6 septembre 2023 | International, Naval

Marines to establish ‘overdue’ safety center led by general officer

The Marine Corps will elevate its safety division to fall under the command of a general officer, to ensure more uniform safety compliance across the force

https://www.defensenews.com/naval/2023/09/06/marines-to-establish-overdue-safety-center-led-by-general-officer/

Sur le même sujet

  • 'Five Eyes' allies urge digital industry to stop child pornographers, terrorists

    4 septembre 2018 | International, C4ISR

    'Five Eyes' allies urge digital industry to stop child pornographers, terrorists

    Kathleen Harris · CBC News Canada and security allies say illicit material is flourishing and easily accessible on the web Canada and its "Five Eyes" intelligence allies are calling on the digital online industry to take urgent action to stop child pornographers, terrorists and violent extremists from finding a platform on the internet. After meetings in Australia, ministers from that country, Canada, New Zealand, the U.S. and U.K., issued a statement claiming the group is as determined to counter the "grave threats" online as they are to dealing with them in the physical world. "Our citizens expect online spaces to be safe, and are gravely concerned about illegal and illicit online content, particularly the online sexual exploitation of children. We stand united in affirming that the rule of law can and must prevail online," reads the joint communique issued Wednesday. Public Safety Minister Ralph Goodale, Immigration Minister Ahmed Hussen and Justice Minister Jody Wilson-Raybould attended the meetings. 'New vectors for harm' The joint statement says the anonymous, instantaneous and networked nature of the web has magnified threats and "opened up new vectors for harm." It also notes that the evolution of digital technology has created new opportunities for transmitting child exploitation material and perpetrating the most abhorrent acts, such as live streaming abuse. The statement says illicit material is not relegated to the recesses of the dark web, but is accessible through most common top‑level domains. Mobile technology has enabled offenders to target children using apps to recruit and coerce children. "The low financial cost, and the anonymized nature of this criminal enterprise, is contributing to a growth in the sexual exploitation of children. We must escalate government and industry efforts to stop this," it reads. Lianna McDonald, executive director of the Canadian Centre for Child Protection welcomed the joint statement. "Our organization has been engaging directly with survivors of child sexual abuse who endure lifelong impacts from the recording and sharing of their abuse on the internet," she said in an emailed statement "Collaboration across borders and with all sectors, including industry, is essential if we are to make meaningful progress in this space and address this heinous crime." Tackling terrorist fundraising The communique also pledges to do more to prevent terrorists and violent extremists from spreading materials designed to radicalize, recruit, fundraise and mobilize. Actions urged by the Five Eyes group include: Developing and implementing capabilities to prevent illegal and illicit content from being uploaded, and to execute urgent and immediate takedown measures when there is an upload. Deploying human and automated capabilities to find and remove legacy content. Investing more on automated capabilities and techniques, including photo DNA tools, to detect, remove and prevent reupload of illegal and illicit content. Building user safety into the design of all online platforms and services. Allen Mendelsohn, an internet law specialist and lecturer at McGill's law faculty, said because child porn is universally deemed reprehensible, he expects mounting governmental and public pressure could prompt tech companies to act. But, he said in past, they have resisted any steps to remove content, citing the "slippery slope" argument. "They are loathe to take any sort of action that would be seen as removing or not displaying any particular content that has been uploaded by users," he said. "They have taken the longstanding position that user content is the user's responsibility, not the platform's responsibility." Mendelsohn said the issue is complicated because there are differing laws and views internationally on what constitutes crossing the line for the internet. https://www.cbc.ca/news/politics/SOMNIA-1.4803122

  • Cyber’s uncertain future: These radical technologies and negative trends must be overcome

    10 novembre 2020 | International, C4ISR, Sécurité

    Cyber’s uncertain future: These radical technologies and negative trends must be overcome

