Pakistanis angry over detentions in Times Sq. case Monday, May 24, 2010
ISLAMABAD – Relatives of three men detained by Pakistan for alleged links to the suspect in the attempted Times Square bombing say the men are innocent.
They
AFP - Thursday, August 6TAIPEI (AFP) - - Taiwan's Beijing-friendly government on Wednesday denied boycotting an Australian film festival amid a row over the e
BERLIN (Reuters) - Chancellor Angela Merkel suffered a double blow on Thursday as a senior party ally in east German
Minister seeks closure of anti-Berlusconi websites Wednesday, December 16, 2009
ROME (AFP) - – The Italian government moved Tuesday to close down Internet sites encouraging further violence against Prime Minister Silvio Berlusconi, who
By ELAINE KURTENBACH,AP Business Writer AP - Wednesday, March 18SHANGHAI - Asia's stock market rally seemed to be running out of steam Wednesday, despite an
Edition:
U.S.
Africa
Arabic
Argentina
Brazil
Canada
China
France
Germany
India
Italy
Japan
Latin America
Mexico
Russia
Spain
United Kingdom
Home
Business
Business Home
Economy
Technology
Media
Small Business
Legal
Deals
Earnings
Social Pulse
Business Video
The Freeland File
Markets
Markets Home
U.S. Markets
European Markets
Asian Markets
Global Market Data
Indices
M&A
Stocks
Bonds
Currencies
Commodities
Futures
Funds
peHUB
World
World Home
U.S.
Brazil
China
Euro Zone
Japan
Mexico
Russia
India Insight
World Video
Reuters Investigates
Decoder
Politics
Politics Home
Election 2012
Issues 2012
Candidates 2012
Tales from the Trail
Political Punchlines
Supreme Court
Politics Video
Tech
Technology Home
MediaFile
Science
Tech Video
Tech Tonic
Social Pulse
Opinion
Opinion Home
Chrystia Freeland
John Lloyd
Felix Salmon
Jack Shafer
David Rohde
Bernd Debusmann
Nader Mousavizadeh
Lucy P. Marcus
David Cay Johnston
Bethany McLean
Edward Hadas
Hugo Dixon
Ian Bremmer
Lawrence Summers
Susan Glasser
The Great Debate
Steven Brill
Jack & Suzy Welch
Frederick Kempe
Christopher Papagianis
Breakingviews
Equities
Credit
Private Equity
M&A
Macro & Markets
Politics
Breakingviews Video
Money
Money Home
Tax Break
Lipper Awards 2012
Global Investing
MuniLand
Unstructured Finance
Linda Stern
Mark Miller
John Wasik
James Saft
Analyst Research
Alerts
Watchlist
Portfolio
Stock Screener
Fund Screener
Personal Finance Video
Money Clip
Investing 201
Life
Health
Sports
Arts
Faithworld
Business Traveler
Entertainment
Oddly Enough
Lifestyle Video
Pictures
Pictures Home
Reuters Photographers
Full Focus
Video
Reuters TV
Reuters News
Article
Comments (1)
Editor's Choice
SpaceX rocket lifts off to space
The SpaceX Falcon 9 rockets blasts off for a trial run to the International Space Station. Video | Full Article
Pollution-hunting robot fish take to the sea
FDA staff shoot down Pfizer rare disease drug
Dinosaur skeleton fetches $1.05 million
Silicon Valley takes Facebook fizzle in stride
Follow Reuters
Facebook
Twitter
RSS
YouTube
Read
Jessica's got to connect to win, says "Idol" mentor Iovine
21 May 2012
Insight - Morgan Stanley cut Facebook estimates just before IPO
|
5:38pm EDT
Bloomsbury profits boosted by e-book boom
4:49am EDT
SEC, FINRA to review Facebook issues, Nasdaq sued
|
5:44pm EDT
McDonald's Vandalized: Onions on Burgers Send TN Men on McRampage
21 May 2012
Discussed
170
Iran attack decision nears, Israeli elite locks down
148
Exclusive: U.S. lets China bypass Wall Street for Treasury orders
118
Obama presses ailing Europe to focus on growth
Watched
A look at the UK’s most beautiful face
Thu, May 10 2012
Apple plans fatter iPhone 5 to choke market-hungry Samsung
Thu, May 17 2012
Obama raises concerns about al Qaeda in Yemen
Mon, May 21 2012
Pictures
Reuters Photojournalism
Our day's top images, in-depth photo essays and offbeat slices of life. See the best of Reuters photography. See more | Photo caption
Olympic torch relay
