In “borderless” cyberspace, nation states struggle — M4IS2 Anyone?

Advanced Cyber/IO, Analysis, Augmented Reality, Budgets & Funding, Collective Intelligence, Communities of Practice, Computer/online security, Corporations, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Earth Intelligence, Ethics, Geospatial, History, info-graphics/data-visualization, InfoOps (IO), Intelligence (government), Journalism/Free-Press/Censorship, Key Players, Methods & Process, Officers Call, Peace Intelligence, Policies, Policy, Politics of Science & Science of Politics, Real Time, Reform, Research resources, Serious Games, Standards, Strategy, Technologies, Threats, Tools, Whole Earth Review
Click on Image to Enlarge

Analysis: In “borderless” cyberspace, nation states struggle

By Peter Apps, Political Risk Correspondent

Reuters LONDON | Thu Jun 9, 2011

EXTRACT:

“The nature of cyberspace is borderless and anonymous,” R. Chandrasekhara, secretary of India's telecommunications department, told a cyber security conference in London last week organised by a U.S.-based think tank, the EastWest Institute. “Governments, countries and law — all are linked to territory. There is a fundamental contradiction.”

Read full article….

Tip of the Hat to Chris Pallaris at LinkedIn.

Phi Beta Iota: The national secret intelligence communities mean well, but they are cognitively and culturally incapacitated  in relation to both the global threats and the global infomation sharing and sense-making possibilities.  It may just be that the solution has to come from a private sector service of common concern that can provide the integrity now lacking in governments and most corporation.  Scary thought.  M4IS2 is inevitable….delay is costing trillions.

Doc Searls on user-driven democracy

07 Other Atrocities, 11 Society, Advanced Cyber/IO, Civil Society, Collective Intelligence, Computer/online security, Corporations, Counter-Oppression/Counter-Dictatorship Practices, Cultural Intelligence, Cyberscams, malware, spam, Government, InfoOps (IO), IO Sense-Making, Power Behind-the-Scenes/Special Interests, Privacy, Secrecy & Politics of Secrecy, Technologies, Tools
Jon Lebkowsky Bio

Doc Searls on user-driven democracy

by jonl

Speaking at the 2011 Personal Democracy Forum, Doc talks about how power relationships work in markets vs how they should  and could work. Markets are conversations, and they should be symmetrical conversations. Note his bit about how the language of marketing parallels the language of slavery….and the part where all their cookies end up giving them 50% completely wrong information.

Doc is the co-author of the Clue-Train Manifesto.

Direct Link to Personal Democracy Video

See Also:

48 Recordings on Tap from Personal Democracy 2011

Pentagon Creates New Excuse for Waging War

07 Other Atrocities, 10 Security, 11 Society, Computer/online security, Corruption, Cultural Intelligence, Government, InfoOps (IO), IO Impotency, Military, Misinformation & Propaganda, Power Behind-the-Scenes/Special Interests, Technologies
DefDog Recommends....

Pogo reigns supreme…..

Pentagon Will Consider Cyberattacks Acts of War

By and

New York Times, May 31, 2011

WASHINGTON — The Pentagon, trying to create a formal strategy to deter cyberattacks on the United States, plans to issue a new strategy soon declaring that a computer attack from a foreign nation can be considered an act of war that may result in a military response.

Read rest of article…

Phi Beta Iota: These people literally have no clue and are simply striving for budget share before Pentagon right-sizing gets underway.  We absolutely guarantee that what the Pentagon and the US Intelligence Community do to their own employees every day (including forbidding thumb drives now) qualifies as a crime against humanity as well as an act of war.  The USG is its own worst enemy in every possible sense.

See Also:

2011 Cyber-Command or IO 21 + IO Roots

Bob Gates, Chief Maintenance Clerk, Talks Crap — and the Wall Street Journal Goes Along…

Defense and the Deficit–Busting the Defense Bubble, Ending Defense Entitlement

Reference: The Pentagon Labyrinth

Review (Guest): The Pentagon Labyrinth

Review: Grand Theft Pentagon–Tales of Corruption and Profiteering in the War on Terror

Search: cost of corruption + Corruption RECAP

Cyber-Security Politics, Business, Ethics…

02 China, 03 Economy, 07 Other Atrocities, 10 Security, Advanced Cyber/IO, Commerce, Commercial Intelligence, Computer/online security, Corruption, Cyberscams, malware, spam, Government, InfoOps (IO), Mobile, Politics of Science & Science of Politics, Technologies
DefDog Recommends....

Is it just me, or does it appear that we're okay with selling our cyber-soul to China (and Russia), as long as we can also blow tens of billions on US firms pretending to do cyber-security?

