Tumgik
#US CYBERCOMMAND
comparativetarot · 11 months
Photo
Tumblr media
Eight of Swords. Art by Suzanne Treister, from HEXEN 2.0.
US CYBERCOMMAND
13 notes · View notes
mubashirnews · 2 years
Text
US Cybermilitary Force Details Its Support for Ukraine’s Digital Defense
US Cybermilitary Force Details Its Support for Ukraine’s Digital Defense
FORT MEADE, Md. — The Pentagon’s Cyber National Mission force has been supporting Ukraine’s digital defense with daily consultations, a collaboration that has helped unearth thousands of warning indicators of potentially compromised Ukrainian computer networks, a top U.S. cybercommander said on Monday. The United States had a team of nearly 40 people from the force in Ukraine to help the country…
Tumblr media
View On WordPress
0 notes
fvdnews · 2 years
Text
US Cybermilitary Force Details Its Support for Ukraine’s Digital Defense
US Cybermilitary Force Details Its Support for Ukraine’s Digital Defense
FORT MEADE, Md. — The Pentagon’s National Cyber ​​Mission force has been supporting Ukraine’s digital defense with daily consultations, a collaboration that has helped unearth 1,000 indicators of compromised Ukrainian computer networks, a top US cybercommander said on Monday. The United States had a team of nearly 40 people from the force in Ukraine to help the country shore up its defenses…
View On WordPress
0 notes
antoine-roquentin · 5 years
Text
About the Trump tweet where he clearly took a photo of a classified briefing with his cell camera:
Tumblr media
So, obviously the satellite spotters sprang into action and came up with some estimates for the NRO’s current capabilities:
Tumblr media Tumblr media
However, US-224 is 8 years old, part of the 4th generation of KH-11 hardware, a system that has been in use since the 70s. The NRO is in the process of launching the 5th generation to replace it, with USA-290/NROL-71 launching in January of this year with some very odd behaviour that suggests its capabilities are much different than its predecessors.
Marcy Wheeler, analyzing the apparent leak, suggests that it was actually approved of by the intelligence community:
First, the tweet was almost certainly not written by Trump. It has no grammatical errors or typographical anomalies. It uses technical terms and consists of full sentences.
In other words, the tweet has none of the hallmarks of Trump’s reflexive tweeting. Someone helped him tweet this out.
Then there’s the fact that, earlier this week, the US dick-wagged about another successful operation against Iran, a cyberattack that took out the IRGC database that they were using to target western shipping.
That story described the views of CyberCommand head General Nakasone, who did some dick-wagging in February over CyberCommand’s role in thwarting Russia’s efforts to tamper in the elections.
Whatever else Nakasone has done with his command, he seems to have made a conscious decision that taking credit for successful operations adds to its effectiveness. There certainly was some debate, both within the NYT story and in discussions of it, whether he’s right. But Nakasone is undoubtedly a professional who, when stories boasting of successful CyberCommand operations get released, has surely thought through the implications of it.
But as I said, last night NYT weighed in on the destroyed missile launch, with a story by long-standing scribes for the intelligence community, David Sanger and William Broad and — listed at the end in the actual story but given equal billing in Sanger’s tweet of it — Julian Barnes, the guy who broke Nakasone’s dick-wagging earlier in the week. It’s a funny story — as it was bound to be, given that virtually no one reported on the explosion itself and while this spends a line doing that, it’s really a story exploring what kind of denial this is....
Not everyone agrees with the claim that Trump would be required by law to deny a covert operation. He’s the President. He can do what he wants with classified information.
That said, the story may be an attempt to use official scribes to reframe this disclosure to make it closer to the way the intelligence community likes to engage in plausible deniability, with a lot of wink wink and smirking. Amid all the discussion of deny deny deny, after all, the NYT points to several pieces of evidence that this explosion was part of a successful program to sabotage Iran’s missile capabilities.
It could be that this tells us what the capabilities of the previous generation of spy satellites are to make us feel more comfortable, while the current generation is much more apt. After all, the holy grail of satellite imagery is real time automatic facial recognition:
Satellite technology has taken a creepy turn, with high-resolution images becoming so clear that they will soon be able to zoom in on your face and smartphone from outer space. The rapid advancement of the technology has refined the measurements of satellite image resolution from meters to mere centimeters. While these developments will potentially enable governments to better track down criminals and monitor suspicious behaviors, they could also bring a new era of privacy concerns.
Just last year, the US relaxed regulations on the commercial images that satellite companies can distribute, reducing the previous 50-centimeter resolution restriction by half. The new 25-centimeter restriction allows for an image that’s nearly four times clearer than before — precise enough to see a mailbox.
