develop and implement strategies for enhancing the security of critical infrastructures.&lt;/p&gt;  &lt;p&gt;  But since many people in the security industry feel that Microsoft has &lt;a href=&#39;http://www.ccianet.org/papers/cyberinsecurity.pdf&#39;&gt;played a large role in the lack of security&lt;/a&gt; (.pdf) with government and infrastructure systems, his appointment might be considered what some would call &lt;a href=&#39;http://www.fbiic.gov/public/2008/oct/CIIN-08-297-01-Vulnerability%20in%20Microsoft%20Server%20Service%20Remote%20Code%20Exe%5B1%5D.pdf&#39;&gt;ironic&lt;/a&gt; (.pdf).&lt;/p&gt;  &lt;p&gt;  A DHS spokeswoman indicated that the appointment is a signal of how seriously Napolitano takes the issue of computer security. [...]&lt;br/&gt;&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=e91abdbb-86c1-49ba-a366-c9b8c371bf83&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/5281196612110500657/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/5281196612110500657' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/5281196612110500657'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/5281196612110500657'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/03/dhs-appoints-microsoft-executive-to.html' title='DHS Appoints Microsoft Executive to Secure Government Computers'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-7894215985930185717</id><published>2009-03-12T08:57:00.001+01:00</published><updated>2009-03-12T08:57:40.465+01:00</updated><title type='text'>Cyber czar: there is a leading candidate now</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;(from &lt;a href=&#39;http://washingtontimes.com/news/2009/mar/12/inside-ring/&#39;&gt;Washingtontimes.com&lt;/a&gt;) &lt;br/&gt;&lt;p&gt; The Obama administration is moving ahead with plans to name a cybersecurity czar, and &lt;a href=&#39;http://washingtontimes.com/themes/?Theme=National+Security+Agency&#39; title=&#39;National Security Agency&#39;&gt;National Security Agency (NSA)&lt;/a&gt; Director Lt. Gen. Keith B. Alexander is the leading candidate for the post, Inside the Ring has learned. &lt;/p&gt;  &lt;p&gt; According to U.S. government officials, &lt;a href=&#39;http://washingtontimes.com/themes/?Theme=Barack+Obama&#39; title=&#39;Barack Obama&#39;&gt;President Obama&lt;/a&gt; plans to promote Gen. Alexander to four-star rank and give him wide-ranging authority to implement the new Comprehensive National Cybersecurity Initiative. &lt;/p&gt;  &lt;p&gt;Word of Gen. Alexander&#39;s likely appointment comes as the Department of Homeland Security&#39;s senior official in charge of cybersecurity, Rod A. Beckstrom, resigned this week to protest what he said was excessive NSA and military influence over cybersecurity policies.[...]&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=33207756-d3e2-4bcd-8127-74971aaebea6&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/7894215985930185717/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/7894215985930185717' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/7894215985930185717'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/7894215985930185717'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/03/cyber-czar-there-is-leading-candidate.html' title='Cyber czar: there is a leading candidate now'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-4929221292272410809</id><published>2009-03-12T08:55:00.001+01:00</published><updated>2009-03-12T08:55:41.198+01:00</updated><title type='text'>Estonia attack: Russia admission...?</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I spent a lot of time reading and studying what happened in Estonia with the famous attack. Few days after I flighted to Tallinn (what a beatiful city!!!) to meet with officials and people involved in defending the country from the cyberattack. Everyone had this question: was Russia behind the attack? Only an hypotesis, until now....&lt;br/&gt;&lt;p&gt;(From &lt;a href=&#39;http://www.betanews.com/article/An-interoffice-squabble-could-have-triggered-a-Baltic-cyberwar/1236764124&#39;&gt;Betanews&lt;/a&gt;) A Russian official speaking on an infowar panel last week &lt;a target=&#39;_blank&#39; href=&#39;http://www.rferl.org/Content/Behind_The_Estonia_Cyberattacks/1505613.html&#39;&gt;revealed that his assistant&lt;/a&gt; was responsible for the 2007 cyber-attacks that crippled the nation of Estonia. The only person surprised was &lt;a target=&#39;_blank&#39; href=&#39;http://www.echo.msk.ru/blog/n_asadova/576689-echo/&#39;&gt;Nargiz Asadova&lt;/a&gt;, the moderator of the discussion.