15 mai 2024 | International, Sécurité
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
BreachForums, a notorious online bazaar for stolen data, has been seized by law enforcement agencies for the second time in a year.
20 septembre 2018 | International, C4ISR
By: Mark Pomerleau
In its first formal cyber strategy document in three years, the Department of Defense said it would focus its cyber efforts on China and Russia and use the Pentagon's cyber capabilities to collect intelligence as well as to prepare for future conflicts.
According to an unclassified summary and fact sheet released Sept. 18, the documents lay out a vision for addressing cyber threats and addresses the priorities of the department's National Security Strategy and National Defense Strategy, which focused on a new era of strategic great power competition.
“The United States cannot afford inaction,” the summary reads. It notes that China and Russia are conducting persistent campaigns in cyberspace that pose long term risk. The documents also say that China is eroding the U.S. military's ability to overmatch opponents and that Russia is using cyber-enabled information operations to influence the U.S. population and challenge democratic processes.
The DoD's strategy comes on the heels of other major movements in cyberspace from the department. These include the elevation of U.S. Cyber Command to a full unified combatant command — which affords new and exquisite authorities — the full staffing of Cyber Command's cyber teams, an update to DoD's cyber doctrine and new authorities delegating certain responsibilities from the president to DoD to conduct cyber operations abroad.
The summary's lists five objectives for DoD's cyberspace strategy:
- Ensuring the joint force can achieve its missions in a contested cyberspace environment;
- Strengthening the joint force by conducting cyberspace operations that enhance U.S. military advantages;
- Defending U.S. critical infrastructure from malicious cyber activity that alone, or as part of a campaign, could cause a significant cyber incident;
- Securing DoD information and systems against malicious cyber activity, including DoD information on non-DoD-owned networks; and
- Expanding DoD cyber cooperation with interagency, industry, and international partners.
The strategy also describes the need to remain consistently engaged with this persistent adversary and to “defend forward” as a means of disrupting or halting malicious cyber activity at its source, including activity that falls below the level of armed conflict.
While academics have criticized the U.S. response to Russian election interference, the strategy notes that the United States tends to view conflicts through the binary lens of war or peace while competitors such as Russia see themselves constantly engaged in a state of war. U.S. Cyber Command's new leader is taking a different tact.
“We've got to act forward outside of our boundaries, something that we do very, very well at Cyber Command in terms of getting into our adversary's networks. That's this idea of persistent engagement, the idea that the adversary never rests, so why would we ever rest,” Gen. Paul Nakasone said during an August dinner hosted by the Intelligence and National Security Alliance.
Nakasone also has described the notion of defending forward as enabling forces to act outside the boundaries of the U.S. to understand what adversaries are doing in order to better defend against them.
https://www.fifthdomain.com/dod/2018/09/19/department-of-defense-unveils-new-cyber-strategy
15 mai 2024 | International, Sécurité
BreachForums, a notorious online bazaar for stolen data, has been seized by law enforcement agencies for the second time in a year.
31 décembre 2018 | International, C4ISR
By: Mark Pomerleau The Air Force is beginning to build specialized cyber teams across the service whose primary mission is to defend local installations and critical mission tasks from cyberattacks. These teams will ensure that a particular wing or smaller organization can complete their mission from a cyber perspective, Maj. Gen. Robert Skinner, commander of 24th Air Force/Air Forces Cyber, told Fifth Domain in a November interview. For example, Skinner said if a wing has an F-16 unit that's responsible for offensive counter air or defensive counter air support, mission defense teams will understand those weapon system and everything that goes into making those air sorties successful as a way to defend that mission from a cyber standpoint. As an example, an eight-man team at the 2nd Weather Group within the 557th Weather Wing monitors the network and recently discovered several “bogus” account requests. The commander, Col. Patrick Williams, said the team was able to figure out that many of the requests were either bots or foreign requests that “had no business being on that network.” By working with the Network Operations and Security Center to eliminate that activity, the number of requests dropped by 80 percent, a huge win, Williams said. He added this was done with just a nascent mission defense team given that the teams are just being filled out across the major commands now. Skinner said each major command is at a different point in activating the teams. In addition, Air Force leaders said the service hopes to achieve efficiencies within its entire IT and cyber defense enterprise. The officials pointed to the Air Force's “enterprise IT as a service” pilot, which examines what efficiencies can be gained by having commercial companies conduct the IT services as opposed to having airmen maintain the IT infrastructure. One benefit of such a move could be that it frees up personnel to spend more time on cyber defense. “Our core strategic theme is moving from IT focused delivery into mission defense teams,” Bill Marion, deputy CIO of the Air Force, said during a keynote presentation in early December. Skinner said the service will likely be able to “re-mission” workers from their IT positions and assign them to these more active defensive roles such as mission defense teams. These mission defense teams are different from cyber protection teams that the Air Force, and other services, provide to U.S. Cyber Command. “In my eyes the [mission defense team] is a [cyber protection team] lite,” Skinner said. "We're very proud of our cyber protection team training and I think that the more of that I can get with our mission defense teams, the more successful they'll be and then our cyber protection teams can be really focused on the high end, the big threats that we'll run into in a peer competition and peer adversaries.” https://www.fifthdomain.com/dod/air-force/2018/12/27/air-force-begins-to-roll-out-special-cyber-defense-teams
14 janvier 2022 | International, Aérospatial
La Direction générale de l'armement (DGA) vient de signer un contrat pour le compte du ministère de l'Intérieur à hauteur de 200 M€. Il s'agit d'une commande faite à Airbus de dix hélicoptères H160 qui vont remplacer progressivement les 26 « Écureuils », en service depuis près de quarante ans. La livraison de la commande est prévue pour 2024, le ministère souhaitant que les effectifs soient formés pour les Jeux olympiques. L'H160 peut embarquer jusqu'à douze personnes alors que l'Écureuil a une capacité moitié moins importante. En outre, les nouveaux hélicoptères seront dotés de nouvelles technologies à l'image du phare infrarouge Safran Euroflir 410, et de capacités de treuillage et de cordage rapides. Ils sont aussi plus économes en carburant, et la vitesse de pointe du modèle d'Airbus gagne 55 km/h pour une pointe à 280 km/h pour une autonomie allongée (880 km contre 660 km). Une nouvelle commande pour Airbus qui avait déjà reçu celle du ministère des Armées le 22 décembre : un contrat portant sur 169 hélicoptères H160M "Guépard" destinés aux forces armées, qui seront répartis entre l'armée de Terre (80), la Marine nationale (49) et l'armée de l'Air et de l'Espace (40) « pour des livraisons débutant en 2027 », précisait le ministère. En tout, la France a commandé à Airbus 180 hélicoptères H160. Capital du 12 janvier et BFMTV du 10 janvier