Now, DigitalGlobe, a leading global provider of commercial satellite images, is pushing for the restrictions to be lowered again, to just 10 centimeters this time. For reference, the BBC reports that the newest US spy satellites can make out objects less than 10 centimeters across — less than the length of someone’s smartphone. Enabling this kind of technology to be used at a commercial level is certainly somewhat worrisome.
Since you need about 32 pixels minimum to do facial recognition, a resolution of 5 to 10 cm per pixel doesn’t really work for that. However, if your enemies believe that that’s the best you have, while you have something better, then you’ve got a leg up on them.
Tumblr media
I’d also like to note the patch for the mission that put USA-224 into space. The Latin is supposed to say “better the devil you know”.
499 notes · View notes
Text
US cyberdefense is AWOL
Tumblr media
In security, attackers have an easier job than defenders: an attacker has to find a single mistake that a defender has made; a defender has to make no mistakes.
But the best defense is NOT a good offense. Neglecting defense means abandoning the people you're defending.
So guess how the US apportions its "cyber" budget.
It's all "deterrence" (i.e. offensive capability) and virtually no actual defense. As Jason Healey writes in Lawfare, this leaves Americans as "prey," not "predators."
https://www.lawfareblog.com/cyber-budget-shows-what-us-values
Healey is writing about the Cyberspace Solarium Commission's report "on a strategic approach to defending the United States in cyberspace against cyber attacks of significant consequences."
https://www.solarium.gov/
The report shows that the vast majority of information security spending in the US is though the military, not through defensive organizations like the DHS, a trend that began with Clinton and has been continued by every president since, with massive acceleration under Trump.
Ironically, Trump has criticized previous admins for neglecting defense and pledged to increase it as a priority, but all he did was redefine "defense" to mean "punishing those who use cyber tools for malicious purposes" and attaining "peace through strength."
Which is why the DoD's cyber budget is 25% higher than the total infosec budget of ALL defensive agencies, with US Cybercommand HQ getting 33% more to cover program ADMINISTRATION than the ENTIRE State Dept cyber budget, INCLUDING operations.
The DoD's cyber ops budget is 250% of the budget for then entire Cybersecurity and Infrastructure Security Agency, and 1000% of the budget for the National Cybersecurity and Communications Integration Center.
And that's just the part of the budget we know about; most of the DoD's budget is a secret. It's part of the trend Rosa Brooks spoke of: "everything became war and the military became everything."
Healey: "There are tremendous risks when a fearsome offense is paired with a weak defense," because "a more fearsome cyber offense makes it more likely they will get in a sucker punch on the U.S. before Cyber Command can bring its big guns to bear."
He's focused on the geopolitics, but we must attend to  human costs. When computer criminals steal trade secrets or kompromat, steal identities or clean out your bank account, they get away clean because your government has prioritized attacking rivals over defending YOU.
To take just one example: the NSA found a vulnerability in Windows that they codenamed "Eternalblue." Rather than report that bug to Microsoft so it could be fixed and everyone relying on Windows could be safer, the NSA kept the bug a secret so it could attack its enemies.
Then Eternalblue leaked. It got picked up by dumdums and spliced into some not-very-effective ransomware, supercharging in and giving birth to the Wannacry epidemic. Wannacry went on to shut down numerous businesses and hospitals around the world, including in the US.
But it did worse than that: Wannacry was used to shut down entire US CITIES. For MONTHS. Including, for example, Baltimore, a city that serves as a commuter town for Beltway Bandits, perhaps including some who decided not to fix Eternalblue.
https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html
It would be one thing if the only people who suffered as a result of this ghastly blunder was DoD personnel and their overpaid contractors - but the collateral damage here is staggering.
An offensive posture means you can make your enemy's rubble bounce after they slaughter your people. Only a general hoping for a consulting job with a defense contractor could view this as a good tradeoff for the casualties experienced by the people they've sworn to protect.
23 notes · View notes
Text
Now you understand why he was playing golf today 💥💥💥💥💥💥💥💣💣💣💣💣
On Election night, Trump and his campaign team assembled in the Eisenhower Building just west of the White House to watch the results come in.
Know what is there?
A SCIF.
Sensitive Compartmented Information Facility. (SCIF)
The kind used by Army intelligence cyber security division.
One of the first things you'll notice when you open this article is the red castle. Those who follow Q will recognize it immediately.
http://www.croftandassociates.com/work-blog/cybercommand-secure-communications-facility
They were monitoring the fraud in real time.
They knew which states were using the voting machines loaded with HAMMER & SCORECARD.
(Software developed for the CIA to manipulate voter tallies remotely in foreign elections.)
It was just deployed against the American people.
