Subscribe free to our newsletters via your
. Farming News .




CYBER WARS
IS jihadists out of reach in online 'dark space': FBI
by Staff Writers
Washington (AFP) June 3, 2015


Raytheon opens new cyber facility
Dulles, Va. (UPI) Jun 3, 2015 - A cybersecurity research, testing and demonstration center has been opened near Washington, D.C., by Raytheon.

The Global Cyber Solutions Center, or GCSC, is located in Sterling, Va., and will enable U.S. government agencies, other nations and major global companies to understand how to best protect their networks and apply the latest cyber-technologies and approaches to their existing cybersecurity programs.

"The GCSC creates a unique environment for our customers to understand and experience comprehensive cybersecurity solutions that address the increased threats associated with the Internet of Things, the rapidly rising use of mobile devices, and ever more reliance on cloud computing," said David Wajsgras, president of Raytheon Intelligence, Information and Services. "This new center is important part of the company's strategy to support our customers and expand our global cyber-security business."

Raytheon has been growing its cyber-solutions business and earlier this year brought its Cyber Innovation Center online in Britain, expanding the use of its Cyber Operations, Development and Evaluation Center.

The CODE Center is an advanced cyber range based in Northern Virginia. It evaluates systems and hardware and emulates networked environments, including those used for critical infrastructure and in security operations centers.

"Today's organizations must defend their operations from ever-evolving cyber threats that can come from anywhere in the world," said Wajsgras. "Raytheon's global cyber network gives organizations access to the latest cyber-technology, world-renowned experts and innovative solutions so they can more effectively identify and address risks, including the use of actionable intelligence and training."

The FBI warned lawmakers Wednesday there was no way to monitor encrypted online communications among Islamic State sympathizers and called for new laws to require technology firms to unlock any secret messages among jihadists.

The IS group often moves sensitive online conversations about possible attacks to an encrypted "dark space" beyond the reach of US law enforcement's surveillance methods, said Michael Steinbach, assistant director of the FBI's counter-terrorism division.

Encrypted communications has "afforded a free zone by which to recruit, radicalize, plot and plan," Steinbach told the House Homeland Security Committee.

He said the situation ws "troubling" and acknowledged law enforcement agencies did not know the volume of the hidden online messages.

"We're past going dark in certain instances. We are dark," Steinbach said.

Michael McCaul, chairman of the committee, called the problem a "tremendous threat to our homeland."

The senior FBI official urged Congress to grant new authorities to law enforcement agencies that would allow them access to encrypted online communications, either stored messages in an archive or messages in real-time.

"We suggest and we are imploring Congress to help us seek legal remedies towards that," Steinbach said.

And the government is also "asking companies to help provide technological solutions" to address the threat, he added.

Civil liberties groups oppose such proposed measures but Steinbach insisted privacy rights would not be endangered by the approach.

"We're not talking about large scale surveillance techniques," Steinbach said.

US authorities would still have to seek permission from a court and prove that its request for surveillance was justified, he said.

His comments came at a hearing titled "Terrorism Gone Viral" that focused on the implications of an attack in Garland, Texas last month in which gunmen inspired by the IS group's social media tried to storm an event featuring caricatures of the Prophet Mohammed.

"This event highlights the growing threat our nation faces from a new generation of terrorists, often operating from afar, who use social media to find like-minded associates within our borders who can be motivated to violence, attacking with little or no warning," John Mulligan, deputy director of the National Counter-Terrorism Center, told lawmakers.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
New privacy app takes a page from NSA technology
Washington (AFP) June 1, 2015
Before the National Security Agency began complaining about being shut out of encrypted devices, it helped develop software for secure communications that could be adapted by the private sector. That technology is hitting the public this month in the form of a smartphone application called Scrambl3 from a California startup which claims its "dark Internet tunnel" thwarts snooping on voice ca ... read more


CYBER WARS
NASA Soil Moisture Mission Begins Science Operations

In the Field: SMAP Gathers Soil Data in Australia

Mischief makers prompt Google to halt public map edits

Space technology identifies vulnerable regions in West Africa

CYBER WARS
GLONASS to Go on Stream in 2015

Satellites make a load of difference to bridge safety

Advanced Navigation Releases Interface and Logging Unit

Raytheon delivers hardware for next-gen USAF GPS system

CYBER WARS
Location matters in the lowland Amazon

Fertilization regimen reduces environmental impact of landscape palms

Researchers solve puzzle as to how forests can effect our climate

British designer growing trees into furniture

CYBER WARS
Dutch 'paddy power' pulls electricity from rice fields

BESC, Mascoma develop revolutionary microbe for biofuel production

Food or fuel? How about both?

A model for bioenergy feedstock/vegetable double-cropping systems

CYBER WARS
IEA frets over renewable energy direction

Bad weather splits Solar Impulse team between Japan and China

Rooftop PV installations to lead the way in the large-scale solar market

Pinholes be gone say Japanese solarcell researchers

CYBER WARS
AWS Truepower Releases Windographer 4

Duke and Austin Energy complete Los Vientos III wind power project

Tri Global Energy Leads Texas in Wind Energy Development Projects

Pattern Development starts Amazon wind farm project in Indiana

CYBER WARS
Merkel under pressure on coal ahead of G7 climate push

21 dead in China coal mine flood: official

India's Adani dismisses banks' Australia coal project snub

China coal mining deaths down in 2014: official

CYBER WARS
China's miniature homemakers cut down to size

Far from the madding crowd: China's rich seek own islands

China's new tech giants show old bias with porn stars

Who you gonna call? Beijing smokebusters to go on patrol




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.