Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
US mulls new tactics to stem wave of cyberattacks
by Staff Writers
Washington (AFP) Nov 06, 2014


Raytheon enhances security solutions portfolio
Dulles, Va. (UPI) Nov 5, 2014 - Raytheon has acquired Blackbird Technologies, enhancing its persistent surveillance, secure tactical communications and cybersecurity.

Blackbird is headquartered in Virginia, with customers in the intelligence community and U.S. Special Operations Command. It will now become part of Raytheon Company's Intelligence, Information and Services business.

"Blackbird Technologies is a strong fit for Raytheon and enhances the growth prospects of our business and the capabilities we can offer our customers," said Lynn Dugle, president of Raytheon Intelligence Information and Services. "Blackbird expands Raytheon's already established footprint in the intelligence community market while helping to grow our cyber-operations and special missions support to the Department of Defense.

"The combination will bring even more talent, innovation and experience to our customers."

Raytheon said it acquired Blackbird Technologies for about $420 million, subject to post-closing adjustments. The transaction, it added will "not materially impact Raytheon sales or earnings per share for the fourth quarter of 2014."

"Raytheon's extraordinary technical depth and our combined capabilities in cyber-security, persistent surveillance, and secure tactical communications will allow us to deliver the next generation of end-to-end solutions to our customers in the IC (intelligence community) and special operations markets," Blackbird Chief Executive Officer Peggy Styer said of the takeover.

As hacking attacks reach epidemic proportions, the US cybersecurity community is looking at new ways to step up defense, including counterattacking the hackers themselves.

US cybersecurity firms have begun unprecedented levels of cooperation to shore up America's key computer networks, and some experts argue in favor of "hacking back," or using offensive tools to improve defense.

Last month, dozens of cybersecurity firms and partners pooled resources in an effort to root out malware believed to originate from a Chinese state-sponsored group, dubbed Axiom.

"We wanted to make absolutely sure we did something that caused them some level of pain," said Zachary Hanif at iSight Partners, one of the cybersecurity firms involved in the operation.

Although the operation stopped short of "hacking back," the coordination aimed to "throw a large wrench into their engine," according to iSight's Brian Bartholomew, by coordinating defense to remove malicious software from and fortify defenses. The group cleaned up some 43,000 infections over two weeks.

Some experts argue tougher defense is not enough, and that some kind of offensive action is needed to halt the worst attacks in cyberspace.

Stewart Baker, a former assistant secretary of homeland security who now practices law in Washington, argues that limited "hacking back" could be justified, even though the legal issues are unclear.

- Morally justified? -

Baker said any actions a company takes outside its own network could be viewed as illegal, but there is a strong case to be made for reaching out to networks of third parties used by hackers to transit stolen data.

"I think you are morally justified for sure" in taking such actions, Baker told AFP. "And I think the probability of being prosecuted is very low."

Baker said if a firm can locate its stolen data and has a way to recover it, "they would be crazy not to."

"They can't wait for the government to get a court order. By the time that happened, everything is going to be gone."

But going beyond that, such as seeking to take out a hacker network, would mean "taking on risks" of legal liability.

US Justice Department guidelines caution against any retaliation.

Baker said the guidelines "don't quite say it's illegal, they say it's a bad idea."

A 2013 presidential commission report on intellectual property theft suggested some types of retaliatory actions should be legal.

"Without damaging the intruder's own network, companies that experience cyber-theft ought to be able to retrieve their electronic files or prevent the exploitation of their stolen information," the report said.

American firms wrestle with legal and other implications of any type of cyber-retaliation.

"We have the capability to hack back," said Jody Denner, a cybersecurity and digital forensics consultant for Hewlett-Packard who has worked with government agencies and the corporate sector.

"The same open-source tools that are available to these state-sponsored groups are also available to everyone else."

Denner said he is aware of some "cyber-bandit" firms that will take offensive measures, keeping the matters quiet.