Tom Fitton & Sydney Powell put it right in your face
Dr Charlie Ward (Currency Broker & Hotel Contractor - Trump Insider) describes the deployment of this Sting Operation to trap those involved in election theft.
The Federalized National Guard were pulling around the clock duty in at least 16 states to trap these monsters.
All the swing states currently involved in the theft are on the list.
The SCOTUS ordered all ballots received after the deadline in PA be segregated from those received on time.
There will be a ballot audit.
Recounts are conducted by the same people/election boards as the first count.
Audits are conducted by armed fraud investigators.
State Legislators pick electors.
Republicans control both houses of the PA State Congress.
Guess who controls both Houses of State Legislatures in the other swing states?
You guessed it...
Republicans.
Check Mate.
If I were any of these Democrat officials involved in this colossal elecxtion fraud, I would be seeking asylum in a non-extradition country immediately.
Trust your President.
Trust God and Trust the Plan!
Tom Graham.
If you're wondering if what has been revealed above is true, I can tell you that the Twitter account for Tom Graham is followed by General Flynn, 😎
Food for thought 🤔🤔🤔🤔
“New intel from from a local friend always in the know:
Fwd:
Ok in a nutshell. This is going to the Supreme Court. Where they will rule that the election is invalid due to fraud or mistakes on a country wide scale. It will go one of two ways, either they will rule that all the unconstitutional
mail in ballots will be removed and the states ordered to recount without them or they will simply rule the election is invalid due to mass voter fraud and at that point it will be sent to the congress and senate for a vote. This is where it gets good. The house/congress votes on who the President will be. It has nothing to do with what party that has power. Every State gets one vote and 30 States are held by Republicans.and 19 by Democrats. They have to vote down party lines, they have no choice due to the 12th Amendment of the Constitution and the Senate votes for the Vice President where a similar even will take place. This is The law. This is why the Democrats are so mad at Nancy Pelosi. This will all happen in January. The only way President Trump won’t be President is if he concedes the election and that will never happen. So stop watching the fake news and don’t let your heart be troubled and live your life knowing this will all work out. President Trump will remain President. I have researched all of this and it is Fact!
Another fun fact, they called Gore the President Elect for 30 days in 2000 until the courts ruled against him and declared Bush the winner. And two people that were part of Bush’s legal team were none other that new Supreme Court Justices, Brett Kavanaugh and Amy Coney Barrett. Why do you think the Democrats tried so hard to keep them from being confirmed?”
XMA Header Image
US Army Intellegence and Security Command SCIF — Croft Architects & Engineers
croftandassociates.com
1 note · View note
ericvanderburg · 6 years
Text
Gen. Nakasone on US CyberCommand
http://i.securitythinkingcap.com/QzRqCm
1 note · View note
kayreach · 3 years
Text
Why do we need Cyber command when we already have NGAF?
Tumblr media
The common questions about how to position the cyber command as an intelligent threat detection and response platform, is what is the difference between Cyber command with NGAF as next gen firewall?
And the answers :
1. The positioning is different, NGAF is a perimeter defense product, the NGAF is put in the customer's network to directly defense the threats, almost every company need NGAF to protect their business. The Cyber Command is an intelligent detection and response platform, it mirrors all traffic from the core-switch and analyzes it. Some large Enterprises can use it to build a SOC. Cyber Command won't directly block the threats but it can monitor both East-West traffic and South-North traffic;
2. Values: NGAF mostly focus on protection but Cyber Command focus on Detection and Response;
3. Cyber Command can work with NGAF, the threats found in Cyber Command can be directly block via correlate with NGAF.
#kayreach #cybercommand #ngaf
source https://www.kayreach.com/post/why-do-we-need-cyber-command-when-we-already-have-ngaf
0 notes
Text
#Breaking: #US #CyberCommand will use new academic engagement network to tackle #cyber challenges
#Breaking: #US #CyberCommand will use new academic engagement network to tackle #cyber challenges
https://twitter.com/C4ISRNET/status/1483526142221066246?s=20 Source: Twitter
Tumblr media
View On WordPress
0 notes
benjaminwittes · 4 years
Text
The "Unmasked at Last" Edition
A Justice Department investigation into whether Obama-era officials improperly requested the identities of individuals from intelligence reports ends with a whimper. An investigation into the shooting of a protestor in Portland raises questions about the federal government’s use of force. And CyberCommand takes down a Russian botnet.
Parlo: Ascolta!
0 notes
spaghettionthewall · 4 years
Text
The "Unmasked at Last" Edition
A Justice Department investigation into whether Obama-era officials improperly requested the identities of individuals from intelligence reports ends with a whimper. An investigation into the shooting of a protestor in Portland raises questions about the federal government’s use of force. And CyberCommand takes down a Russian botnet.