A look at the relay for the Olympic torch as it makes its way from Greece to England. Slideshow
SpaceX lifts off
A privately owned unmanned rocket blasted off on a mission to be the first commercial flight to the International Space Station. Slideshow
Exclusive: Spy agency seeks cyber-ops curriculum
Tweet
Share this
Email
Print
Related News
Obama dangles $400 million to spur school change
12:54pm EDT
Tech, tactics ramp up pressure on militant groups
Tue, May 8 2012
Analysis & Opinion
Compliance officers face multiple options for credentials
Student debt could hobble the economy
Related Topics
U.S. »
Tech »
Media »
Cyber Crime »
A view from helicopter of the National Security Agency at Ft. Meade, Maryland, January 29, 2010.
Credit: Reuters/Larry Downing
By Tabassum Zakaria
FORT MEADE, Maryland |
Tue May 22, 2012 4:42pm EDT
FORT MEADE, Maryland (Reuters) - The National Security Agency is trying to expand U.S. cyber expertise needed for secret intelligence operations against adversaries on computer networks through a new cyber-ops program at selected universities.
The cyber-ops curriculum is geared to providing the basic education for jobs in intelligence, military and law enforcement that are so secret they will only be revealed to some students and faculty, who need to pass security clearance requirements, during special summer seminars offered by NSA.
It is not easy to find the right people for cyber operations because the slice of the hacker community that would make a quality cyber operator inside the government is only a sliver.
The "quality cyber operators" the NSA is looking for are few and far between, says Neal Ziring, technical director at the agency's Information Assurance Directorate.
"We're trying to create more of these, and yes they have to know some of the things that hackers know, they have to know a lot of other things too, which is why you really want a good university to create these people for you," Ziring told Reuters in an interview at NSA's headquarters in Maryland.
NSA has two main missions: to protect U.S. government computer networks and to collect foreign intelligence through electronic means like satellites and decode it.
Of 20 universities that applied, only four received this week the new designation of Centers of Academic Excellence in Cyber Operations: Dakota State University, Naval Postgraduate School, Northeastern University and University of Tulsa.
Out of 10 requirements, the two most lacking at many schools were courses on "reverse engineering" - or how to gain knowledge of a technology or product to reproduce it - and cellular communications and mobile technologies, NSA officials said.
"We found a lot of schools weren't emerging with the technology, weren't keeping up," said Captain Jill Newton, who leads NSA's cyber training and education programs.
INNER WORKINGS
NSA officials say the program, which is part of President Barack Obama's national initiative to improve cybersecurity through education, aims to prepare students for careers at the U.S. Cyber Command, the NSA's signals intelligence operations and law enforcement agencies investigating cyber crimes.
U.S. officials from the Obama administration and Congress have been banging the drums loudly about the need for greater cybersecurity, accusing China and Russia of hacking U.S. systems for economic gain.
"Right now you hear a lot of talk about foreign countries, China in particular, coming into our networks. They get in, they look around, they see what they might want, they send it home, and you don't know what else they've left behind," Dickie George, a former NSA official, said. "Why wouldn't we want to do the same thing? It's not a one-way game."
Many universities are now focused on web technologies such as how to write applications for the iPhone, which is not what is required for cyber operations to collect intelligence or defend the government's systems, NSA officials said.
