19 Mar 09:07 avatar

Очередное слияние на рынке частной разведки (C6 Intelligence с AA International)

Зарубежный рынок частной разведки демонстрирует невероятную динамику по количеству слияний и инвестиционных контрактов. Вот и сегодня пришла очередная новость о вхождении разведкомпании C6 Intelligence в малазийскую AA International.
19 Mar 08:44 avatar

Очередные инвестиции в бизнес-разведку в размере $60 млн.

Компания специализирующаяся на разработке систем бизнес-разведки DOMO смогла привлечь инвестора еще на 60 миллионов долларов. Общий объем инвестиций в компанию составит $125 млн.:

US — Software as a service-based business intelligence firm Domo has raised $60m in series B funding.
18 Mar 11:48 avatar

Система кибер-безопасности Канады

Канада — далеко не последнее государство в вопросах организации кибер-безопасности. Интересная статья опубликованная недавно, открывает нам глаза на систему кибер-безопасности этого государства.
18 Mar 09:07 avatar

Инвестиции в кибербезопасность в размере $23M

Разработчик систем кибербезопасности Endgame Inc. получил инвестиции в размере $23 миллионов:

Endgame Closes on $23M for Cyber Security


Endgame Inc., a provider of cyber security software, has closed on $23 million in Series B equity financing. The money will be used to expand the company’s customer base. Paladin Capital Group led the round, with participation from existing investors Bessemer Venture Partners, Columbia Capital, Kleiner Perkins Caulfield & Byers and TechOperators.
18 Mar 08:54 avatar

Кибер-армия США насчитывает более 50 000 кибер-войнов

Интересные сведения о вооруженных силах киберкомандования США просочились в СМИ. Так киберкомандование насчитывает более 50 000 голов, и более 2 000 кибер-оружия (что под этим подразумевается, не сказано):

US whining hides own cyber crimes


Recently, a report by Mandiant, a US cyber security firm, kicked off a new round of the China-bashing campaign. According to Mandiant, hackers sponsored by the Chinese government have stolen vast amount of intellectual property from dozens of company networks.

Such accusations are not only denied by the Chinese government, but also challenged by Mandiant's competitors.

Jeffrey Carr of Taia Global pointed out that this report suffers from a «blame China first» bias, and its methodology is not rigorous enough.

Though such allegations against China are not new, the timing is quite intriguing. To set the record straight, we have to look at what the US has been doing in cyberspace over the years.

As a matter of fact, the US has been building a hacking empire since the inception of the Internet. It is no secret that high-ranking US military and intelligence officials are frequent participants in hacker gatherings around the globe to recruit cyber warriors.

In July 2012, Keith Alexander, director of the US National Security Agency (NSA), attended the annual hacker conference of Def Con, an infamous hackers' organization. In his keynote speech, Alexander referred to Def Con as «the world's best cyber community,» and said that «I am absolutely impressed with some of the stuff going on here.»

The purpose of the NSA's recruiting efforts is self-evident, and the US is definitely not innocent in the world of cyber-spying. The 2011 US Department of Defense Cyberspace Policy Report is quite revealing, as it states that «the US government collects foreign intelligence via cyberspace...the conduct of all US intelligence operations is governed by long-standing and well established considerations, to include the possibility those operations could be interpreted as a hostile act.»

In fact, the largest documented offensive cyber operations in the world were conducted by the US.

The European Parliamentary Session Document from 2001 listed a number of cases of US cyber espionage being used to benefit US-based corporations over their European counterparts.

For example, the NSA intercepted communication between Airbus and the Saudi Arabian government during contract negotiations, and forwarded this communication to Boeing and McDonnell Douglas which went on to win the contracts instead.

This is only the tip of the iceberg.

As even allies cannot be spared, it is not surprising at all that the vast majority of cyber attacks against China originate from the US.

Espionage is not the only sin the US commits in cyberspace. As early as 1998, the US established its first cyber war unit. Over the past decade, the size of the US cyber force has grown exponentially, and its strategy has also gone from defensive to offensive.

In 2009, the US Cyber Command (CyberCom) was launched. According to media report, the US cyber force is composed of more than 50,000 cyber warriors deployed across all services, with an arsenal of more than 2,000 cyber weapons at their disposal.

Naturally, such a formidable force has a strong reason to flex its muscle. In recent years, the Stuxnet and Flame attacks against Iran displayed the power of sophisticated cyber weapons and the culprits of these attacks are already an open secret. The genie of cyber war is trying to sneak its way out of the bottle.

To help get over its financial cliff, the US will reduce defense spending by approximately $487 billion over the next decade.

