Information Dominance Anytime, Anywhere… Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) Statement A: Approved for public release; distribution is unlimited PMW 130 Overview for NDIA 11 May 2011 Kevin McNally Program Manager PMW 130 858-537-0682 [email protected]
20
Embed
Information Dominance Anytime, Anywhere… Program Executive Office Command, Control, Communications, Computers and Intelligence (PEO C4I) Statement A: Approved.
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Information Dominance Anytime, Anywhere…
Program Executive OfficeCommand, Control, Communications, Computers and Intelligence (PEO C4I)
Statement A: Approved for public release; distribution is unlimited
• Over 2.08 billion Internet users (420M in China) – UN International
Telecommunication Union (ITU)
• DOD makes 1 billion+ Internet connections daily, passing 40TBs of
data – RADM Edward H. Deets, III
• DOD Networks scanned and probed 6M times/day – USCYBERCOM• Several years ago, zero countries armed for cyber warfare, today 20+
countries – Dr. Eric Cole, McAfee
• Stuxnet – Most advanced Cyber Weapon ever seen – CEO McAfee
“The next battle is in the information domain, and the first shots have already been fired.”- Admiral Gary Roughead, CNO
“The next battle is in the information domain, and the first shots have already been fired.”- Admiral Gary Roughead, CNO
"If the nation went to war today in a cyber war, we would lose.” - Admiral Mike McConnell (retired), 23 Feb 2010
"If the nation went to war today in a cyber war, we would lose.” - Admiral Mike McConnell (retired), 23 Feb 2010
2
McAfee Threat Summary
New stats:• 20 Million new malware in 2010• ~55,000 new malwares/day (new record)• Growth in sites hosting malware• Number of new mobile malware in 2010
• Cost on the black market •The Private Version is $3-4K•VNC private module is $10K
• ZeuS author earned $15M in commissions from license rights
• Infect PCs by simply visiting an infected Web site• Oct 2010, over 30 individuals were arrested for ZeuS-based attacks against U.S. and U.K. bank account holders• Dec 2010, spoof email from “White House” to UK Government• U.K. officials suggest the cyber attack originated from China
5
TOOLKIT TO BUILD YOUR OWN TROJAN HORSE
77% of infected PCs have up-to-date anti-virus software
Estimates range from 3-12 million machines infected
Conficker(At the one year mark)
1010
What about specialized weapons and aircraft?
11
French fighter planes grounded by computer virus- The Telegraph, 07 Feb 2009
French fighter planes were unable to take off after military computers were infected by a computer virus. Microsoft had warned that the "Conficker" virus, transmitted through Windows, was attacking computer systems in October last year
Android Disasters
• March 1, 2011: confirmed that 58 malicious apps were uploaded to Android Market
• Rootkit granting hackers deep access• Google initiated “remote kill” to affected devices • Admits they can’t patch the hole causing the
OSC Web monitoring report found an article dated 18 December 2010 on Shumukh Al-Islam Network titled “Launch SCADA Missiles” urging an attack
Social Networking Event
Robin Sage• Purportedly Cyber Threat Analyst
for the Naval Network Warfare Command
• Impressive resume at 24, high-level security clearances
• 10 years' experience in the cybersecurity field
• Friends list included people working for the nation's most senior military officer, the chairman of the Joint Chiefs of Staff, NRO, a senior intelligence official in the U.S. Marine Corps, the chief of staff for a U.S. congressman, and several senior executives at defense contractors
• Job offers from industry
“One soldier uploaded a picture of himself taken on patrol in Afghanistan containing embedded data revealing his exact location”
14
Information Assurance & Cyber Security (PMW 130)
• Computer Network Defense (CND) – ACAT IVT• EKMS/KMI - Component of NSA – ACAT IAM• PKI - Component of DISA – ACAT IAM• Cryptography (modernization; legacy)