Another successful run of the Cyber warfare exercise

Standard

US CYBERCOMMANDAs part of the Harvard Kennedy School’s Executive Education program on Cybersecurity: The Intersection of Policy and Technology, we ran the cybersecurity warfare scenario that we have used for many years now.  As usual it seemed to be a blast for both participants and organizers.  The original gang was back with professor Jim Waldo leading the charge.  I also had a couple of folks from the Harvard Info Sec team join the fun.

Incidentally, I today I received a patch for the U.S Cyber Command (USCYBERCOM) with an MD5 hash on it: 9ec4c12949a4f31474f299058ce2b22a

It is the hash for the mission statement of USCYBERCOM:

USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

Advertisements

2012 in review

Standard

The WordPress.com stats helper monkeys prepared a 2012 annual report for this blog.

Here’s an excerpt:

600 people reached the top of Mt. Everest in 2012. This blog got about 4,600 views in 2012. If every person who reached the top of Mt. Everest viewed this blog, it would have taken 8 years to get that many views.

Click here to see the complete report.