In the meantime, other governments are active on this front.

"The services of such 'mercenaries' are actively purchased by third-world governments like Pakistan and Nigeria," said Denis Makrushkin of the security firm Kaspersky.

- 'A lot like counterespionage' -

Kristen Eichensehr, a national security law specialist at the University of California-Los Angeles and former State Department adviser, said private firms appear to be expanding their range of actions.

"The terms 'hacking back' or 'active defense' are used to describe a variety of actions ranging from planting fake data to 'beaconing' proprietary data so that it can be tracked if taken off a corporate network," she said on the Just Security blog.

"Depending on where on the spectrum a 'hacking back' action is, the private entity's actions could look a lot like counterespionage, law enforcement, or even military action."

The US military's Cyber Command charged with protecting the country's "critical infrastructure," which includes computer networks for finance, utilities and transportation, often gets blamed when there are gaps in cyber defenses.

Admiral Mike Rogers, who heads the Pentagon's Cyber Command as well as the National Security Agency, said recently the military is eyeing a policy of "deterrence," the same concept used for avoiding nuclear war.

Rogers said that as part of his role leading Cyber Command, he wants potential cyber-attackers to know there are consequences for their actions and that the US holds powerful weapons it can use.

But James Lewis, a cybersecurity specialist at the Center for Strategic and International Studies, said deterrence is unlikely to work.

"The idea of a deterrent effect is not plausible because you can't deter espionage and crime," Lewis said.

"What is the threat to get them to stop breaking into banks? There is no threat."

American officials are hesitant to carry out an offensive cyberattack "because what happens if they accidentally turn off the electricity at a hospital and kill a dozen people?"

With no easy answers, Lewis said improving cybersecurity will require not only better hardware, software and coordination, but diplomatic measures.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
'Major' hacking attack in US looms: expert survey
Washington (AFP) Oct 29, 2014
Cyber attacks might be taking a toll now, but just wait: a survey of experts says things are likely to get even worse in the US over the next decade. A majority of cybersecurity experts surveyed in a poll see a likelihood of major damage from a cyber attack in the coming years, according to a Pew Research Center report. From the 1,600 experts polled, 61 percent answered "yes" to the ques ... read more


CYBER WARS
China examines the three stages of lunar test run

NASA's LRO Spacecraft Captures Images of LADEE's Impact Crater

New lunar mission to test Chang'e-5 technology

Next Chinese mission to moon will return to Earth

CYBER WARS
You can't get to Mars, but your name can

A One Way Trip to Mars

Mars 2020 Will Continue Search for Habitability

NASA Seeks Ultra-lightweight Materials to Help Enable Journey to Mars

CYBER WARS
India to launch unmanned crew module in December

NASA Program Enhances Climate Resilience at Agency Facilities

SpaceShipTwo Manufacturer May Face Setback After Crash in California

Eye-catching space technology restoring sight

CYBER WARS
China to build global quantum communication network in 2030

China's Lunar Orbiter Makes Safe Landing, First in 40 Years

China's First Lunar Return Mission A Stunning Success

China completes first mission to moon and back

CYBER WARS
Students text International Space Station using a 20-foot antenna

Student Experiments Lost in Antares Rocket Explosion

NASA to work with cargo partners despite rocket crash

Russian space station resupply rocket launches, docks at ISS

CYBER WARS
India to test fly bigger space vehicle next month

Soyuz Installed at Baikonur, Expected to Launch Wednesday

Arianespace signs contract with ELV for ten Vega launchers

NASA Completes Initial Assessment after Orbital Launch Mishap

CYBER WARS
VLTI detects exozodiacal light

Yale finds a planet that won't stick to a schedule

In a first, astronomers map comets around another star

Getting To Know Super-Earths

CYBER WARS
Five years in space: one satellite, three missions

NMSU chemistry research could contribute to multiple applications

Active, biodegradable packaging for oily products

E-waste inferno burning brighter in China's recycling capital




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.