New Episode of Rational Security
0 notes
hackernewsrobot · 6 years
Text
Russia confirms US cybercommand cyberattack; RAID controllers destroyed
https://blog.lukaszolejnik.com/target-confirming-an-offensive-cyber-operation-2/ Comments
0 notes
patrickcmiller · 6 years
Link
via Twitter https://twitter.com/PatrickCMiller
0 notes
livioacerbo · 7 years
Text
North Korea now has a second internet link through Russia
North Korea now has a second internet link through Russia
This gives North Korea an alternative method of accessing the internet — which, aside from the obvious benefit of redundant access, might mitigate the damage from foreign attempts to block their service. A report on Sunday revealed that US Cybercommand had been harassing the North Korean government’s hacking group with denial-of-service attacks for six months. … Continue reading “North Korea now…
View On WordPress
0 notes
Text
Students assigned to cheat on exam use doctored Little Brother cover and many other clever methods #5yrsago
Tumblr media
The IEEE's Computer and Reliability Societies recently published "Embracing the Kobayashi Maru," by James Caroland (US Navy/US Cybercommand) and Greg Conti (West Point) describing an exercise in which they assigned students to cheat on an exam -- either jointly or individually. The goal was to get students thinking about how to secure systems from adversaries who are willing to "cheat" to win. The article describes how the students all completed the exam (they all cheated successfully), which required them to provide the first 100 digits of pi, with only 24h to prepare. The students used many ingenious techniques as cribs, but my heart was warmed to learn that once student printed a false back-cover for my novel Little Brother with pi 1-100 on it (Little Brother is one of the course readings, so many copies of it were already lying around the classroom).
James and Greg have supplied a link to a pre-pub of the paper (the original is paywalled), and sent along a video of a presentation they gave at Shmoocon where they presented the work. The students' solutions are incredibly ingenious -- the audience is practically howling with laughter by the end of the presentation.
https://boingboing.net/2012/06/11/students-assigned-to-cheat-on.html
45 notes · View notes
babyawacs · 5 years
Text
#intel #reforms @theatlantic @thenatinterest @nationalinterest @chathamhouse @nsagov @gchq .@nsagov @bulletin atomic @ap @reuters @bbc_whys @france24 ‎@snowden https://www.theatlantic.com/ideas/archive/2019/09/us-intell igence-needs-another-reinvention/597787/? ‎ The article describes a diffuse changed landscape but one element is missing: It implies specialisation to a kind of enemy in a kind of new env ironment 1 ‎ Whos The Enemy ‎2 What of the landscape is  R E A L L Y A threat‎, a partof theproblem, a partof solution, a part of scenery four options  ‎ ‎3 Alot ofthe text implies shift of evenmore to sigint clearly and right these know allthey wanna know but so that they drown in info s. While these split again into lowlevel taking alqaida crxap offthe net while the real effort tries hard to preserve any advantage a nd not spread leaks letalone fix them ‎ So wegot ‎ ********‎ (!)‎ Humint integration as actionability into sigint, ‎ robu st humint onrequest, insight insight insight sigint serving humint and humint reconfirming it  *********‎ ‎ But what the text calls‎ for is more control options of the sigint realms inthe realms of lowerlevel taking crap off the n et and influencers control This aims more towards what? Triangle delta sheeple control to cybercommand armed forces whenever state actors serious actors ge t invovled? ‎ ‎ ‎The reshuffling of sigint and reintegration of humint in to these implies  *************** Analytical quality And what quality the analysts get from sigint‎ ‎ This in sigint as ‎the actionability towards the split of: Control or offensive secretive‎ **************** ‎ ‎4 Hardening civillians against which capabilities of the enemy (!!)whenthe enemy cannot do that The creation of advantages ,reductionof enemy advantages, over hardening own populations ‎ ‎ I am Christian KISS ‎ BabyAWACS – Raw Independent Sophistication #THINKTANK + #INTEL #HELLHOLE #BLOG https://www.BabyAWACS.com/ [email protected] PHONE / FAX +493212 611 34 64 Helpful? Pay. Support. Donnate. paypal.me/ChristianKiss
#intel #reforms @theatlantic @thenatinterest @nationalinterest @chathamhouse @nsagov @gchq .@nsagov @bulletinatomic @ap @reuters @bbc_whys @france24 ‎@snowden
https://www.theatlantic.com/ideas/archive/2019/09/us-intelligence-needs-another-reinvention/597787/?
The article describes a diffuse changed landscape but one element is missing:
It implies specialisation to a kind of enemy in a kind of new…
View On WordPress
0 notes