Wednesday, April 28, 2010

X-37B and Prompt Global Strike Launch

At 7:52 p.m., April 23rd, an Air Force Atlas 501 rocket shot the capsule enclosed X-37B Orbital Test Vehicle into space from Cape Canaveral. Resembling a small space shuttle, the OTV was built in Boeing’s famed Phantom Works.

The OTV will serve as an “on-orbit” laboratory for new sensors and other high-tech devices that will later be built into satellites. Its payload is highly classified, but the Air Force says test flights aboard the retrievable OTV will prove out new technologies before they are shot into space to stay.

The 29-foot OTV is powered by a combination of lithium ion batteries and solar panels. Air Force deputy undersecretary for space programs, Gary Payton, told reporters: “Probably the most important demonstration is on the ground, see what it really takes to turn this bird around and get it ready to go fly again.”

The turnaround goal is 15 days.

As for how long it will stay up there: “In all honesty, we don’t know when it’s coming back for sure,” said Payton. “I don’t think we’ve set any specific goal, but I would think handling this bird more like an SR-71 and less like a routine space launch vehicle would be a good objective,”

With all the focus on the launch of the X-37B, the launch of a Minotaur IV rocket from Vandenberg Air Force base in California received less attention.

The Minotaur IV reportedly carried the prototype of the new Prompt Global Strike weapon that can hit any target around the world in less than an hour.

The PGS is designed as the conventional weapon of the future. Reportedly, it could hit Osama bin Laden’s cave, an Iranian nuclear site or a North Korean missile with a huge conventional warhead.

Friday, April 16, 2010

Ambassador To Cyberspace

Legislation introduced in the Senate Monday would, figuratively speaking, create a United States ambassador to cyberspace.

The International Cyberspace and Cybersecurity Coordination Act of 2010 would authorize the creation of a senior coordinator at the State Department with the rank of ambassador at large, according to a statement issued by its sponsors, Senate Foreign Relations Committee Chairman John Kerry, D.-Mass., and Sen. Kirsten Gillibrand, D.-N.Y.

"This bill is the first step to better organize U.S. efforts to develop a coordinated strategic approach to international cyberspace and cybersecurity issues by designating a single diplomat responsible for U.S. cyber policy overseas," Kerry said in the statement.

The senior coordinator would be the principal adviser to the secretary of state on international cyberspace and cybersecurity issues and provide strategic direction for federal government policy and programs aimed at addressing cyberspace and cybersecurity issues abroad.

The sponsors said the legislation would ensure the development of a clear and coordinated strategy for international cyber engagement, including the potential negotiation of a multilateral framework to provide internationally acceptable principles to prevent cyberwarfare.

Gillibrand said this measure meshes with another bill she introduced last month., the International Cybercrime Reporting and Cooperation Act, which would use financial incentives to get foreign nations to combat cybercriminals. "Our legislation will make America safer by making our cyber diplomacy more robust, and coordinating with our partners in the international community," she said in a statement.

One of President Obama's cybersecurity priorities in his Cyberspace Policy Initiative outlined last May is to develop a coordinated, international response to global cyber threats.

The Kerry-Gillibrand bill is the latest of a growing number of cybersecurity bills before Congress.

This post is excerpted from the GovInfoSecurity article, Cybersecurity Ambassador, by Eric Chabrow, April 12th, 2010.

Monday, April 12, 2010

The Census

The 2010 Census is underway and you may be wondering about whom you can trust. The Census is easy, important, and safe — just fill out your form and mail it back.

The IC3 and the Better Business Bureau (BBB), a 2010 Census partner, are encouraging participation in the 2010 Census while cautioning consumers to get the facts:

2010 Census takers will never contact you by e-mail or solicit for donations. Do not respond to unsolicited (spam) e-mail or text messages; including clicking on links and/or opening attachments contained within. Criminals often capitalize on legitimate campaigns to spread computer viruses through e-mails, text messages, "pop-ups," fraudulent Web sites, or infected legitimate Web sites. The viruses are embedded in an attachment (including pictures), link, and/or computer application. This also applies to tactics used in social networking sites. Remember, not all anti-virus software detects every virus, especially if the virus is newly created.

