Announcement

Collapse
No announcement yet.

CNN's Cyber Shockwave

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • AgentDarkApple
    replied
    Re: CNN's Cyber Shockwave

    Originally posted by streaker69 View Post
    Did ya have a tough time aligning the cantenna to get best signal from the coffee shop?
    Lol no, I live in the basement of a loft building, so that sort of thing does not work well here. At least I live within walking distance and the place has good coffee.

    Leave a comment:


  • streaker69
    replied
    Re: CNN's Cyber Shockwave

    Originally posted by AgentDarkApple View Post
    Thanks! Hopefully I can catch up on everything and check it out later this week. I just moved recently and had to use coffee shop wireless for almost two weeks. I should be getting my own connection tomorrow...finally.
    Did ya have a tough time aligning the cantenna to get best signal from the coffee shop?

    Leave a comment:


  • AgentDarkApple
    replied
    Re: CNN's Cyber Shockwave

    Originally posted by erehwon View Post
    You didn't miss much, but the whole CNN's Simulated Cyber Attack War Game "We Were Warned" Cyber.Shockwave - 2/20/10 is on YouTube now.

    The transcript is here.
    Thanks! Hopefully I can catch up on everything and check it out later this week. I just moved recently and had to use coffee shop wireless for almost two weeks. I should be getting my own connection tomorrow...finally.

    Leave a comment:


  • happypanda
    replied
    Re: CNN's Cyber Shockwave

    Originally posted by AlxRogan View Post
    If you haven't watched this TED talk by Marcus Ranum, you really should take the time and check it out. http://www.youtube.com/watch?v=o59mQhBiUo4 If you want to really understand why some of the things that are done today, take a gander at his one example of how f'ed up HTTP is as a practice.

    I don't have primary responsibility of SCADA systems at my job, but I am responsible for their security interactions with the rest of the company and can fully support Thorn's and Streaker's comments. In just oil and gas companies, there are systems that easily date back 20-30 years and the latest technology just encapsulates serial communcation over Ethernet. There's just some things you can't "protect" in a conventional sense, where proper practice, process, and isolation are your only tools.
    Thank you very much for posting that video link. I was able to get a lot of good info out of it that I was previously not aware of. I would suggest this video to anyone that wants to know a bit more about the fundamentals behind much of our internet communication techniques.

    Leave a comment:


  • erehwon
    replied
    Re: CNN's Cyber Shockwave

    Originally posted by AgentDarkApple View Post
    I did not get to see the CNN special because I do not have cable/satellite. Does anyone know if it will be on their site or if it has made its way to YouTube?
    You didn't miss much, but the whole CNN's Simulated Cyber Attack War Game "We Were Warned" Cyber.Shockwave - 2/20/10 is on YouTube now.

    The transcript is here.

    Interesting take away from Michael Chertoff who was the National Security Adviser for the exercise...

    "I'm going to have to go up and see the president in about a quarter of an hour, in 20 minutes or so. So I'd like to frame, kind of a summary of where we have been in talking about the issues we have discussed today, both the original cyberattack and the following attack with respect to power.

    I'd like to once again get everybody's best view on what is the short-term fix, but then I would also like to look at what do we tell the American people about why this is not going to happen again, or are we going to have to tell them, this is going to happen all the time, get used to living in a country where you are constantly unable to communicate and unable to turn your electric lights on.

    So this is one of those moments before you walk into the Oval Office where you are going to have to be willing to tell the president this is a course of action that is bold but may get you in trouble after the fact is overreaching, or you may want me to go in and say to the president, look, here is what you've got to do to not get overreacting, and it may mean that we are going to have to muddle along for awhile, but in the long run you'll be able to say, look, I didn't touch on anything that civil liberties concern. So I asked you to explicitly address those issues as you talk about the way forward on these problems.
    "

    I'm worried anything Chertoff recommends to the President may not have the best interests of the nation in mind, except for Chertoff's bank balance.

    Leave a comment:


  • AgentDarkApple
    replied
    Re: CNN's Cyber Shockwave

    Originally posted by streaker69 View Post
    Then you probably wouldn't want to work there as a civilian, since chances are, the area you'd go into you'd have to deal with the authority issues.
    I would expect high security in any of those areas of course. When authority is for security reasons, I do not generally have an issue with it. I was mainly referring to not being compatible with uniforms, "natural" hair coloring, butt-kissery, people pulling rank, being indoctrinated, PT, communal restrooms, standing at attention, being yelled at, etc. Some of the stuff I have seen my husband (and others) put up with is certainly not my cup of tea.