Against this backdrop, the Pentagon still plans to expand CyberCom, and its staff will increase from 900 to 4,900 in several years.

Obviously, the US is determined to make cyberspace into a fourth dimension of war and eager to make sure that the existing international law of armed conflicts is applicable to cyber war.

However, applicability of current international law on armed conflicts in the cyberspace is still a highly controversial issue. Some security experts are of the view that the US simply wants to legitimize its military action in cyberspace by affirming applicability of current international law and its pre-emptive strike doctrine is extremely dangerous. To the exasperation of the US,not all countries are ready to provide the cloak it needs so badly. Therefore, it is interesting to note that the US strategic guru Zbigniew Brzezinski recently wrote in his latest article that «the cyber age demands new rules of war.»

Beside espionage and sabre-rattling, the US is also increasingly relying on cyberspace as a new vehicle for political sabotage and cultural infiltration against other countries.

For the sake of protecting the parochial interest of domestic companies, the US grossly denied ZTE and Huawei market access, ignoring its commitment to free trade. On many occasions, the US stubbornly refused to manage content that insulted the whole Muslim world under the pretext of the free flow of information.

In December 2012, the US, like most other developed countries, defiantly refused to sign the revised International Telecommunication Union Regulations, arguing that they empowered censorship, which shows their insincere commitment to democratic global government.

For years, China has been the victim of smears employed by the US to push forward its domestic and international agenda. As Haroon Meer, founder of Thinkst, rightly points out, «First comes the bogeyman, and then comes the protection we need, more legislation and more law enforcement. Again, this all has a strangely familiar feeling.»

While the Pentagon was fighting for CyberCom's budget, the China-bashing hype intensified. Is this simply a coincidence? People may wonder why a country as young and innovative as the US can not conjure up some newer tricks.

In the 21st century, information technology has an increasingly important role to play in socioeconomic development of countries all over the world. To build a peaceful, secure, cooperative and open cyberspace is in the interest of all mankind. Once the Pandora's Box of cyber war is opened, the result could be unimaginably horrific.

As the sole superpower in the current world, the US should bear the primary responsibility of ensuring peace and stability in cyberspace.

Introducing war into cyberspace definitely goes against the international community's expectation of a «global leader.» The risks and threats in cyberspace can only be addressed through international dialogue and cooperation which cannot be conducted in a poisoned atmosphere.
The author is a political analyst based in Beijing. opinion@globaltimes.com.cn

www.globaltimes.cn/content/768585.shtml#.UUaqpRejd4I
18 Mar 08:33 avatar

Разработчики систем кибербезопасности для государства, внедряют свои решения в бизнес

Рано или поздно, все разработки для государства в области безопасности доходят и для бизнес среды. Отрасль кибербезопасности не исключение. Вот типовой пример этого:

Defense contractors translate their own cybersecurity protections into business


By Marjorie Censer
Sources: http://www.washingtonpost.com

In recent years, Bethesda-based defense contractor Lockheed Martin has watched cyberattacks on its network grow, not only in number but in sophistication — including one that gained public attention in 2011.(Carl Wiens/for Capital Business) - Contractors are increasingly marketing to commercial businesses the cybersecurity they developed for internal use.

The contracting giant has invested significantly in defending its networks, but at the same time has turned that cyberdefense into a product that can be sold to government and commercial customers.
14 Mar 12:12 avatar

The era of the private intelligence agencies

Private intelligence services are non-state actors involved in the sector of Intelligence and are primarily collecting and analyzing information by outsourcing public funding and by providing assistance to large multinationals.
14 Mar 10:30 avatar

Легко ли быть шпионом: откровения профессионала

Промышленный шпионаж существует — это факт. И занимаются им не только (и не столько) красавчики вроде Джеймса Бонда, а вполне обычные люди. Об этом человеке написано не много, впрочем, какую-либо информацию о нем найти в принципе почти невозможно. Его нет в социальных сетях, он раньше никогда не давал интервью и в целом старается вести ничем непримечательную жизнь. Портал PRM.ru получил эксклюзивную возможность взять интервью у человека, который занимался промышленным шпионажем. Назовем его Сергей.
13 Mar 12:13 avatar

Cyber attacks are leading threat against US: spy agencies

Intelligence leaders said for the first time on Tuesday that cyber attacks and cyber espionage have supplanted terrorism as the top security threat facing the United States.

That stark assessment, in an annual «worldwide threat» briefing that covered concerns as diverse as North Korea's belligerence and Syria's civil war, was reinforced in remarks by the spy chiefs before the Senate Intelligence Committee.

