Krypt3ia

(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

Archive for April 17th, 2009

Dear Rod Beckstrom: To quote Inigo Montoya “I no think he knows the meaning of what he says”

leave a comment »

Rod Beckstrom, who resigned in March as director of the National Cyber Security Center at the Homeland Security Department, said in an interview that he feared that the N.S.A.’s push for a greater role in guarding the government’s computer systems could give it the power to collect and analyze every e-mail message, text message and Google search conducted by every employee in every federal agency.

Mr. Beckstrom said he believed that an intelligence service that is supposed to focus on foreign targets should not be given so much control over the flow of information within the United States government. To detect threats against the computer infrastructure — including hackers, viruses and intrusions by foreign agents and terrorists — cybersecurity guardians must have virtually unlimited access to networks. Mr. Beckstrom argues that those responsibilities should be divided among agencies

The rest is HERE

I’m sorry Mr. Beckstrom, you seem to be confused. Had you not been paying attention to the news these last few years? Your fears are a little off the mark. You see, you might have to go read about the NARUS STA 6400 that was put into the MAE West in San Francisco as well as all the others at the MAE facilities.

What’s that? You don’t know what that means?

It means that the internet as we know it, has already been BACKDOORED my friend. SO, giving the NSA any more powers as you concieve it, is a MOOT POINT. Now, add this to the warrantless wiretapping litigation and sovereignty cover that the Obama Administration case it just made, and you have no argument to make really.

It isn’t that I agree with it all.. I don’t.. BUT you need to pay attention before you open your mouth and quit.

CoB

Written by Krypt3ia

2009/04/17 at 14:23

DoD 2009 PLA Cyber Warfare Capabilities Assessment

with one comment

US DoD Estimates of Chinese Information Warfare Capabilities and Commitment 2002-2009

2009
“PRC military writings highlight the seizure of electromagnetic dominance in the early
phases of a campaign as among the foremost tasks to ensure battlefield success. PLA
theorists have coined the term “integrated network electronic warfare” (wangdian yitizhan –
网电一体战) to describe the use of electronic warfare, computer network operations, and
kinetic strikes to disrupt battlefield network information systems that support an adversary’s
warfighting and power projection capabilities. PLA writings on future models of joint
operations identify “integrated network electronic warfare” as one of the basic forms of
“integrated joint operations,” suggesting the centrality of seizing and dominating the
electromagnetic spectrum in PLA campaign theory.”

“In 2003, the CCP Central Committee and the CMC approved the concept of “Three
Warfares” (san zhong zhanfa – 三种战法), a PLA information warfare concept aimed at
influencing the psychological dimensions of military activity:

o Psychological Warfare seeks to undermine an enemy’s ability to conduct combat
operations through psychological operations aimed at deterring, shocking, and
demoralizing enemy military personnel and supporting civilian populations.


o Media Warfare is aimed at influencing domestic and international public opinion to
build public and international support for China’s military actions and to dissuade an
adversary from pursuing policies perceived to be adverse to China’s interests.


o Legal Warfare uses international and domestic laws to gain international support
and manage possible political repercussions of China’s military actions.”

“The PLA is investing in electronic countermeasures, defenses against electronic attack (e.g.,
electronic and infrared decoys, angle reflectors, and false target generators), and Computer
Network Operations (CNO). China’s CNO concepts include computer network attack
(CNA), computer network exploitation (CNE), and computer network defense (CND). The
PLA has established information warfare units to develop viruses to attack enemy computer
systems and networks, and tactics and measures to protect friendly computer systems and
networks. In 2005, the PLA began to incorporate offensive CNO into its exercises, primarily
in first strikes against enemy networks.”

“According to a 2008 Federal Bureau of Investigation (FBI) statement, PRC intelligence
services “pose a significant threat both to the national security and to the compromise of
U.S. critical national assets,” and concluded that these services “will remain a significant
threat for a long time.” The U.S. intelligence community has noted that, of all foreign
intelligence organizations attempting to penetrate U.S. agencies, China’s are the most
aggressive.”

“China has also identified 16 “major special items” for which it plans to develop or expand
indigenous capabilities. These include core electronic components, high-end universal chips
and operating system software, very large-scale integrated circuit manufacturing, next-
generation broadband wireless mobile communications, high-grade numerically controlled
machine tools, large aircraft, high-resolution satellites, manned spaceflight, and lunar
exploration.”

“Shu Quansheng, a naturalized U.S. citizen • who worked as a physicist in the United States,
pleaded guilty to violating the Arms Export Control Act by providing the PRC with
information on the design and development of a fueling system for space launch vehicles.

US DoD Estimates of Chinese Information Warfare Capabilities and Commitment 2002-2009

Chi Mak, a PRC national, acknowledged being • placed in the United States for more than 20
years to conduct espionage against the United States, providing sensitive plans for U.S. Navy
ships, submarines, and weapons to the PRC. In March 2008, he was sentenced to twenty-
four and a half years in prison by a federal judge.

In April 2008, Indian Government officials confirmed that its Ministry of External Affairs’
computer network and servers were the victims of intrusions that appeared to originate in
China.

In May 2008, the Belgian Government reported that it had been targeted by PRC hackers
multiple times.

In May 2008, U.S. authorities investigated whether PRC officials secretly copied contents of
a U.S. Government laptop during a visit to China by the U.S. Commerce Secretary and used
the information to try to penetrate into Commerce computers. The investigation is
ongoing.”

Well, looks like the Chinese Overlords have high plans for those back doors they are alleged to have left in our Grid networks. I find it rather amusing that “WE” invented the internets and “WE” first took the lessons of Sun Tsu to the likes of VMI and yet “WE” failed so miserably at determining the cyber warfare capabilities of the technologies we unleashed on the world. Even less so did we actually make any attempts at SECURING that technology that “WE” created and disseminated out of sheer laziness or stupidity… Or both…

Now we are behind the 8 ball and everyone is beginning to panic….

Such hubris…

Written by Krypt3ia

2009/04/17 at 12:46