    Leave a comment:


  • happypanda
    replied
    Re: CNN's Cyber Shockwave

    Originally posted by b0n3z View Post
    To go back to what was being talked about in the first couple posts (military going on the offensive) the army is actually starting to work their way into this also. They are suppose to be opening a new MOS (job) somewhere along the lines of "Army Hacker" that, from what I understand, will be offensively as well as defensively capable. Granted I doubt any of ya'll will be directly teaching them, nor will the people who actually teach them most likely be 10% competent or know ANYTHING about hacking other than having a bs Hacker Cert of some sort. (Sorry I vent sometimes because the army really is this dumb)

    As for the military infastructure, I could rip that entire topic a new a$$hole to put it in the NICEST of terms....literally. But I'll leave it up to you to debate it but I know for a fact that it is not secure in the highest levels of our security. Especially since some people like to monitor networks for half a year and THEN the network guys who are suppose to catch it realize after X Months.....

    /cough
    On the topic I thought this article was pretty cool and worth sharing. I like where this change is bringing things. It will absolutely help the domestic progression with being able to respond to large scale cyber challenges.

    http://www.homeland1.com/Critical-In...od-Watch-level

    Small snipet:

    "...the Federated Model for Cyber Security, allows cyber security defense systems to communicate when attacked and transmit attack information instantly and automatically to defense systems at other institutions. The idea is to strengthen the overall cyber security posture of the federated sites."

    Leave a comment:


  • streaker69
    replied
    Re: CNN's Cyber Shockwave

    Originally posted by AgentDarkApple View Post
    Lol they don't want me - I'm anemic and have allergies, ADHD, and solar urticaria. Not to mention my disdain for that level of order and formality. Me and "yes, sir" would not get along. Props to those who do (or did) serve though.
    Then you probably wouldn't want to work there as a civilian, since chances are, the area you'd go into you'd have to deal with the authority issues.

    Leave a comment:


  • AgentDarkApple
    replied
    Re: CNN's Cyber Shockwave

    Originally posted by streaker69 View Post
    You could always enlist.
    Lol they don't want me - I'm anemic and have allergies, ADHD, and solar urticaria. Not to mention my disdain for that level of order and formality. Me and "yes, sir" would not get along. Props to those who do (or did) serve though.

    Leave a comment:


  • streaker69
    replied
    Re: CNN's Cyber Shockwave

    Originally posted by AgentDarkApple View Post
    Do you know if they are likely to have any civilian counterparts? My husband is in the Army but is doing something else and isn't really a computer guy. However, I would like a job on a base doing something similar to what you described.
    You could always enlist.

    Leave a comment:


  • AgentDarkApple
    replied
    Re: CNN's Cyber Shockwave

    Originally posted by b0n3z View Post
    TThey are suppose to be opening a new MOS (job) somewhere along the lines of "Army Hacker" that, from what I understand, will be offensively as well as defensively capable.
    Do you know if they are likely to have any civilian counterparts? My husband is in the Army but is doing something else and isn't really a computer guy. However, I would like a job on a base doing something similar to what you described.

    Leave a comment:


  • b0n3z
    replied
    Re: CNN's Cyber Shockwave

    To go back to what was being talked about in the first couple posts (military going on the offensive) the army is actually starting to work their way into this also. They are suppose to be opening a new MOS (job) somewhere along the lines of "Army Hacker" that, from what I understand, will be offensively as well as defensively capable. Granted I doubt any of ya'll will be directly teaching them, nor will the people who actually teach them most likely be 10% competent or know ANYTHING about hacking other than having a bs Hacker Cert of some sort. (Sorry I vent sometimes because the army really is this dumb)

    As for the military infastructure, I could rip that entire topic a new a$$hole to put it in the NICEST of terms....literally. But I'll leave it up to you to debate it but I know for a fact that it is not secure in the highest levels of our security. Especially since some people like to monitor networks for half a year and THEN the network guys who are suppose to catch it realize after X Months.....