    James Van de Velde The fate of the world may literally hinge on which states develop and appropriately introduce the radical technologies that are likely to disrupt cyberspace and the world. What are they, and what disruption do they pose? Here are a few, split into two categories: Radical-leveling technologies have leapt from linear to exponential capabilities and will shape the future competition: Additive manufacturing (i.e., 3D printing): “Who can manufacture what” may no longer be decided by governments. Human-machine interfacing: Where will this lead intelligence collection, privacy and security? The Internet of Things' expanded attack surface: The IoT may invite a near-constant struggle between good and malicious cyberspace actors throughout our government, intelligence, defense and commercial lives. Chain algorithm (i.e., blockchain) and cryptocurrencies: We have yet to discern how blockchain technology will be integrated into both public and private networks, such as for protecting the national currency of states, and what such integration will mean for intelligence collection and effects operations. Algorithmic-driven operations: Relying on algorithms in operations may aid both our and our adversaries' operations. Data analytics: Successful application of data analytics will help reduce false positives and aid in forensics (by discerning trends better). But new ways to collect, manage and analyze data will have to be discerned. Data localization: States are likely to Balkanize cyberspace into defensive pockets to capture and protect data (rather than surrender control entirely to the cloud or to servers outside their states). Russia and China are already Balkanizing their networks; many states will follow Russia and China's lead. New forms of encryption, including decentralized, local and private encryption: Enabled by quantum computing, new forms of encryption will make cyber operations more difficult. Emerging technologies represent new tech — currently developed or developed within five to 10 years — that will shape the future competition: Artificial intelligence (i.e., machine learning): China has declared that it plans to be the world's leader in AI and integrate it as much as possible into its technology and military forces and strategy. How will AI assist or thwart cyber intelligence collection, or affect the development of offensive or defensive cyberspace operations? Setting norms for AI will present new intellectual, technical and legal challenges. Quantum computing: The integration of quantum computing will assist and thwart cyber intelligence collection, as well as affect the development of offensive and defensive cyberspace operations. China's announced 2030 goal to develop a high-performing quantum computer with decryption capability is an existential threat to Western society, as it would afford adversaries unprecedented leverage and advantage over U.S. society. Shifting to quantum-resistant algorithms and encryption present certain costs and technical challenges, and a likely long-term transition. Nanotechnology: How will life as well as state vs. state competition change if devices that can impact the environment, health care or energy efficiency are built on the scale of atoms and molecules? Neuroscience technologies — biology and cyber: We have yet to discern how biology and cyberspace will converge to afford biological levels of cybersecurity and cyber biosecurity. The United States will also face challenging technological, political, historical, numerical and policy trends that will complicate efforts to absorb these technologies; the United States may soon have to adopt asymmetric strategies to contend with its competitors: The United States is telling itself that it is a status quo power (and that attempting domain dominance in cyberspace is somehow dangerous, wrong or imperial). The country currently suffers from “cyberspace fatigue” — a sense that our daily loss via cyberspace to ransomware, financial and proprietary theft, privacy invasion, and political influence is inevitable and inescapable. China and Russia both enjoy “asymmetry in interest.” That is, both Russia and China believe they care more about their foreign policy, national security, and cyberspace interests and activities than the United States and Americans generally do. It will soon be impossible for the United States to compete with China via numbers — even in cyberspace. Chinese forces will soon outnumber U.S. forces in every sector, including cyberspace forces. As the private sector compiles and controls unprecedented amounts of data on U.S. and non-U.S. citizens around the world, new public-private sector relationships must be devised. The private sector will have many more times the quantity of data on individuals and commercial activity than the U.S. government could ever obtain. China is now “out-cycling” the United States. The Chinese can do acquisition faster now than the United States, which means they will be able to collect on technological countermeasures and adopt counter-countermeasures to our attempts to defeat Chinese technology. The United States has yet to acknowledge explicitly that we are not so much in a “great power” competition, but instead we are in an era of the rise of authoritarian, anti-liberal democratic states. This is a much more serious problem, as, if left unacknowledged, the United States will appear as morally equivalent. The U.S. government may no longer be the lead for all complex technologies, including those involved in national security, computing, sensing or data analytics. Sad fact. We have — to date — accepted policy inferiority in cyberspace. We defend against malicious cyberspace operations, but we have been reluctant to conduct the escalation necessary to restore the norms we seek to protect. https://www.c4isrnet.com/opinion/2020/11/09/cybers-uncertain-future-these-radical-technologies-and-negative-trends-must-be-overcome/

  • CYBERCOM Has a Vendor In Mind For Its Big Data Platform But Is Open to Options

    28 novembre 2018 | International, C4ISR

    CYBERCOM Has a Vendor In Mind For Its Big Data Platform But Is Open to Options

    By Aaron Boyd The military's cyber branch plans to award a sole-source contract to manage and enhance its Big Data Platform but wants to know if other vendors are capable of bidding. Anyone with a passing understanding of cyberspace knows there's a lot of data out there. As the military command charged with fighting and defending that domain, U.S. Cyber Command needs a platform that can move, store and process all that data. CYBERCOM contracting officials posted a special notice Monday announcing plans to award a sole-source contract to manage the Big Data Platform program, which looks to help the command and military branches ingest and process huge swaths of data from across the internet. Officials intend to award the contract to Enlighten IT Consulting, however, they are reaching out to industry to see if a full competition is warranted. “Any response to this notice must show clear and convincing evidence that competition would be advantageous to the government,” the notice states, urging interested qualified vendors to respond by noon on Dec. 11. The vendor will be expected to develop prototypes for capabilities based on proofs of concept, design and build key components for those capabilities and integrate them with CYBERCOM infrastructure, as well as other military branches. “Critical tasks include data acquisition, processing and storing packet capture, engineering support, enhancing the BDP tool suite according to real-world conditions and beta testing with the user population that includes Cyber Protection Teams, Computer Network Defense Service Providers, and Regional Cyber Centers,” according to the statement of work. The work will include “sustainment and enhancement” of tools in the classified and unclassified areas. Program officials expect this effort to “significantly enhance” the platform's core capabilities. Officials are not looking for an overhaul of CYBERCOM's analytics capabilities, but rather the underlying metadata and tagging processes and existing data feeds that categorizes the data and help the analysts find what they are looking for. However, “The contractor shall support the testing, deployment, integration and sustainment of BDP analytics as required,” the document states. “The contractor shall also assess and evaluate implementing analytics as developed by others on the BDP.” Along with those capability enhancements, the vendor will also be expected to act as a system administrator, including ensuring the right people and teams have access to needed information and ensuring that information is properly stored and secured. The Big Data Platform is part of a suite of tools CYBERCOM is using to analyze threat data and act as an information clearinghouse for the military and defense industrial base, according to Lisa Belt, acting cyber development executive at the Defense Information Systems Agency. “Acropolis coupled with Big Data coupled with [the Cyber Situational Awareness Analytical Capabilities program] all come together to form what we consider the basis of our data brokering and analytics platform,” Belt said during DISA's Forecast to Industry day Nov. 5. The contract will run for up to three years, with one base year and two one-year add-on options. https://www.nextgov.com/analytics-data/2018/11/cybercom-has-vendor-mind-its-big-data-platform-open-options/153032/

Toutes les nouvelles