{"id":25260,"date":"2016-03-09T13:30:19","date_gmt":"2016-03-09T02:30:19","guid":{"rendered":"http:\/\/www.aspistrategist.ru\/?p=25260"},"modified":"2016-03-09T15:33:20","modified_gmt":"2016-03-09T04:33:20","slug":"cyber-wrap-110","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-110\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/p>\n
This week saw the passing of one of the pioneers of cyberspace, Raymond Tomlinson, who was the first man to ever send an email. While Tomlinson didn\u2019t invent email, he did<\/span> transmit the first message between computer terminals in 1971<\/span><\/a> because it seemed like a \u2018neat idea\u2019, though one he was \u2018never supposed to be working on\u2019.<\/span> Today<\/span><\/a> approximately 2.5 million emails are sent per second, while the number of worldwide email accounts will reach 2.8 billion in 2018.<\/span><\/p>\n The<\/span> RSA Conference<\/span><\/a> concluded in San Francisco last week.<\/span> Experts talked<\/span><\/a> about encryption versus privacy, describing encryption backdoors \u00a0as a \u2018genie-out-of-the-bottle\u2019 development. Former Secretary of Homeland Security Michael Chertoff, stressed that \u2018it would be a mistake to sacrifice the security value of end-to-end encryption\u2019, while the Center for Democracy & Technology discussed their<\/span> brief<\/span><\/a> in support of the position taken by Apple. Robert Knake from Council on Foreign Relations summed up his views on the RSA conference,<\/span> noting<\/span><\/a> a \u2018clear-eyed optimism\u2019 in the private\u2013public cyber security partnership. However, problems remain for cyber security professionals including a lack of qualified candidates, and a legacy of systems that are indefensible but too crucial to companies\u2019 operations to take offline.<\/span><\/p>\n Also at RSA was US Secretary of Defense Ash Carter, who said that the Pentagon \u2018understands they are not getting good grades across the enterprise\u2019, lagging behind the commercial sector in best practices for data protection. Carter called for action from the tech community, asking them to become more involved with the Department in the fight for data security.<\/span> In response, the US Department of Defense is now asking to be hacked\u2014officially. The<\/span> \u2018Hack the Pentagon\u2019 Cyber security Initiative<\/span><\/a>, \u00a0part <\/span>of the<\/span> Cyber National Action Plan<\/span><\/a>, <\/span>will see carefully vetted hackers invited to test DoD networks for vulnerabilities under the first cyber bug bounty program in the history of the US federal government. The pilot, set to launch in April, is the first in a series designed to unearth vulnerabilities in the Department\u2019s applications, websites and networks.<\/span><\/p>\n The US DoD has also released a<\/span> Cyber Security Discipline Implementation Plan<\/span><\/a> designed to strengthen cyber security practices, increase authentication and reduce the attack surface of DoD networks. For more, catch up with the latest<\/span> Net Politics podcast<\/span><\/a>.<\/span><\/p>\n An investigation by the US Industrial Control Systems Cyber Emergency Response Team into the attack against Ukraine\u2019s power grid last December confirms the incident was a well-coordinated attack with a long lead-time. The<\/span> report<\/span><\/a> found distinct delineations between different phases of the operation, suggesting different state and non-state actors collaborated to shut down the power station. Security expert Robert Lee, who assisted the investigation,<\/span> speculated<\/span><\/a> that if Russia is responsible for the attack, it may be intended as a message \u00a0that Ukraine shouldn\u2019t nationalise power companies, some of which are owned by \u00a0Russian oligarchs with close ties to President Vladimir Putin.<\/span><\/p>\n