Monday, June 27, 2011

Pentgon is Reading this Blog

The Pentagon must be reading my blog.  Interestingly enough, the Pentagon is back-pedaling on its threshold for declaring war due to cyber-attacks.  According to CBS News, the U.S. military may never have a direct answer on when to fire back against a computer-based attack.  The Pentagon is developing different scenarios for its cyber war plans.  These scenarios are intended to define the rules of war as they apply to cyber war.  The scenarios do include launching attacks from unknowing civilian computers attacking civilian computers.  Critics of the Pentagon argue that it is not progressing fast enough in determining what constitutes a cyber-attack.  Pentagon spokesperson reminds these critics that the US is constantly being barraged with attacks from countries such as China.  However, much of what the US is doing to protect its cyber infrastructure remains secret and, therefore, is not open to the public.  The Pentagon did express that retaliation to cyber-attacks would most likely be in kind.  In other words, the US intends to fight fire with fire.

Sunday, June 19, 2011

Evolution of Cyber Crime

In the beginning, cyber security issues began as purchasers of software attempted and succeeded at breaking the anti-copy seal of software.  Software was purchased by a single individual and then boot leg copies were made and distributed to friends and relatives.  Software developers made several attempts to create a “seal” that would prevent copying the software, only have someone, somewhere break the code nd distribute the software freely for use by non-purchasers.  The difficulty to break the seal became ever increasingly more difficult as time wore on.  Nowadays, software is protected by a “key” which consists of several apparently randomly generated alpha-numeric key codes which will unlock the software for use. 

With the advent of the internet, cracking of computer related security became the domain of teenagers trying to outsmart the establishment’s security efforts.  This new wave of hacking has evolved to the breaking in and theft of much more valuable resources than locks and keys.  Hacking has developed into a multi-billion dollar crime venture.  While some of these ventures remain rather benign, the worse are a malignant sore for those who rely on the internet to conduct daily business.

Monday, June 13, 2011

War Over Cyber Security?

Another apparently significant breach of information security was reported this week.  The International Monetary Fund was hacked with some files being transferred by unknown parties.  However, an identified security expert indicated the hackers were believed to be connected to an unspecified government.  In addition, this week, a Fox News story reports that the US Pentagon indicates that computer sabotage coming from another country can constitute an act of war.  The news story raises several questions.  For example, can an otherwise anonymous person, masquerading as a foreign government agent hack into the US governments computers, commit sabotage, and cause a war?  Alternatively, can a foreign government agent, posing as an anonymous civilian hacker, do the same with the same results?  What are the retaliation options for the US government? 

The hacking of the IMF can be viewed as vandalism, theft or international sabotage.  Response to such actions require thorough investigation resulting in a conclusion that is “beyond a reasonable doubt” before any kind of retaliation is conducted.  The practice of warfare has evolved over the centuries, and as with the war on terrorism, the war on cyber security will require new defenses, tactics and weapons.

Friday, June 3, 2011

Learning Something New

If you want to learn something new, read an old book.  A British Member of Parliament (MP) is likening internet security to the imposition of highway and roadway traffic laws.  A hundred years ago, with the advent of the automobile, Americans were given the freedom to explore and travel beyond the norms of their times.  But with this new freedom came a responsibilities that needed to be learned through the automobile accident.  As a result, rules of the road were developed, Stop signs, traffic lights, speed limits and other traffic control measures.  The PM is linking this evolution with the recently found freedoms that internet travel is allowing people’s all over the world.  New rules will need to be devised to assure personal safety whilst traveling through the internet.  The PM argues new regulations are needed while assuring that Big Brother is not interjecting himself into our private lives.

Protecting Critical Digital Assets

Hi Everyone & Welcome to my new blog site.


This blogging site is to help me become aware of protecting critical digital assets (CDAs). 

I am employed at a nuclear plant which generates electricity.  Many of the controls for the reactor plant and secondary side (electric generator plant) are digital control systems (DCS).  For cyber security reasons we designate some of these as CDAs.  These are controls which are computers (programable logic computers) or other platforms which need to be isolated from unauthorized use.

My intent here is to have you provide me with some perspectives external to my organization.

Hopefully, I can provide you with some insights too.

Robert Nilsson
Assignment 1.4