    /cough

    Leave a comment:


  • Thorn
    replied
    Re: CNN's Cyber Shockwave

    Originally posted by AlxRogan View Post
    If you haven't watched this TED talk by Marcus Ranum, you really should take the time and check it out. http://www.youtube.com/watch?v=o59mQhBiUo4 If you want to really understand why some of the things that are done today, take a gander at his one example of how f'ed up HTTP is as a practice.

    I don't have primary responsibility of SCADA systems at my job, but I am responsible for their security interactions with the rest of the company and can fully support Thorn's and Streaker's comments. In just oil and gas companies, there are systems that easily date back 20-30 years and the latest technology just encapsulates serial communcation over Ethernet. There's just some things you can't "protect" in a conventional sense, where proper practice, process, and isolation are your only tools.
    Very nice. That also explains my intense urge to shoot an FTP server, whenever I come across one.


    Originally posted by happypanda View Post
    Australia has a somewhat more established system than we do when it comes to reporting that stuff to local LE. An individual can report a cyber attack to local LE then (as a similar chain to what you stated) that is logged and reported up to a state authority. That state authority then investigates the attack to see if it is associated with other incidents or if it is a single incident. In the case its associated with identity theft or a series of events the AFP (Australian Federal Police) become involved.

    So there still is not much ability to do the actual investigation at the local level. The process is implemented well throughout the country though.
    In some ways, your comparing apples to oranges. While the criminal justice systems are similar in both countries, based on English Common Law, the US police system has some very basic differences. For example, we do not -and cannot- have a Federal Police because of the states' autonomy. (By the way, many people assume the FBI is a US federal police force, but this is incorrect. The FBI cannot investigate most crimes, unless requested to do so by local law enforcement, and even then they cannot help unless there is some federal law that has been broken. The crimes that the FBI has direct responsibility to investigate is rather limited.)

    Another point that can't be over emphasized is that of population, and that causes a further breakdown in comparison. The US has a population of 300 million. Australia's population is less than one tenth of that: 21 million in July 2009, according to the CIA World Factbook. In the US, the Tri-State/New York City metro area alone has that same population within a 100 mile radius of Manhattan.

    So while there may be some comparison as to how things are done in Australia, the differences between there and the US are significant in many ways, and those heavily influence way that authorities will respond to any emergency or investigation, whether "cyber" or not.
    Last edited by Thorn; February 22, 2010, 21:02. Reason: Typo

    Leave a comment:


  • streaker69
    replied
    Re: CNN's Cyber Shockwave

    Originally posted by happypanda View Post
    Australia has a somewhat more established system than we do when it comes to reporting that stuff to local LE. An individual can report a cyber attack to local LE then (as a similar chain to what you stated) that is logged and reported up to a state authority. That state authority then investigates the attack to see if it is associated with other incidents or if it is a single incident. In the case its associated with identity theft or a series of events the AFP (Australian Federal Police) become involved.

    So there still is not much ability to do the actual investigation at the local level. The process is implemented well throughout the country though.
    ...and the same holds true in the US. If you report an incident, you should not be expecting your local LE to investigate but report up the chain. To quote your previous post:

    We are behind in the fact that our lower levels of government dont usually investigate cyber crimes.
    They shouldn't be investigating such things as most of the time, they wouldn't have the jurisdiction to do so, considering the attacks most of the times cross state lines as well as international borders. You should also not be reporting such things to normal uniformed officers, but to the detectives. I've always had good luck in reporting anything that I needed to local departments, and they've always been professional and if they weren't sure what to do at first, they made some calls and determined what was needed to be done. Which is exactly as it should be.

    Leave a comment:


  • happypanda
    replied
    Re: CNN's Cyber Shockwave

    Originally posted by streaker69 View Post
    I'm curious as to what country has local LE that is able to investigate complex hacking, do you have an example of one?
    Australia has a somewhat more established system than we do when it comes to reporting that stuff to local LE. An individual can report a cyber attack to local LE then (as a similar chain to what you stated) that is logged and reported up to a state authority. That state authority then investigates the attack to see if it is associated with other incidents or if it is a single incident. In the case its associated with identity theft or a series of events the AFP (Australian Federal Police) become involved.

    So there still is not much ability to do the actual investigation at the local level. The process is implemented well throughout the country though.

    Leave a comment:

Working...
X