Report: Despite status as U.S. security threat, China's Huawei partnering with Symantec

East-Asia-Intel.com, April 27, 2011

The Chinese telecom giant Huawei Technologies, which has been linked to the Chinese military, is working with the U.S. software security giant Symantec, which is engaged in securing hundreds of thousands of U.S. computer systems against outside intrusions, according to a report last week in the Diplomat newsletter.

The report said “China and Russia are leveraging U.S. multinational corporations' economic requirements to accomplish strategic goals that could quite plausibly include covert technology transfer of intellectual property, access to source code for use in malware creation and backdoor access to critical infrastructure.”

Huawei was blocked from buying the U.S. telecom 3Leaf last year by the Committee on Foreign Investment in the United States (CFIUS) and also was blocked in 2008 from buying 3Com over security concerns. The U.S. National Security Agency also stepped in to dissuade AT&T from buying Huawei telephone equipment.

Despite those actions, Huawei formed a joint venture with Symantec in 2007 called Huawei Symantec Technologies Co. Ltd. (HS), the report said. Huawei is the majority partner with 51 percent ownership, with the entity being headquartered in Chengdu, China.

The report said a 2008 report identified HS as developing “China's first laboratory of attack and defense for networks and applications.”

The result is that Symantec is assisting China's cyber development of computer warfare capability.

The report was produced by cyber security expert Jeffrey Carr, author of Inside Cyber Warfare: Mapping the Cyber Underworld (O'Reilly, 2009).

Phi Beta Iota: The US Government compounds its lack of a strategic analytic model and the requisite integrity to actually pay attention to whatever findings might emerge, with an abysmal inattention to the most basic aspects of counter-intelligence, not just within government, but across the private sector, which does not actually take counter-intelligence seriously either.  Creating a Smart and Safe Nation is not difficult–it requires only a uniform commitment to intelligence and integrity across all boundaries.

Event + Webcast: 24 March, Gov Surveillance in a Digital World (7pm PST/10pm EST)

Civil Society, Commerce, Computer/online security, Corruption, Government, Law Enforcement, Mobile, Privacy, Secrecy & Politics of Secrecy, Technologies

On the evening on March 24, 2011, EFF staff activists will discuss the state of government surveillance and privacy in the United States at “Government Surveillance in a Digital World,” an event hosted by San Francisco Intersection for the Arts, with a live video stream by BAMM.tv.

One of the many topics to be discussed is the PATRIOT Act. For nearly ten years, EFF has fought to reform or repeal the overbroad authority granted to law enforcement through the PATRIOT Act, and this year, we have a chance to introduce significant reforms. Thanks to bipartisan opposition and the efforts of grassroots activists, Congress rejected a rubber-stamp reauthorization of the PATRIOT Act and instead vowed to spend three months debating reforms to this law. This gives us an incredible opportunity to speak out against the PATRIOT Act and tell Congress that we don’t want any laws that trample on our civil liberties.

Join the EFF activism team in person or online for a a wide-ranging discussion on privacy in the digital world, online free expression, and how we can work together to stop Congress from reauthorizing a PATRIOT Act that enables excessive government surveillance.

SOURCE

Rule 1: Don’t Throw Stones From a Glass House

07 Other Atrocities, 09 Justice, 10 Security, 11 Society, Advanced Cyber/IO, Articles & Chapters, Computer/online security, Corruption, Cyberscams, malware, spam, Government, IO Technologies, Military, Technologies
DefDog Recommends...

REFERENCE

Lessons from Anonymous on cyberwar

A cyberwar is brewing, and Anonymous reprisal attacks on HBGary Federal shows how deep the war goes.

Haroon Meer 10 Mar 2011 16:11 GMT

Al Jazeera

. . . . . . .

Even while Barr was proclaiming victory and threatening to “take the gloves off”, Anonymous were burrowing deeper into his network.

By the end of the attack, Barr's iPad was reputedly erased, his LinkedIn and Twitter accounts were hijacked, the HBGary Federal website was defaced, proprietary HBGary source code was stolen and with over 71,000 private emails now published to the internet, HBGary was laid bare.

In this, was our first lesson: The asymmetry of cyber warfare.

. . . . . . .

Read entire REFERENCE piece….

Continue reading “Rule 1: Don't Throw Stones From a Glass House”

Inside the Business of Malware (infographic) + Resources

Computer/online security, info-graphics/data-visualization, Technologies, Tools, Uncategorized

Infographic: Inside the Business of Malware

Web resources found along the way:

http://twitter.com/threatpost (security news)

http://offensivecomputing.net
(malware research)

http://twitter.com/ocomputing

http://hakin9.org (magazine)

Related:

DIY: Free tools for removing malicious software (Techrepublic)

Malware Intelligence of Modern Crimeware

Shadowserver Foundation

FireEye Malware Intelligence Lab