Showing posts sorted by date for query United Nations. Sort by relevance Show all posts
Showing posts sorted by date for query United Nations. Sort by relevance Show all posts

WikiLeaks Revealed Two New Documents of Trans Pacific Partnership Agreement (TPP)

WikiLeaks Revealed Two New Documents of Confidential Trans Pacific Partnership Agreement (TPP)
Last month WikiLeaks has published  the draft of secret Trans Pacific Partnership Agreement (TPP), uncovering the United States' covert international push for stronger intellectual property rights. Now just a month later two more breathtaking documents of TPP has been revealed by the whistle blower, that show the state of negotiations as the twelve TPP countries began supposedly final negotiations at a trade ministers’ meeting in Singapore this week. This leaks come at a particularly inconvenient time for negotiators, as they enter into their fourth day of talks in Singapore amid growing criticism. The talks are premised on secrecy, allowing countries to push for particular proposals without having to justify their positions publicly, but the continued pressure from WikiLeaks has brought unintended attention to the proceedings.
According to official release of WikiLeaks -One document describes deep divisions between the United States and other nations, and "great pressure" being exerted by the US negotiators to move other nations to their position. The other document lists, country-by-country, the many areas of disagreement remaining. It covers intellectual property and thirteen other chapters of the draft agreement. This suggests that the TPP negotiations can only be concluded if the Asia-Pacific countries back down on key national interest issues, otherwise the treaty will fail altogether. The above described two documents are dubbed as TPP Salt Lake Extracts & TPP Salt Lake Positions. For additional information about this issue click Here.  For further updates on TPP and also other hot WikiLeaks stories & cyber issues, just stay tuned with VOGH




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

WikiLeaks Uncovered Secret Trans Pacific Partnership Agreement (TPP), Incoming Threat For Internet

WikiLeaks Uncovered Secret Trans Pacific Partnership Agreement (TPP), Incoming Threat For Internet 
After SOPA, PIPA & ACTA now the Internet is about to face another ferocious challenge named Trans-Pacific Partnership Agreement (TPP). I am sure that many of you are unaware of this TPP, as it is still on process, but WikiLeaks have uncovered ad released secret negotiated draft text for the entire TPP (Trans-Pacific Partnership) which is a multilateral free-trade treaty currently being negotiated in secret by 12 Pacific Rim nations. The current TPP negotiation member states are the United States, Japan, Mexico, Canada, Australia, Malaysia, Chile, Singapore, Peru, Vietnam, New Zealand and Brunei. "This Trans Pacific “Partnership” is really, really bad News. #WikiLeaks" -said the twitter feed of WikiLeaks. From the leaked draft we came to know that  TPP will take time for all the corporate rigging in this lengthy document to be understood, but already it is evident that Internet freedom will be curtailed, access to health care will become more expensive and access to information will be undermined. In short the more you know about the odious Trans-Pacific Partnership, the less you’ll like it. It’s made for corporate intellectual property and profits. According to WikiLeaks official website -"The TPP is the largest-ever economic treaty, encompassing nations representing more than 40 per cent of the world’s GDP. The WikiLeaks release of the text comes ahead of the decisive TPP Chief Negotiators summit in Salt Lake City, Utah, on 19-24 November 2013. The chapter published by WikiLeaks is perhaps the most controversial chapter of the TPP due to its wide-ranging effects on medicines, publishers, internet services, civil liberties and biological patents. Significantly, the released text includes the negotiation positions and disagreements between all 12 prospective member states." 

In the words of WikiLeaks’ Editor-in-Chief Julian Assange, “If instituted, the TPP’s IP regime would trample over individual rights and free expression, as well as ride roughshod over the intellectual and creative commons. If you read, write, publish, think, listen, dance, sing or invent; if you farm or consume food; if you’re ill now or might one day be ill, the TPP has you in its crosshairs.” To download the entire TPP (Trans-Pacific Partnership) draft click here

While talking about Jullian Assange and WikiLeaksand this sensational leak of TPP, I would like to give you reminder that in this year we got several leaks from WikiLeaks, among them -'Detainee Policies' containing more than 100 classified or otherwise restricted files from the United States Department of Defense covering the rules and procedures for detainees in U.S. military custody. SpyFilesGI Files (Global Intelligence Files & Five Million E-mails From Stratfor) & The Syria Files Containing 2.5 Million Emails of Syrian Politicians, Govt, Ministries & Companies. 



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Australia Joined 38 Other Nations as Part of an International Cybercrime Treaty

Australia Joined 38 Other Nations as Part of an International Cybercrime Treaty

Sitting at the edge of the latest technology, today we can easily separate our world into two parts. One is the real world where we live and another is the virtual or cyber world, in which we all are tightly attached. As these two fields are the prime factor where we have to stay happily so the matter of safety, security is highly required on the both said areas. Being one of the leading cyber media, our main concern is the cyber domain,  so we are worried as well are responsible and committed to server our readers. In this period of time many of us feel terrified to engage themselves in the cyber space due to lack of security and privacy, and also keeping in mind the major disaster done by cyber criminals. But how long? To get rid of that not only we the media people but also the sincere government of several countries make themselves committed to prepare a safe cyber world for the people. Earlier we have seen several developed countries came under a shade, in order to make an united shield to protect this cyber domain and its people. Today that shield got a new member. Yes it is Australia who has now formally joined 38 other nations as a party to the world's first international treaty on crimes committed via the internet. This deceleration came from the Attorney-General Mark Dreyfus. In his speech he said "Australia becoming a party to the Council of Europe Convention on Cybercrime will help combat criminal offences relating to forgery, fraud, child pornography, and infringement of copyright and intellectual property" 
By joining the Convention, Australian law enforcement agencies will be able to rapidly obtain data about communications relevant to cybercrimes from partner agencies around the world. With the Convention now in effect, Australia's investigative agencies are able to use new powers contained in the Cybercrime Legislation Amendment Act 2012 to work with cybercrime investigators around the globe. The Act amended certain Commonwealth cybercrime offences and enabled domestic agencies to access and share information relating to international investigations. Dreyfus says the Act also created new privacy protections, safeguards and reporting requirements for the exercise of new and existing powers.
"A warrant is always required to access the content of a communication whether the information is in Australia, or accessed from overseas under the Cybercrime Convention. The Cybercrime Act and the Cybercrime Convention do not impact in any way on the need to have a warrant to access content from a telephone call, SMS or e-mail." -Dreyfus said in his statement.


-Source (ZDNet)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Two Nigerians Arrested For Hacking into Mail Servers of Ghana Armed Force & Stealing $13,978

Two Nigerians Arrested For Hacking into Mail Servers of Ghana Armed Force & Stealing $13,978

Two middle aged Nigerians have been arrested for hacking into mail server of Ghana Armed Force (GAF). The suspects, Peter Okechukwu, 32, and Emmanuel Ifedi, 31, were arrested by officials of the Criminal Investigations Department (CID) of the Ghana Police Service at a branch of the United Bank of Africa (UBA). In a report Ghana Business News said-  these two cyber criminal get busted in Accra  while attempting to divert $13,978 belonging to, Ghanaian peacekeepers after they had succeeded in hacking into the e-mails of GAF. According to the Director-General of the CID, Commissioner of Police Mr Prosper Agblor, in November this year the two suspects managed to enter the e-mails of Continental African Trading Limited (CATAL) and the United Nations Interim Force in Lebanon (UNIFIL) GHANBATT 76 and intercepted all electronic communications between the two parties. CATAL, an international organisation, had been supplying home appliances' to Ghanaian peacekeeping troops on various missions at different locations in the world. 
Recently, CATAL was contacted, as usual, by the GAF to supply home appliances to UNIFIL GHANBATT 76 peacekeeping troops in Lebanon. Mr Agblor said there was correspondence concerning the supply of the items between CATAL and the military through the Internet. Along the line, he said, the e-mails between the GAF and CATAL were hacked into by the two Nigerians, who intercepted all mails from both ends and replied them as if the replies were coming from the rightful receivers of the e-mails. 
He said the two suspects, using the identity of CATAL, sent an e-mail to the GAF instructing it to pay $13,978 into a UBA account number 01011651102235 as part payment for the supply of the goods. Upon receipt of the information, the GAF transferred $13,978 into the account as instructed by the two suspects.
Mr Agblor said CATAL realized that the GAF had suddenly stopped communicating with the company on matters relating to the transfer of the money and so it followed up with a phone call and detected that the GAF had paid $13,978 into an account number supplied by CATAL. 
He said it was at that stage that the two organisations realised that someone had hacked into their e-mails and quickly reported the issue to the Documentation and Visa Fraud Unit of the CID. Mr Agblor said the Business Development Manager of CATAL reported the case to the police and checks at the bank revealed that the money had not yet been cashed by the suspects. The police quickly mounted surveillance at the bank, awaiting the arrival of the suspects to cash the money. 
According to the CID boss, on November 11, 2012, Okechukwu, who happened to be the owner of the said account, was arrested when he turned up at the bank to cash the amount. Upon interrogation, the police said, Okechukwu admitted to the offence but mentioned Ifedi as the master brain behind the whole deal and led the police to Ifedi's house at Ashaley Botwe, an Accra suburb. Mr Agblor said investigations were still ongoing, after which the two would be put before court.






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

48 Countries Worldwide Joined Biggest Global Alliance Against Child Sexual Abuse Online

48 Countries Worldwide Joined Biggest Global Alliance Against Child Sexual Abuse Online

Cyber bullying, online child sexual abuse has became one of the biggest threat and challenge for the society. Several security report are pointing out that the number of cyber bully is increasing every day. There are daily reminders about those risks, whether it's the tragic fate of Amanda Todd, bullied into suicide. To get rid of these burning issues European Union (EU) Commissioner for Home Affairs Cecilia Malmström together with US Attorney General Eric Holder launched a Global Alliance against Child Sexual Abuse Online. In this campaign Forty-eight countries have joined forces to launch the most expansive fight ever against the spread of online child sex abuse. According to current estimates, there are more than one million images of sexually abused and exploited children now online. Every year, that number grows by 50,000 new images, according to the United Nations Office on Drugs and Crime (UNODC). Participants at the launch include Ministers and high-level officials from 27 EU Member States, who are also joined by 21 countries outside the EU (Albania, Australia, Cambodia, Croatia, Georgia, Ghana, Japan, Moldova, Montenegro, New Zealand, Nigeria, Norway, the Philippines, Serbia, Republic of Korea, Switzerland, Thailand, Turkey, Ukraine, United States of America, and Vietnam). The countries of the alliance are committing themselves to a number of policy targets and goals. Thanks to increased international cooperation, the fight against child sexual abuse online will therefore be more effective.
"Behind every child abuse image is an abused child, an exploited and helpless victim. When these images are circulated online, they can live on forever. Our responsibility is to protect children wherever they live and to bring criminals to justice wherever they operate. The only way to achieve this is to team up for more intensive and better coordinated action worldwide", said Commissioner for Home Affairs Cecilia Malmström.
“This international initiative will strengthen our mutual resources to bring more perpetrators to justice, identify more victims of child sexual abuse, and ensure that they receive our help and support,” said Attorney General Holder. “Through this global alliance we can build on the success of previous cross-border police operations that have dismantled international pedophile networks and safeguard more of the world’s children.” 

The participants of this campaign put out this list of goals for the new initiative, which has been dubbed the Global Alliance Against Child Sexual Abuse Online, in a press release:-

  • Enhance efforts to identify victims and ensure that they receive the necessary assistance, support and protection;
  • Enhance efforts to investigate cases of child sexual abuse online and to identify and prosecute offenders;
  • Increase children's awareness of online risks, including the self-production of images and "grooming" methods used by paedophiles;
  • Reduce the availability of child abuse material online and the re-victimization of children;
  • Establish dedicated law enforcement units for these crimes in all countries;
  • Make it easier to initiate joint cross-border police investigations;
  • Intensify co-operation with hotline services, where the public can report findings of online child pornography; and
  • Ensure that the Interpol international database of child abuse material grows by 10 percent annually.







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

UK Announces Plans for ‘Cyber Reserve’ Online Crime Defence Force

UK Govt. Announces Plans for ‘Cyber Reserve’ Online Crime Defense Force

Earlier this week, the UK government announced that it was planning on setting up a ‘cyber reserve’ force aimed at dealing with security threats brought about by online crime. The proposed force will be run by the country’s ministry of defense and is going to allow the armed forces to draw on the nation’s computer-related talents in order to ward off online attacks and stem the tides of cyber crime. Minister for the Cabinet Office Francis Maude claims that ‘critical’ work is required in order to combat online lawbreaking. He says that nine tenths of large British corporations and three quarters of small British businesses have reported experiencing a cyber breach within the last year, meaning that this force has now become a necessity.

Cyber Crime in the UK
Research conducted by a team of academics recruited by the UK Ministry of Defense earlier this year concluded that the country spends a billion US dollars per year on protecting against and cleaning up after instances of cyber crime. This includes the cost of measures taken to safeguard bank account security and reduce computer-related fraud, the money forked out by businesses purchasing anti-virus software and the cost of removing viruses from computers. In addition to criminals, terrorists and rogue states have also targeted computers in the UK, meaning that it is not difficult to see why the country would consider setting up such a force.

More Students Trained in Tackling Cyber Crime Needed
Maude has promised to make the UK one of the safest places in the world to conduct online business. He added that further details of the ‘cyber reserve’ plans would be revealed in 2013 and said that British government agencies and departments are working with professional bodies in order to ensure that the consideration of internet security becomes an integral component of corporate governance and the risk management process. He stated that UK officials want more students in the country trained in the skills required for tackling cyber crime and pointed out that the nation’s ministry of defense is examining new methods for attracting talented cyber security specialists, as they are required for critical areas of work.

Cyber-Spying by Hostile Nations
The UK Ministry of Defence’s announcement came in the wake of revelations that hostile foreign states had carried out ‘mapping’ of the systems that control the country’s power and water supplies. Officials refused to name the nations that were believed to have carried out this mapping but there have been reports in the United States that China and Russia have conducted similar reconnaissance exercises there, which suggests that they could be the countries that are responsible for this cyber-spying activity. With this in mind, it is little wonder the UK is stepping up its security, as it wishes to safeguard vital information.

Cyber Confidence Tracker
Francis Maude stated that the increasing number of threats posed to the UK’s online security is partly down to the growth of the internet economy. He said that the country’s government cannot take sole responsibility for fighting cyber crime and emphasized the fact that individuals and businesses would also have to play their part. Next spring the UK will be taking steps to improve online security for consumers and small businesses. The nation plans on launching a ‘cyber confidence tracker’, which will keep tabs on online behaviors and perceptions about internet security in an effort to ensure that the advise that they are delivering to the public about this subject is being conveyed in the best possible way.

Implications
It appears that the UK is now taking the threat of cyber attack extremely seriously, which it is wise to do considering the increasing trend of nations targeting the infrastructures of those that they are hostile towards via the internet. This is a sign that the web is becoming the new battleground in the international struggle for power. The full extent of the country’s plans for its ‘cyber reserve’ are not yet known. It is also questionable whether it will be used solely for defense purposes. Espionage is no longer dominated by spies being physically placed in another country. It is now evidently moving online, meaning that countries are being forced to adapt and develop cyber spies of their own.


Special article by 
Evelyn Anderson of International Business and Journalism
Guest Editor VOGH








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Interpol, ITU & IMPACT Jointly Singed a Hostorical Agreement in Cybersecurity

Interpol, ITU & IMPACT Jointly Singed an Agreement to Exchange Information, Expertise & Enhance Cybersecurity

During the 81st INTERPOL General Assembly taking place in Rome, Italy a historical and very vital cooperation agreement has been singed. In an effort to further enhance cybersecurity around the world, International Multilateral Partnership Against Cyber Threats (IMPACT), the cybersecurity executing arm of United Nations’ specialised agency – the International Telecommunication Union (ITU) and the General Secretariat of the International Criminal Police Organisation – (INTERPOL), reached a historic milestone with the signing of a landmark ‘Cooperation Agreement’ between both international organisations. Through this Agreement, it allows both IMPACT and INTERPOL to exchange information, expertise as well as to enhance both organisations’ knowledge base in the field of cybersecurity. The Agreement will also see the cross promotion of capacity building activities aimed at the public and private sector and the civil society, with an objective to curb cyber crimes by protecting the cyber space and orchestrating a safer global community. 
The Cooperation Agreement paves the way for INTERPOL and ITU-IMPACT to effectively cooperate within the scope of their respective mandates and resources in the field of cybersecurity. This Agreement is also designed to provide a broad framework for such cooperation to take place and to establish a collaborative association, with a view to promoting cybersecurity capacity-building and addressing cyber threats on a global scale. Datuk Mohd Noor Amin, Chairman of IMPACT and Mr Ronald K. Noble, Secretary General of INTERPOL signed the Cooperation Agreement today, witnessed by ITU Secretary-General, Dr. Hamadoun I. Touré. With 144 countries now, part of the ITU-IMPACT coalition, IMPACT is entrusted with the task of providing cybersecurity support and services to ITU’s Member States and other organisations within the UN system. ITU-IMPACT’s global partnership now embraces over 200 industry, academia and international organizations. 

“This kind of cross-agency collaboration is essential to combating the increasingly serious problem of international cybercrime,” said ITU Secretary-General Dr. Hamadoun I. Touré. “For too long, cyber criminals have hidden behind national borders, hoping to escape detection or eluding the jurisdiction of national law enforcement authorities. This new partnership with INTERPOL represents a major step forward in our efforts to bring such criminals to book.”
Datuk Mohd Noor Amin, Chairman of IMPACT added; “The signing of this agreement is truly a landmark event for all of us. For the first time, we are effectively pooling together and merging the resources from INTERPOL’s community of police forces worldwide with ITU-IMPACT’s existing stakeholders from governments, telecommunications regulators, CERTs, ISPs, ICT industry and academia. ITU’s recent MOU with the United Nations Office of Drug and Crime (UNODC) further strengthens the partnership by potentially adding in judicial officers and prosecutors under the ITU-IMPACT umbrella. This coming together of various different, but important, stakeholders is vital if we are going to succeed against the cyber criminals and enhance international cybersecurity.”



-Source (PRWeb)








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

India & Britain Enhancing Cooperation in Cyber Security to Reduce Cybercrime

IndiaBritain Enhancing Cooperation in Cyber Security to Reduce Cybercrime

Just a week ago on the sidelines of 3rd Worldwide Cybersecurity Summit, Telecom and IT Minister of India, Kapil Sibal said the Indian Government will invest $200 million in coming 4 years, in order to strengthen their cyber security infrastructure. Now another move has been taken by Indian Govt where India and the United Kingdom have decided to enhance cooperation for reduction of the risk of threats from cyberspace to international security and strengthen bilateral cooperation to tackle cyber crime. At a joint press conference with External Affairs Minister Salman Khurshid, British Foreign Secretary William Hague supported India’s bid for membership in four export control regimes. Britain, Mr. Hague said, also looked “forward to the time when India will have a permanent seat in the UN Security Council.” The two nations also finalized strategies on collaborating on building skills and capacities to tackle threats from cyberspace and to use ICT (information and communication technologies) for the objective of economic and social development. They also held discussions on using existing cooperation between universities and business communities to develop synergy in research and development on cyber issues.
Besides the cyber issues, both sides discussed bilateral, regional and international issues of mutual interest.
Henceforth, India and the UK would conduct their Cyber Dialogue on a bi-annual basis to achieve these objectives, said an official release issued by Indian External Affairs Ministry. 
While talking about India-Bratain cooperation in Cyber Security, we would also like to remind you that in 2011, a Cyber Shield deal Between India & US was made. Also in this year India and Israel have agreed to launch a long-term joint program worth USD 10 million annually to facilitate research on Cyber-Security.


-Source (The Hindu)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

DHS & Public Safety Canada Started Joint Cybersecurity Action Plan

DHS Public Safety Canada Started Joint Cybersecurity Action Plan

A joint venture Cyber Security plan has been announced by US Department of Homeland Security and Canada. According to the official website of Public Safety Canada - PS Canada along with the Department of Homeland Security (DHS) are pursuing a coordinated approach to enhance the resiliency of our cyber infrastructure. The Cybersecurity Action Plan (the Action Plan) between PS and DHS seeks to enhance the cybersecurity of our nations through increased integration of PS' and DHS' respective national cybersecurity activities and improved collaboration with the private sector. This Action Plan represents just one of many important efforts between Canada and the United States to deepen our already strong bilateral cybersecurity cooperation.
As the Internet knows no borders, all countries have a responsibility to prevent, respond to, and recover from cyber disruptions and to make cyberspace safer for all citizens across the globe. Due to a shared physical border, Canada and the United States have an additional mutual interest in partnering to protect our shared infrastructure. This Action Plan aims to articulate a shared approach to fulfill PS' and DHS' vision of working together to defend and protect our use of cyberspace and to strengthen the resiliency of our nations. These efforts, combined, advance the objectives articulated by President Obama and Prime Minister Harper in the February 2011 declaration, Beyond the Border: A Vision for Perimeter Security and Economic Competitiveness.
This Action Plan outlines three goals for improved engagement, collaboration, and information sharing at the operational and strategic levels, with the private sector, and in public awareness activities, for activities conducted by PS and DHS. The Action Plan establishes lines of communication and areas for collaborative work critical to enhancing the cybersecurity preparedness of both nations. The Action Plan's goals and objectives are to be conducted in accordance with the June 2012 Statement of Privacy Principles by the United States and Canada. This Action Plan is intended to remain a living document to be reviewed on a regular basis and updated as needed to support new requirements that align to the Plan's key goals and objectives. It intends to support and inform current and future efforts to advance the goals of Beyond the Border, which ultimately seeks to enhance broad bilateral cooperation on cybersecurity efforts across both governments.

Goals and Objectives:-

1. Enhanced Cyber Incident Management Collaboration between National Cybersecurity Operations Centers

PS' Canadian Cyber Incident Response Centre intends to work jointly with DHS' United States Computer Emergency Readiness Team and Industrial Control Systems Cyber Emergency Response Team towards the following objectives:
  • 1.1 Increase real-time collaboration between analysts by improving existing channels for remote communication and arranging in-person visits;
  • 1.2 Enhance information sharing at all classification levels and collaborate on training opportunities, while promoting inter-agency coordination, as appropriate, as well as the proper protections for information, as outlined in the Statement of Privacy Principles;
  • 1.3 Coordinate on cybersecurity incident response management, relating to defense, mitigation, and remediation activities and products, including with other public and private entities consistent with each country's laws and policies;
  • 1.4 Align and standardize cyber incident management processes and escalation procedures; and
  • 1.5 Enhance technical and operational information sharing in the area of industrial control systems security.

2. Joint Engagement and Information Sharing with the Private Sector on Cybersecurity

Due to the shared nature of critical infrastructure between Canada and the United States, PS and DHS intend to collaborate on cybersecurity-focused private-sector engagement for cybersecurity activities for which they are responsible through the following objectives:
  • 2.1 Share engagement approaches for private sector;
  • 2.2 Exchange and collaborate on the development of briefing materials for the private sector;
  • 2.3 Jointly conduct private sector briefings;
  • 2.4 Review approaches and align processes for private sector engagement through requests for technical assistance and non-disclosure agreements; and
  • 2.5 Standardize protocols for sharing information.

3. Continued Cooperation on Ongoing Cybersecurity Public Awareness Efforts

Cybersecurity is a shared responsibility and everyone, including our citizens, has a role to play. With increased media attention devoted to cybersecurity incidents and with the continuing growth of electronic commerce and social media, it is imperative that citizens receive clear and trustworthy information on how to manage cyber threats to themselves and their families. Ensuring that government's cybersecurity awareness messages are consistent across our border helps to deliver that information effectively and consistently. PS Communications, the DHS Office of Public Affairs, and the National Protection and Program Directorate's Office of Cybersecurity and Communications (CS&C) intend to continue to work together as they:
  • 3.1 Collaborate on public awareness campaigns (websites, social media activities, education material, etc.);
  • 3.2 Collaborate on Cybersecurity Awareness Month (October); and
  • 3.3 Share and coordinate messaging on issues of common interest.

Governance of the Joint Action Plan:-

Senior officials within PS and CS&C intend to review and provide additional guidance in order to update this Action Plan on a quarterly basis. This Action Plan is intended to be a part of broader inter-governmental coordination across government agencies in both the United States and Canada.


To Download The Full Cybersecurity Action Plan Between Public Safety Canada and the Department of Homeland Security Click Here



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

UNESCO World Heritage Centre Hacked By Xception Code

UNESCO World Heritage Centre Hacked By Xception Code

United Nations Educational, Scientific and Cultural Organization widely known as UNESCO faced hacker attack. A young Indian hacker code named 'Xception Code' targeted UNESCO World Heritage Centre, which is one of the sub-domain of UNESCO. Like his earlier attack, this time also he did not deface or infected the website. But definitely the hacker have stolen sensitive information from the website. As per resources Xception Code managed to get access into the UNESCO web-server and exposed credentials like DNS server information, ns records, database information (tables, columns, user names, user id) and so on. In a post in pastebin the hacker made all the stolen information available. But he did not exposed any passwords, though he claimed to have access in several user-id, administrative passwords and even root password. In his message the hacker said - "Hello, Admin ( I Know You Have Multiple Admins,Because I Have Their Password :D Yes , I Have All Information That Contains Root Password / User Accounts / All Mail Ids Used By Unesco & ALl Info. But, I Am Not Releasing Them. This Is Just A Warning For Unesco, To Patch Their Website/Server...." 
With this news, we also like to remind you that in the middle of this year this hacker has hacked another high profile website, that is National Radio Astronomy Observatory (NRAO). That time also he exposed sensitive information. 

  


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Illicit Networks Summit Decided -Google Will Tackle Internet Crime

Illicit Networks Summit Decided -Google Will Tackle Internet Crime
Bad news for those who relies on GHDB also widely known as Google Hacking Database while finding vulnerability. This Tuesday the internet giant Google has launched a new policy  to turn the tables on criminals and terrorists who exploit the internet by using its search capabilities to expose and disrupt illicit activity.  A two-day summit in Los Angeles called Illicit Networks: Forces in Opposition has assembled victims, law enforcers, politicians, academics and technology experts to devise strategies. In their report Guardian says- Google Ideas, the company's thinktank, has teamed up with the Council on Foreign Relations, Interpol and other organizations to look for ways to use technology against organized crime, jihadists and others."Google is in a great position to take these on," Rani Hong, a survivor of child trafficking in India who is now a special adviser to the United Nations, told reporters on the eve of the event. "They're a powerful medium and they have great tools to solve this problem."
Stewart Patrick, a senior fellow at the Council on Foreign Relations who helped organise the event, told "It might sound like a different path for Google, but technology companies today have a lot of powerful tools for bringing transparency to these illicit networks, to fight back against corruption and empower those who are trying to combat transnational crime."
Participants will discuss how illicit surgeons and organ brokers smuggle kidneys and other organs; how whistleblowers can expose narcotics networks; how insurance fraudsters and counterfeiters use evade borders. Another topic will be how recovered human skin and bone is transformed into dental and cosmetic products for plumping up lips or smoothing wrinkles.

 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

United Nations Development Programme (UNDP) Hacked By Over-X

United Nations Development Programme (UNDP) Hacked By Over-X 

Once again United Nations faced cyber attack, this time an hacker code named "Over-X" has hacked into the server of UNDP- United Nations Development Programme and uploaded his page. Still the reason of this hack is unknown, but according to the sources the hacker belongs to some Algerian hackers community. Also there is probability that he might be linked with infamous Anonymous. As expected Over-X have also created a deface mirror and that can be found on Arab-Zone. We would also like to refresh your memory while saying that earlier in 2011 and also in 2102 United Nations faced massive cyber attacks. It was hacker collective TeaMp0isoN with Anonymous who breached the server of United Nation & stolen thousands of  user names and passwords, that operation was dubbed #OpRobinHood. After that La Intrusa (Indian Hacker) hit United Nations Public Administration Network (UNPAN) and uploaded his page. Few months later another hacker named Casi targeted United Nation and dumped the database. If you dig the history you will find more attacks on UN. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Library of Congress (Govt. of United States) Under Cyber-Attack, Database Exposed By BlitzSec

Library of Congress (Govt. of United States) Under Cyber-Attack, Database Exposed By BlitzSec 

Official website of Library of Congress (Govt. of United States) faced cyber attack from a newly formed hacker group named BlitzSec. The hackers have found SQL-i vulnerability on the Library of Congress official site which leads them to gain access on the database and exposed many credentials. In a pastebin relase BlitzSec revealed full database including DB Tables, Columns, User-id, Email, Password, Admin details and so on. 
Earlier this group has found serious security flaws in AOL.com & Ask.com which can even lead to cookie catching attacks.

Press Release of BlitzSec :- 
"Congress this is a message to you, STOP passing laws of tyranny, STOP letting those such as Rothschild and Rockefeller control the government.  Get the printing press out of the hands of the FED and back under the houses of congress!  STOP throwing the Constitution of the United States on the ground and using it as your personal doormat, stand by the Constitution, protect it from those who wish to abolish it which inturn will abolish any and all rights we have.  We are in a police state, you have the power to stop it, you have the power to return us back to what we were before thing such as NDAA and the infamous "Patriot Act". 
You say we are the criminals?  You say we are the terrorists, well ladies and gentle men of congress, I'm sorry to say but you are wrong... Dead wrong, you my friends are the criminals, you my friends are the terrorists.  The Constitution is not just "An outdated piece of paper" as you and the rest of the government think, it is what our country was founded the those principles were what helped form this great nations, and you are destroying it now.  If you do not do something soon, you can take our word, We The People will rise up, We The People will put an end to it and We The People will return this country back to its former greatness..."




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

United Nation Hacked, Vulnerability Exposed & Database Dumped

United Nation Hacked, Vulnerability Exposed & Database Dumped By Casi
United Nations official website again became the victim of cyber attack. Earlier TeaMp0isoN has hacked the United Nation server and stolen more than thousand of user name and passwords. This time another hacker named Casi targeted United Nation. In a press release the hacker has posted many blind SQL-i vulnerable links of UN official site by which any attacker can get get inside the db and create lots of damages. The hacker group also  dumped the database of United Nation. According to the hacker "I fuck actually system... I fighting for Internet Freedom, equiality & rights for all. You're FREEDOM my brothers & my sisters ! <3" The dumped database can be found on a pastebin release by the hacker where they have also claimed that they are fighting for freedom. So it seems that the UN just has bad cyber security. It must be embarrassing for the them to be hacked by such a basic SQL injection attack. Passwords were not exposed, but the real danger lies in what other hackers can do with the information. Still United Nation did not replied about this hack.



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#OpCensorThis- Britain's Second Most Hated NewsPaper DailyMail Hacked By TeaMp0isoN

#OpCensorThis- Britain's Second Most Hated NewsPaper DailyMail Hacked By TeaMp0isoN
Hackers hit DailyMail, Britain's Second Most Hated News Paper. On the 5th of February a sub domain of DailyMail get hacked and defaced. First the news was spread by twitter and the group named TeaMp0isoN took responsibility of the hack. The hacker posted the deface mirror on Zone-h. According to the hackers message this attack was a part of online movement #OpCensorThis
Message By The Hacker On The Deface Page:-
"For years you've poisoned the mainstream media with your sensationalist, ultranationalist nonsense, continuing to inject reader's minds with anti- immigration and borderline racist propaganda..
Your distorted bias on news is wrongly justified by patriotism and conservatism, though we see through your hateful slurs. Your backward, malevolent, hate-inciting news should not be tolerated anymore, stop brainwashing and lying to the British public."
Earlier TeaMp0isoN has worked with Anonymous in many operations among them #OpRobinHood was a remarkable protest where more than 1,000 user names and passwords ware stolen from a United Nations server. TeaMp0isoN also hacked English Defence League (EDL), T-Mobile USA & many more.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#OpRobinHood By TeaMp0isoN & Anonymous, Thousands Of User Data Stolen From United Nations Server


Hacktivist Anonymous is now teamed up with another hacker group named TeaMp0isoN for their latest campaign Operation RobinHood (#OpRobinHood). As a result more than 1,000 usernames and passwords stolen from a United Nations server. TeamPoison and Anonymous posted an announcement while threatening a series of data breaches and robberies against major banks under the name Operation Robin Hood, which the two groups describe as a continuation of the Occupy Movement protests begun in New York two months ago. 
As a way to strike back against "the banks," TeamPoison and Anonymous will take from the rich and give to the poor through some kind of ill-defined credit-card scam, though it's not clear if the credit cards being targeted will belong to "the banks" or whether Anonymous and TeamPoison plan to make fraudulent charges on consumer credit cards that will indirectly punish the banks backing those cards. 
The stolen username and passwords from the United Nations server was openly posted on a pastebin, later it was removed for violence. 

Anonymous & TeaMp0isoN Official Press Release:-

"#OpRobinHood: TeaMp0isoN and Anonymous 
Hello, we are p0isAnon. Anonymous and TeaMp0isoN have joined forces to fight censorship in the name of OpCensorThis. There is a new operation that has been taking place over the actions of Banks in response to the Occupy Movement. We have watched our brothers and sisters being refused their hard earned money by the banks on top of being beaten and brutalized by officers during peaceful demonstrations. Congratulations banks, you have gotten our attention. 
You ignore your customers and use authorities to censor their voices. Operation Censor This will not stand for such acts and is spawning another operation under Operation Cash Back which already removed well over 500,000 accounts from banks and put them into credit unions. This is the next step. Banks have stolen millions from its customers as well as lacked the security to protect them. We give you Operation Robin Hood. 
In regards to the recent demonstrations and protests across the globe, we are going to turn the tables on the banks. Operation Robin Hood is going to return the money to those who have been cheated by our system and most importantly to those hurt by our banks. Operation Robin Hood will take credit cards and donate to the 99% as well as various charities around the globe. The banks will be forced to reimburse the people there money back.
We are going to take what belongs to us. The Banks have thrown people out on the streets with corrupted actions. When the poor steals, it’s considered violence, but when the banks steal from us, it’s called business. 
We have already taken Chase, Bank of America, and CitiBank credit cards with big breaches across the map. We have returned it to the poor (the TRUE 99%) who deserve it. 
We have donated thousands to many protests around the world. We have donated thousands to the homeless and other charities. Our government has fallen short in many ways. It’s time for the people to step up. We are finished depending on our government to do right by us. How safe can the banks be keeping you when we are easily able to steal thousands already. You have the benefit of us being the good guys.
We are not afraid of the Police, Secret Service, or the FBI. We are going to show you banks are not safe and take our money back. We are going to hit the true evil while not harming theirs customers and helping others. We are not only starving the banks but are ready to start the attack. We have come to take the 99% ‘s money back. We are not asking permission. 


Let’s see how Banks like paying out money like they made us do. Is it called stealing when one takes what was theirs in the first place? Is it called stealing elections when banks are funneling our millions into paying off congressmen and lobbyists. It’s time for the banks to pay for their crimes and corruption. We are not waiting for our government to step up and take action. It’s time for the banks to pay for not protecting you and only causing harm. But why feel sorry for them while they make us pay every day? Make us over pay for their services? Make us pay all their little charges? Operation Robin Hood urges YOU, to now move your accounts into secure credit unions, before it’s too late while we hit them from the inside. 
We are going to make the banks deliver your money back to you with a smile on their faces and hate in their heart. The only fraud happening has been the actions of the banks frauding the people. It’s time for the banks to do business with Anonymous and TeaMp0isoN. And one of us is not as harsh as all of us. We are looking forward to start doing business with you pigs. 
How loud will you squeal when the same is being done to you? We will avenge every person banks turned down and stolen from. Join us in Operation Robin Hood. Take from the banks and give to the poor. Our actions will be swift. It’s time for the people to rise up and the banks to remember who they work for. It’s time we fight back. It’s time YOU take back your freedom. We are done asking politely.
Banks, you have got the attention of the Hydra of the internet that has grown fangs of poison. 
The only question now, is do they expect us? 


We are p0isAnon
We are Robin Hood
We are Legion
We do not forgive
We do not forget
Expect us.


Operation Robin Hood… fully initiated."








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#Op-Brotherhood By Anonymous & Threatens to Destroy The Muslim Brotherhood


On-line "hacktivist" group Anonymous has declared Operation Brotherhood and Threatens to "Destroy The Muslim Brotherhood". According to the official you tube video release Anon declared that  to hack Muslim Brotherhood websites, starting with the Arabic Ikhwanonline.com, next November 11, 2011, describing the MB as a threat to the revolution. The video, circulated widely on social media, was titled "Operation Brotherhood Take Down".
Khaled Hamza, CEO of Ikhwan Portal which manages MB websites, stated that the MB technical teams and engineers will deal with the message of "Anonymous" as a serious threat, and will take necessary measures to secure its websites.
Anonymous Official Message  in #Op-Brotherhoods:-
"Citizens of the World,
We are Anonymous.Ever since its revolution that shook the world, Egypt has had its fate undecided. Predators who seek to control are waiting to strike at the right moment. They are waiting to take over the country and make it so that another revolution is impossible. We cannot allow this.
The Muslim Brotherhood has become a threat to the revolution Egyptians had fought for, some with their lives. They seek to destroy the sovereignty of the people of Egypt as well as other nations including the United States. The Muslim Brotherhood started as a benevolent group of people with fair and just intentions. However, as decades went by, corruption seized its mission of good and turned it into a power-hungry organization bent on taking over soverign arab states in its quest to seize power from them. They say this is necessary in order to unify the muslim nations into one islamic state, which is a lie.
We will not allow this to happen.Their tactics are very similar to tactics used by the Church of Scientology and ideas implemented in Freemasonry. A person may join only when presented in front of the Grand Master, or the Murshid, and is ordered to adhere to a solemn vow, to follow all orders of the Murshid, without hesitation. They claim to be anti-freemasonry, however they follow distinct principles taken from it. If you were to leave the Brotherhood or present any threat to it, they would take it to offense and begin to intimidate you and put your life as well as your loved ones in danger. This has been experienced by many former followers of the Brotherhood, including citizens in the United States and Great Britain who realized they made a terrible mistake. The Muslim Brotherhood is a threat that must be dealt with.To those listening now, this is not a threat towards the religion of Islam. The Muslim Brotherhood, as well as terrorist organizations affiliating with the religion, defiled and destroyed the very essence of what the religion preaches. Therefore, the Muslim Brotherhood does not represent the true ideas of Islam. In our collective, many of us are Muslim, yet we fight against the corruption in society and the injustice that comes with it.
Infused with its blatant, corrupt ways, the Brotherhood is now a threat to the people. Therefore, Anonymous has decided to destroy the Muslim Brotherhood. We shall proceed to dismantle any form of its organization from the internet. Nothing will stop us. We will show no mercy.

Operation Brotherhood Takedown, engaged.We are Anonymous.

We are Legion.

We do not Forgive.

We do not Forget.

Expect Us."

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Hackers Shut Down The Entire Internet Service Provider's (ISP) Network In Palestinian


Internet service is completely cut off in Gaza Tuesday and partially shut down in the West Bank after an attack on the main Internet provider to the Palestinian territories, according to a minister with the Palestinian Authority.
"This is a very serious and vicious attack," Dr. Mashour Abu-Daqqa, the minister of Communications and Information Technology, told Media. The attack, which affected most of the Palestinian Internet communication network, also targeted domain addresses, said Abu-Daqqa. The minister said hackers are using international IP servers originating in Germany, China, and Slovenia to send millions of attacks in the form of viruses to penetrate and disrupt the Internet communications. There is no word on who, exactly, is behind the attacks.
"It does not mean the attackers are from there, it is only the origin of these virus attacks using these international servers and other international country servers," Abu-Daqqa said. Officials have not ruled out the possibility that the attack could be related to Monday's decision by the United Nations education and science agency, UNESCO, to accept a Palestinian bid for full membership in the organization. The move prompted the United States to withhold funding from UNESCO.
Abu-Daqqa said the hacking "is not the act of an individual or group" but possibly a "state-sponsored attack" intended to paralyze Internet communications in the Palestinian territories. Efforts to restore Internet service continue, the minister said.


-News Source (CNN)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

United Nations Public Administration Network (UNPAN) Hacked By La Intrusa


The official website is of United Nations Public Administration Network (UNPAN) is vulnerable to DNN.  La Intrusa (Indian Hacker) find this vulnerability. Using that flaws he uploaded his .txt file on the webserver of UNPAN and defaced the site.

Hacked Site:-
http://www.unpan.org/Portals/0/god.txt
Mirror Link:-
http://www.zone-hack.com/defacements/?id=1719



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

The First Cyberspace Strategy By U.S. Defense


Cyberspace is a defining feature of modern life. Individuals and communities worldwide connect, socialize, and organize themselves in and through cyberspace. From 2000 to 2010, global Internet usage increased from 360 million to over 2 billion people. As Internet usage continues to expand, cyberspace will become increasingly woven into the fabric of everyday life across the globe. 
U.S. and international businesses trade goods and services in cyberspace, moving assets across the globe in seconds. In addition to facilitating trade in other sectors, cyberspace is itself a key sector of the global economy. Cyberspace has become an incubator for new forms of entrepreneurship, advances in technology, the spread of free speech, and new social networks that drive our economy and reflect our principles. The security and effective operation of U.S. critical infrastructure – including energy, banking and finance, transportation, communication, and the Defense Industrial Base – rely on cyberspace, industrial control systems, and information technology that may be vulnerable to disruption or exploitation. 
Along with the rest of the U.S. government, the Department of Defense (DoD) depends on cyberspace to function. It is difficult to overstate this reliance; DoD operates over 15,000 networks and seven million computing devices across hundreds of installations in dozens of countries around the globe. DoD uses cyberspace to enable its military, intelligence, and business operations, including the movement of personnel and material and the command and control of the full spectrum of military operations. 
The Department and the nation have vulnerabilities in cyberspace. Our reliance on cyberspace stands in stark contrast to the inadequacy of our cybersecurity – the security of the technologies that we use each day. Moreover, the continuing growth of networked systems, devices, and platforms means that cyberspace is embedded into an increasing number of capabilities upon which DoD relies to complete its mission. Today, many foreign nations are working to exploit DoD unclassified and classified networks, and some foreign intelligence organizations have already acquired the capacity to disrupt elements of DoD’s information infrastructure. 
Moreover, non-state actors increasingly threaten to penetrate and disrupt DoD networks and systems. We recognize that there may be malicious activities on DoD networks and systems that we have not yet detected. 

DoD, working with its interagency and international partners, seeks to mitigate the risks posed to U.S. and allied cyberspace capabilities, while protecting and respecting the principles of privacy and civil liberties, free expression, and innovation that have made cyberspace an integral part of U.S. prosperity and security. How the Department leverages the opportunities of cyberspace, while managing inherent uncertainties and reducing vulnerabilities, will significantly impact U.S. defensive readiness and national security for years to come. 

DOD’S STRENGTHS AND OPPORTUNITIES IN CYBERSPACE:-

As does the nation as a whole, DoD relies on a secure and reliable cyberspace that protects fundamental freedoms, privacy, and the free flow of information. In support of both U.S. core commitments and national security, DoD has significant strengths and opportunities in cyberspace. The U.S. military’s ability to use cyberspace for rapid communication and information sharing in support of operations is a critical enabler of DoD missions. More broadly, DoD’s depth of knowledge in the global information and communications technology sector, including its cybersecurity expertise, provides the Department with strategic advantages in cyberspace. 
The quality of the United States’ human capital and knowledge base in both the public and private sectors provides DoD with a strong foundation on which to build current and future cyber capabilities. DoD has played a crucial role in building and leveraging the technological prowess of the U.S. private sector through investments in people, research, and technology. DoD will continue to embrace this spirit of entrepreneurship and work in partnership with these communities and institutions to succeed in its future cyberspace activities. 
Given the dynamism of cyberspace, nations must work together to defend their common interests and promote security. DoD’s relationship with U.S. allies and international partners provides a strong foundation upon which to further U.S. international cyberspace cooperation. Continued international engagement, collective self-defense, and the establishment of international cyberspace norms will also serve to strengthen cyberspace for the benefit of all. 

CYBER THREATS:-

The Internet was designed to be collaborative, rapidly expandable, and easily adaptable to technological innovation. Information flow took precedence over content integrity; identity authentication was less important than connectivity. The Internet’s original designers could not have imagined the extent of its vital and growing role for DoD and its operations. The global scope of DoD networks and systems presents adversaries with broad opportunities for exploitation and attack. 
Low barriers to entry for malicious cyber activity, including the widespread availability of hacking tools, mean that an individual or small group of determined cyber actors can potentially cause significant damage to both DoD and U.S. national and economic security. Small-scale technologies can have an impact disproportionate to their size; potential adversaries do not have to build expensive weapons systems to pose a significant threat to U.S. national security.
In developing its strategy for operating in cyberspace, DoD is focused on a number of central aspects of the cyber threat; these include external threat actors, insider threats, supply chain vulnerabilities, and threats to DoD‘s operational ability. DoD must address vulnerabilities and the concerted efforts of both state and non-state actors to gain unauthorized access to its networks and systems. 
Foreign cyberspace operations against U.S. public and private sector systems are increasing in number and sophistication. DoD networks are probed millions of times every day, and successful penetrations have led to the loss of thousands of files from U.S. networks and those of U.S. allies and industry partners. Moreover, this threat continues to evolve as evidence grows of adversaries focusing on the development of increasingly sophisticated and potentially dangerous capabilities. 
The potential for small groups to have an asymmetric impact in cyberspace creates very real incentives for malicious activity. Beyond formal governmental activities, cyber criminals can control botnets with millions of infected hosts. The tools and techniques developed by cyber criminals are increasing in sophistication at an incredible rate, and many of these capabilities can be purchased cheaply on the Internet. Whether the goal is monetary, access to intellectual property, or the disruption of critical DoD systems, the rapidly evolving threat landscape presents a complex and vital challenge for national and economic security. 

Some cyber threats also may come from insiders. Malicious insiders may exploit their access at the behest of foreign governments, terrorist groups, criminal elements, unscrupulous associates, or on their own initiative. Whether malicious insiders are committing espionage, making a political statement, or expressing personal disgruntlement, the consequences for DoD, and national security, can be devastating. 
Software and hardware are at risk of malicious tampering even before they are integrated into an operational system. The majority of information technology products used in the United States are manufactured and assembled overseas. The reliance of DoD on foreign manufacturing and development creates challenges in managing risk at points of design, manufacture, service, distribution, and disposal. 
Potential U.S. adversaries may seek to exploit, disrupt, deny, and degrade the networks and systems that DoD depends on for its operations. DoD is particularly concerned with three areas of potential adversarial activity: theft or exploitation of data; disruption or denial of access or service that affects the availability of networks, information, or network-enabled resources; and destructive action including corruption, manipulation, or direct activity that threatens to destroy or degrade networks or connected systems. 

Cyber threats to U.S. national security go well beyond military targets and affect all aspects of society. Hackers and foreign governments are increasingly able to launch sophisticated intrusions into the networks and systems that control critical civilian infrastructure. Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations—both at home and abroad—are dependent on this critical infrastructure. 
While the threat to intellectual property is often less visible than the threat to critical infrastructure, it may be the most pervasive cyber threat today. Every year, an amount of intellectual property larger than that contained in the Library of Congress is stolen from networks maintained by U.S. businesses, universities, and government departments and agencies. As military strength ultimately depends on economic vitality, sustained intellectual property losses erode both U.S. military effectiveness and national competitiveness in the global economy. 

CONCLUSION:-


National security is being redefined by cyberspace. In addition to opportunities, DoD faces significant cyberspace challenges. The Department’s military, intelligence, and business operations all depend upon cyberspace for mission success. The “Department of Defense Strategy for Operating in Cyberspace” assesses these challenges and opportunities and sets a strategic approach for DoD’s cyber mission. 
The Department’s five strategic initiatives offer a roadmap for DoD to operate effectively in cyberspace, defend national interests, and achieve national security objectives. Each initiative is distinct, yet necessarily connected with the other four. Across the strategy, activities undertaken in one initiative will contribute to DoD’s strategic thinking and lead to new approaches in the others.
By pursuing the activities in this strategy, DoD will capitalize on the opportunities afforded to the Department by cyberspace; defend DoD networks and systems against intrusions and malicious activity; support efforts to strengthen cybersecurity for interagency, international, and critical industry partners; and develop robust cyberspace capabilities and partnerships. This strategy will guide the Department’s defense of U.S. interests in cyberspace so that the United States and its allies and partners may continue to benefit from the innovations of the information age.

To read the full Department of Defense Strategy for Operating in Cyberspace Click HERE




-News Source (Defence Professionals)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...