Visit 2010.census.gov for official information on the 2010 Census. Beware of groups using a similar name to a reputable agency, especially through Web sites. Rather than following a purported link to the Web site, log on directly to the official Web site for the business identified in the e-mail and/or text. Web sites can be verified by utilizing various Internet-based resources to confirm their status and to obtain feedback.

2010 Census takers will not ask you for your Personally Identifiable Information (PII) such as your social security account number (SSAN), driver's license number, bank account number, or credit card number. Do not provide this type of information to anyone claiming to be a 2010 Census taker. Please be aware, the Census Bureau asks for the last four digits of the respondent's SSAN for one survey: the National Health Interview Survey. This survey touches approx 65,000 housing units per year.

For the 2010 Census, the Census Bureau will hire approximately 1.4 million people. Do not respond to work-at-home opportunities to be a Census taker, especially if the offer is unsolicited and it occurs through e-mail, text, or other indirect means. However, the Census Bureau may contact, in person, trusted third-party stakeholders, such as schools, media, businesses, community-based organizations, faith-based organizations, state, local, and tribal governments to spread the recruiting message. Criminals often use work-at-home scams to commit identity theft by collecting individuals' PII such as their bank account information, SSAN, and driver’s license number. Be wary if someone claiming to be a Census Bureau representative attempts to sign you up as a new employee on the spot. The Census Bureau has a hiring process, which includes taking a test in person, not on-line. To learn more information on what is required to become a census taker, visit http://www.bbb.org/us/article/out-of-work-the-us-census-bureau-is-hiring- nationwide-14365.

If you have information pertaining to a 2010 Census scheme, please file a complaint with the www.IC3.gov and contact your local BBB along with your local law enforcement agency.

The 2010 Census helps ensure your community receives its fair share of political representation and government funding. Fill out and mail back your census form today!

This post is excerpted from the Intelligence Note, 2010 Census, by the Internet Crime Complaint Center [IC3], April 12th, 2010.

Tuesday, April 6, 2010

There Are No Mushroom Clouds In Cyberspace

The National Academies of Science functions in part to provide independent scientific advice to the US government. In that capacity, the office of the Director of National Intelligence contracted with the NAS to look into the prospects of developing cyberwarfare capabilities that are sufficient to deter an attack on its national infrastructure. The NAS has recently submitted a progress report on its efforts, and the dry text of the introductory letter (the report is termed, "The first deliverable for Contract Number HHM-402-05-D- 0011") obscures a sometimes fascinating look into how the cold-war thinking that drove the development of the concept of nuclear deterrence fails to scale to the networked world.

That may seem like a statement of the obvious, but the report points out that deterrence was actually a fully fleshed-out conceptual framework, and there is a significant parallel between cyber and nuclear weapons that's a major component of this framework: it's much easier to engage in offense than defense. "Passive defensive measures must succeed every time an adversary conducts a hostile action, whereas the adversary’s action need succeed only once," the text notes, and recent history is replete with evidence that hostile actions can easily succeed far more often than once.

So, the prospect of mutually assured cyberdestruction might seem to offer the possibility of a framework that's at least similar to the one that governed the world of nuclear weapons. The body of the report, however, focuses on the various reasons it probably doesn't.

Perhaps the biggest reason is that, for deterrence to work, we and our adversaries have to have a rough idea of each other's offensive capabilities. "Classical deterrence theory bears many similarities to neoclassical economics, especially in its assumptions about the availability of near-perfect information (perfect in the economic sense) about all actors," as the report notes. Leaving aside the shortcomings of these assumptions in neoclassical economics, this simply doesn't describe the current reality.

Right now, the US has chosen to keep its offensive cyber weaponry entirely classified and, since there's no launch infrastructure or physical indications of testing (hallmarks of nuclear weaponry), nobody is likely to develop a complete picture of what we can do. The US is unlikely to disclose its capabilities because, in contrast to nuclear weaponry, knowing these capabilities may help adversaries plan defenses. It may be somewhat effective as a deterrent—it's generally assumed that the US has the most potent capabilities around. But it leaves the US in a situation where it is counting on everyone to assume it has the weapons.

This post is excerpted from the Ars Technica article, Modeling cyberattack deterrence on nuclear deterrence fails, by John Timmer, April 6th, 2010.

For more on cyber attack deterrence, visit Ars Technica.