That requires knowing "the guts, the internals of the operating systems, having to understand how the hardware actually works," said Steven LaFountain, a senior NSA official who guides academic programs.
Newton said a cyber operation might involve altering computer systems to work to one's advantage and doing that "without being seen or without it being obvious that I was changing the inner workings of the operating system."
"It could be very useful for a defender, so as you see your stuff being adjusted, corrupted, exploited, messed with, and being able to recognize when that is happening to you, to be able to better defend against it," she said.
About 15 years ago, there was a mindset that the computer system being compromised happened rarely and if the security was hardened that would be sufficient to secure it, but the security environment has changed, said Ziring, a computer scientist and the first non-mathematician in his position at NSA.
"What we've realized these days is that's hokum, that doesn't work any more, that systems are under attack constantly," Ziring said.
"For many systems, especially those that for mission reasons have to work in a very exposed space, being under some degree of compromise is sort of their new normal state."
That requires actively defending the systems by blocking and mitigating known problems and hunting for the unknown by looking for anomalies, Ziring said.
ETHICAL ISSUES
One mandatory requirement in the curriculum is covering legal and ethical issues so students understand the limits.
"We still found a lot of schools are still a little reluctant on how they characterize what they are teaching," LaFountain said.
"We are not asking them to teach kids how to break into systems, we're not asking them to teach that. And a lot of them have said they wouldn't teach that," he said. "We're just asking them to teach the hardcore fundamental science that we need students to have when they come to work here."
While the open education provides the basic knowledge, it is not until they arrive at the NSA that newly hired cyber operators get trained in their secret jobs.
"In our operational developmental organization, we would spend up to 12 months to give them the secret sauce, the tradecraft, the really deep technical training so that they could make themselves useful in doing what we need them to do, and that's with that technical underpinning," Newton said.
Ziring said it was important to figure out the next step in threat evolution so the technologies can be built to address it.
"The threat actor's action cycle is speeding up and getting shorter. The defender's cycle has to get shorter. So what technologies can we build that will help that?"
(Editing by Anthony Boadle)
U.S.
Tech
Media
Cyber Crime
Tweet this
Link this
Share this
Digg this
Email
Reprints
We welcome comments that advance the story through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can flag it to our editors by using the report abuse links. Views expressed in the comments do not represent those of Reuters. For more information on our comment policy, see http://blogs.reuters.com/fulldisclosure/2010/09/27/toward-a-more-thoughtful-conversation-on-stories/
Comments (1)
Bob9999 wrote:
Edition:
U.S.
Africa
Arabic
Argentina
Brazil
Canada
China
France
Germany
India
Italy
Japan
Latin America
Mexico
Russia
Spain
United Kingdom
Back to top
Reuters.com
Business
Markets
World
Politics
Technology
Opinion
Money
Pictures
Videos
Site Index
Legal
Bankruptcy Law
California Legal
New York Legal
Securities Law
Support & Contact
Support
Corrections
Connect with Reuters
Twitter
Facebook
LinkedIn
RSS
Podcast
Newsletters
Mobile
About
Privacy Policy
Terms of Use
AdChoices
Copyright
Our Flagship financial information platform incorporating Reuters Insider
An ultra-low latency infrastructure for electronic trading and data distribution
A connected approach to governance, risk and compliance
Our next generation legal research platform
Our global tax workstation
Thomsonreuters.com
About Thomson Reuters
Investor Relations
Careers
Contact Us
Thomson Reuters is the world's largest international multimedia news agency, providing investing news, world news, business news, technology news, headline news, small business news, news alerts, personal finance, stock market, and mutual funds information available on Reuters.com, video, mobile, and interactive television platforms. Thomson Reuters journalists are subject to an Editorial Handbook which requires fair presentation and disclosure of relevant interests.
NYSE and AMEX quotes delayed by at least 20 minutes. Nasdaq delayed by at least 15 minutes. For a complete list of exchanges and delays, please click here.