&lt;/p&gt;&lt;p&gt;Sadly, the statement by Sergei Markov, an official from the pro-Kremlin Unified Russia party, has garnered only mild interest in the general press. (Almost no one I queried Tuesday even remembered the attacks, which knee-capped financial and government institutions as well as the nation&#39;s Internet traffic. It was started over the proposed relocation of a statue. Seriously.) Markov claimed that the assistant, whom he refused to name lest it imperil the man&#39;s visa applications, undertook the act as a patriotic gesture against perceived fascism (in, again, the relocation of a statue).&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=a975c848-28c9-40ea-9890-82868d9cdba7&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/4929221292272410809/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/4929221292272410809' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/4929221292272410809'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/4929221292272410809'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/03/estonia-attack-russia-admission_12.html' title='Estonia attack: Russia admission...?'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-3440800857455993529</id><published>2009-03-11T23:05:00.001+01:00</published><updated>2009-03-11T23:05:13.645+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyberterrorism"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyberwar"/><category scheme="http://www.blogger.com/atom/ns#" term="EU"/><title type='text'>Estonia attack: Russia admission...?</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;I spent a lot of time reading and studying what happened in Estonia with the famous attack. Few days after I flighted to Tallinn (what a beatiful city!!!) to meet with officials and people involved in defending the country from the cyberattack. Everyone had this question: was Russia behind the attack? Only an hypotesis, until now....&lt;br/&gt;&lt;p&gt;(From &lt;a href=&#39;http://www.betanews.com/article/An-interoffice-squabble-could-have-triggered-a-Baltic-cyberwar/1236764124&#39;&gt;Betanews&lt;/a&gt;) A Russian official speaking on an infowar panel last week &lt;a target=&#39;_blank&#39; href=&#39;http://www.rferl.org/Content/Behind_The_Estonia_Cyberattacks/1505613.html&#39;&gt;revealed that his assistant&lt;/a&gt; was responsible for the 2007 cyber-attacks that crippled the nation of Estonia. The only person surprised was &lt;a target=&#39;_blank&#39; href=&#39;http://www.echo.msk.ru/blog/n_asadova/576689-echo/&#39;&gt;Nargiz Asadova&lt;/a&gt;, the moderator of the discussion.&lt;/p&gt;&lt;p&gt;Sadly, the statement by Sergei Markov, an official from the pro-Kremlin Unified Russia party, has garnered only mild interest in the general press. (Almost no one I queried Tuesday even remembered the attacks, which knee-capped financial and government institutions as well as the nation&#39;s Internet traffic. It was started over the proposed relocation of a statue. Seriously.) Markov claimed that the assistant, whom he refused to name lest it imperil the man&#39;s visa applications, undertook the act as a patriotic gesture against perceived fascism (in, again, the relocation of a statue).&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=58375c55-9987-47dd-8155-902e0c9b0120&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/3440800857455993529/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/3440800857455993529' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/3440800857455993529'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/3440800857455993529'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/03/estonia-attack-russia-admission.html' title='Estonia attack: Russia admission...?'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-4033935940896103121</id><published>2009-03-11T22:56:00.001+01:00</published><updated>2009-03-11T22:56:08.447+01:00</updated><title type='text'>House hearing: U.S. in &amp;quot;dangerous&amp;quot; cybersecurity state</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;(from &lt;a href=&#39;http://www.scmagazineus.com/House-hearing-US-in-dangerous-cybersecurity-state/article/128576/&#39;&gt;SC Magazine&lt;/a&gt;) Public and private cybersecurity experts, in a hearing before Congress on Tuesday, discussed goals and challenges of federal government cybersecurity initiatives going forward.