Cyber Brief: Maritime Cyber Security
Several recent attacks targeting major sea port operations have demonstrated the ability of a cyber-attack to stall maritime shipping:
Several recent attacks targeting major sea port operations have demonstrated the ability of a cyber-attack to stall maritime shipping:
Last week the White House and the Defense Department issued new documents on cyberspace strategy. This posting includes the new issuances and presents them with current national security and strategy documents for immediate context as well as past White House and Department of Defense documents tracing the evolution of cyber strategy in the United States Government.
The Cyber Glossary is a compilation of specialized terms to help experts and the public alike navigate the complex field of cybersecurity. This resource combines definitions from a variety of government compilations. Sources for each entry – often multiple definitions exist – are provided, as is a key to allow for further research. This list will be expanded regularly. Reader suggestions are welcome.
Click on the appropriate letter in the left column or type a word or phrase in the search box at the top right of this page.
The United States Department of Justice today unsealed a criminal complaint (here) and arrest warrant for North Korean hacker Park Jin Hyok detailing his involvement in numerous cyber operations attributed to the Lazarus Group. Details in this document will likely advance the public’s understanding of how North Korea’s Reconnaissance General Bureau (RGB) conducts operations in cyberspace.
Washington, D.C., August 13, 2018 – U.S. Cyber Command’s strategy for curtailing ISIL’s ability to exploit the internet may at least partially be paying off, according to an analysis of recently declassified documents posted today by the nongovernmental National Security Archive.
The new documents, obtained under the Freedom of Information Act (FOIA) by Motherboard and the Archive, center around Operation GLOWING SYMPHONY, a USCYBERCOM activity authorized in late 2016 to deny the Islamic State use of the internet.
Washington, D.C., August 1, 2018 – An early classified Defense Department cybersecurity exercise named “Eligible Receiver 97” (ER97) featured a previously unpublicized series of mock terror attacks, hostage seizures, and special operations raids that went well beyond pure cyber activities in order to demonstrate the potential scope of threats to U.S.
Robert Mueller, Special Counsel for the US Department of Justice, on Friday, July 13, 2018, indicted twelve Russian intelligence officers for “engaging in cyber operations that involved the staged release of documents stolen through computer intrusions.” These cyber intrusions, known as Fancy Bear, have together with the Cozy Bear campaign come to be referred to as “Operation Grizzly Steppe.” Today’s posting explores the US Government’s public conceptualization of Russian cyber operations and highlights the two GRU units suspected of being directly connec
The cyber threat to critical infrastructure (communication, transportation, energy, finance, and vital services) receives a sizeable volume of attention from researchers and policy analysts. This Cyber Brief looks at transportation security in isolation beginning with President Clinton’s Executive Order 13010 and continuing through recent Federal reports on emerging challenges and technologies.
This month the Joint Chiefs of Staff issued an update to Joint Publication 3-12, first published on February 5th 2013. The following changes are prominent: