Subscribe free to our newsletters via your




CYBER WARS
IS jihadists out of reach in online 'dark space': FBI
by Staff Writers
Washington (AFP) June 3, 2015


Raytheon opens new cyber facility
Dulles, Va. (UPI) Jun 3, 2015 - A cybersecurity research, testing and demonstration center has been opened near Washington, D.C., by Raytheon.

The Global Cyber Solutions Center, or GCSC, is located in Sterling, Va., and will enable U.S. government agencies, other nations and major global companies to understand how to best protect their networks and apply the latest cyber-technologies and approaches to their existing cybersecurity programs.

"The GCSC creates a unique environment for our customers to understand and experience comprehensive cybersecurity solutions that address the increased threats associated with the Internet of Things, the rapidly rising use of mobile devices, and ever more reliance on cloud computing," said David Wajsgras, president of Raytheon Intelligence, Information and Services. "This new center is important part of the company's strategy to support our customers and expand our global cyber-security business."

Raytheon has been growing its cyber-solutions business and earlier this year brought its Cyber Innovation Center online in Britain, expanding the use of its Cyber Operations, Development and Evaluation Center.

The CODE Center is an advanced cyber range based in Northern Virginia. It evaluates systems and hardware and emulates networked environments, including those used for critical infrastructure and in security operations centers.

"Today's organizations must defend their operations from ever-evolving cyber threats that can come from anywhere in the world," said Wajsgras. "Raytheon's global cyber network gives organizations access to the latest cyber-technology, world-renowned experts and innovative solutions so they can more effectively identify and address risks, including the use of actionable intelligence and training."

The FBI warned lawmakers Wednesday there was no way to monitor encrypted online communications among Islamic State sympathizers and called for new laws to require technology firms to unlock any secret messages among jihadists.

The IS group often moves sensitive online conversations about possible attacks to an encrypted "dark space" beyond the reach of US law enforcement's surveillance methods, said Michael Steinbach, assistant director of the FBI's counter-terrorism division.

Encrypted communications has "afforded a free zone by which to recruit, radicalize, plot and plan," Steinbach told the House Homeland Security Committee.

He said the situation ws "troubling" and acknowledged law enforcement agencies did not know the volume of the hidden online messages.

"We're past going dark in certain instances. We are dark," Steinbach said.

Michael McCaul, chairman of the committee, called the problem a "tremendous threat to our homeland."

The senior FBI official urged Congress to grant new authorities to law enforcement agencies that would allow them access to encrypted online communications, either stored messages in an archive or messages in real-time.

"We suggest and we are imploring Congress to help us seek legal remedies towards that," Steinbach said.

And the government is also "asking companies to help provide technological solutions" to address the threat, he added.

Civil liberties groups oppose such proposed measures but Steinbach insisted privacy rights would not be endangered by the approach.

"We're not talking about large scale surveillance techniques," Steinbach said.

US authorities would still have to seek permission from a court and prove that its request for surveillance was justified, he said.

His comments came at a hearing titled "Terrorism Gone Viral" that focused on the implications of an attack in Garland, Texas last month in which gunmen inspired by the IS group's social media tried to storm an event featuring caricatures of the Prophet Mohammed.

"This event highlights the growing threat our nation faces from a new generation of terrorists, often operating from afar, who use social media to find like-minded associates within our borders who can be motivated to violence, attacking with little or no warning," John Mulligan, deputy director of the National Counter-Terrorism Center, told lawmakers.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
New privacy app takes a page from NSA technology
Washington (AFP) June 1, 2015
Before the National Security Agency began complaining about being shut out of encrypted devices, it helped develop software for secure communications that could be adapted by the private sector. That technology is hitting the public this month in the form of a smartphone application called Scrambl3 from a California startup which claims its "dark Internet tunnel" thwarts snooping on voice ca ... read more


CYBER WARS
Angry China families demand access to boat disaster

Rescuers race against clock to find survivors of China ship

MH370 search will not be expanded further: Australia

Rescuers cut Chinese ship's hull in search for survivors

CYBER WARS
GLONASS to Go on Stream in 2015

Satellites make a load of difference to bridge safety

Advanced Navigation Releases Interface and Logging Unit

Raytheon delivers hardware for next-gen USAF GPS system

CYBER WARS
Greenery on city rooftops can boost concentration levels

New human ancestor species from Ethiopia lived alongside Lucy's species

Lethal wounds on skull may indicate 430,000-year-old murder

The Bronze Age Egtved Girl was not from Denmark

CYBER WARS
Birds 'weigh' peanuts and choose heavier ones

Study tackles evolution mystery of animal, plant warning cues for survival

Genetic maps help conservation managers maintain healthy bears

Tanzania elephants suffer 'catastrophic decline'

CYBER WARS
US military confirms more anthrax blunders

Live anthrax sent to Australia: US officials

Why you need one vaccine for measles and many for the flu

Total of 77 people had contact with MERS patient: China

CYBER WARS
China's miniature homemakers cut down to size

Far from the madding crowd: China's rich seek own islands

China's new tech giants show old bias with porn stars

Who you gonna call? Beijing smokebusters to go on patrol

CYBER WARS
Polish bootcamp trains security contractors for mission impossible

A blast and gunfire: Mexico's chopper battle

CYBER WARS
China manufacturing index at six-month high but strains remain

Bernanke blames Congress as China flexes economic muscles

China bottle maker declares default on $100 mn bonds

Taiwan lowers growth forecast in face of rival China




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.