They expressed concern that computer technology is evolving so quickly it is hard for security experts to keep up.
4 Mar 19:10 avatar

Политолог: интернет — война образов, но цели те же — захват чужих территорий

Как Интернет позволяет манипулировать обществом, подталкивая его к революциям и государственным переворотам? Беседа с политологом Нормундом Гростиньшем.

…Этот трогательный интернет–дневник юной девушки в эпоху иранской революции, наверное, войдет в мировую историю манипуляций. Вот она боится идти на площадь. Но идти надо — и первый шаг сделан. И снова — страх и сомнения. Потому что речь идет о жизни. И она идет. И, наконец, последняя запись — за которой следят уже сотни тысяч человек (так искренне хороши и признательны ее слова) — «Снова ухожу на площадь!» И вдруг — чужой стиль. Как будто в обычном письме написано чужой рукой, а пишет старшая сестра: «Она погибла…»
2 Mar 18:39 avatar

Готова ли Россия к кибервойне

Информационная война или, как ее называют на западе, кибервойна идет полным ходом. Если кто то еще месяц назад сомневался в этом, то недавние «обмены ударами» между США и Китаем расставили всё на свои места. Интернет стал еще одним театром военных действий. Причем мы узнаем только отголоски кибервойны. Утечки секретной информации, потеря персональных данных пользователей, дискредитация паролей – всё это вершина айсберга под названием информационная война.
28 Feb 11:16 avatar

"Обрушение" России - не сказанное

На днях коллеги из «Р-Техно» выявили то, что система учета ФНС работает, мягко говоря, очень криво ("Обрушение России 1" и "Обрушение России 2"). Это выразилось в массовом сбое (противоправном изменении данных), в не способности быстро восстановить данные (нет архивов?), в естественном для чиновников отнекивании и утверждении, что «у них всё под контролем».

Не буду распространяться о бюрократии, тормознутости и прочих особенностях некоторых госструктур. Меня интересуют совсем уж утилитарные моменты. А именно:
— ПОЧЕМУ такой сбой стал возможен в ФНС?
— ПОЧЕМУ ФНС не смогла быстро исправить ситуацию?
28 Feb 08:40 avatar

В России может появиться финансовая полиция по примеру некоторых стран

В России может появиться финансовая полиция по примеру некоторых стран. Новое ведомство займется экономической «разведкой», противодействием незаконному выводу капиталов за рубеж и контролем над распоряжением бюджетными средствами. Подчиняться финансовая полиция должна будет непосредственно президенту или председателю правительства.
27 Feb 10:08 avatar

Информационные войны получили новый импульс

Сектор корпоративных информационных войн переживает новый этап развития, говорится в докладе Центра политической информации. Тезисы доклада BFM.ru прокомментировал глава Центра Алексей Мухин.
27 Feb 08:38 avatar

MacB wins $31M option to provide intelligence support to Air Force special operations

By Mark Hoover

MacAulay-Brown has won a $31 million contract option with the U.S. Air Force Special Operations Command to support intelligence units at two Air Force locations.

The two locations are Hurlburt Field, Fla., and Cannon Air Force Base, N.M.

MacB will provide intelligence specialists to support the command in planning, integration and implementing new and existing intelligence collection, exploitation, reporting, dissemination and evaluation capabilities, the company said in a release.
27 Feb 08:31 avatar

Revenue from business intelligence software to hit US$132.2 million in Singapore

Driven by the growth of the cloud, mobile, social, and information trends, the business intelligence (BI) software sector in Singapore is expected to grow by 8.7 per cent to US$132.2 million this year.

This is despite the fact that the technology has been a top priority for IT leaders for years, according to research firm Gartner.
“There is still a lot of unmet demand,” said Kurt Schlegel, a research vice president at Gartner, in a release sent to media last week. “Every company has numerous subject areas – such as HR, marketing, social and so on – that have yet to even start with BI and analytics.”
21 Feb 12:03 avatar

U.S. Ups Ante for Spying on Firms

China, Others Are Threatened With New Penalties
By SIOBHAN GORMAN and JARED A. FAVOLE

WASHINGTON—The White House threatened China and other countries with trade and diplomatic action over corporate espionage as it cataloged more than a dozen cases of cyberattacks and commercial thefts at some of the U.S.'s biggest companies.

Top administration officials painted a pervasive portrait of the far-reaching costs of espionage—competitive disadvantages, job losses, product impacts—that American firms as well known as General Motors Co. and DuPont Co. have already had to confront.
19 Feb 07:51 avatar

DHS tries monitoring social media for signs of biological attacks

The Homeland Security Department has commissioned Accenture to test technology that mines open social networks for indications of pandemics, according to the vendor.