&lt;br/&gt;&lt;br/&gt;During the hearing before the U.S. House Subcommittee on Emerging Threats, Cybersecurity, Science and Technology, witnesses discussed goals for the &lt;a href=&#39;http://www.scmagazineus.com/Obamaorders60-daycybersecurityreview/article/127141/&#39;&gt;60-day review&lt;/a&gt; of federal government cybersecurity initiatives ordered last month by President Obama. The review is underway, being overseen by former Bush aide, Melissa Hathaway. &lt;br/&gt;&lt;br/&gt;“We find ourselves in an extremely dangerous situation today – too many vulnerabilities exist on too many critical networks, which are exposed to too many skilled attackers who can inflict too many damages to our systems,” said Rep. Yvette Clarke, D-N.Y., who chairs the subcommittee, during opening statements. “Unfortunately, to this day, too few people are even aware of these dangers, and fewer still are doing anything about it.” [...]&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=1faaeb57-c84e-4820-b8bc-5d602b7e8f69&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/4033935940896103121/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/4033935940896103121' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/4033935940896103121'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/4033935940896103121'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/03/house-hearing-us-in-cybersecurity-state.html' title='House hearing: U.S. in &amp;quot;dangerous&amp;quot; cybersecurity state'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-4250825996763291813.post-5290561068433392224</id><published>2009-03-11T00:27:00.001+01:00</published><updated>2009-03-11T00:27:52.956+01:00</updated><title type='text'>DHS Unfit to Run National Cybersecurity, Experts Say</title><content type='html'>&lt;div xmlns=&#39;http://www.w3.org/1999/xhtml&#39;&gt;(From &lt;a href=&#39;http://www.securitymanagement.com/news/dhs-unfit-run-national-cybersecurity-experts-say-005318&#39;&gt;Security Management&lt;/a&gt;)The Department of Homeland Security (DHS) is not up to the task of protecting the nation&#39;s cybersecurity , and a comprehensive, coordinated strategy for cybersecurity should instead be run out of the White House, public and private sector experts told lawmakers Tuesday. &lt;p&gt;The &lt;a target=&#39;_blank&#39; href=&#39;http://homeland.house.gov/hearings/index.asp?ID=175&#39;&gt;hearing before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology &lt;/a&gt;of the House Homeland Security Committee comes half-way through the National Security Council&#39;s 60-day review of the federal cybersecurity mission ordered by President Barack Obama.&lt;/p&gt; &lt;p&gt;If the hearing today is any indicator, the review conducted by the NSC&#39;s senior director Melissa Hathaway will not be favorable.&lt;br/&gt;&lt;o p=&#39;&#39;/&gt;&lt;/p&gt; &lt;p class=&#39;MsoNormal&#39;&gt;Witnesses roundly criticized the federal government’s effectiveness under the Bush Administration in protecting the country’s cyberinfrastructure from crime, espionage, and cyberattacks.&lt;/p&gt;&lt;br/&gt;&lt;br/&gt;&lt;div class=&#39;zemanta-pixie&#39;&gt;&lt;img src=&#39;http://img.zemanta.com/pixy.gif?x-id=dd422af4-eeb9-494c-be1e-b97126f73374&#39; class=&#39;zemanta-pixie-img&#39;/&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://criticalinfrastructure.blogspot.com/feeds/5290561068433392224/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/4250825996763291813/5290561068433392224' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/5290561068433392224'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/4250825996763291813/posts/default/5290561068433392224'/><link rel='alternate' type='text/html' href='http://criticalinfrastructure.blogspot.com/2009/03/dhs-unfit-to-run-national-cybersecurity.html' title='DHS Unfit to Run National Cybersecurity, Experts Say'/><author><name>A. Rigoni</name><uri>http://www.blogger.com/profile/13147490446666416994</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='31' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGjroRVbmQ2xjf2s1zRiYTwypM8kmTMFZl26wtj7SglKpGPkL6CixrYHhPgmo44QmdxoVBXwjFpBjtwAAKGyHC5HyZMBqX_RV4mxhI2ZYVFkR46b9GUOOBYCkrfeWIkjk/s220/primopiano2.JPG'/></author><thr:total>0</thr:total></entry></feed>