Page 2,136«..1020..2,1352,1362,1372,138..2,1502,160..»

Colleges paying ransom only get 60% of data back. Here’s how to protect it. | – University Business

Cyber attacks are becoming more prevalent and more costly, but smart institutions can power through them.

A new report from internet security provider Sophos shows that institutions of higher education not only were hit by cyber attacks often in 2021, but they also paid out hefty sums in ransom and still didnt get back all the data they lost when it was stolen.

In its State of Ransomware 2022 study done of more than 5,500 organizations and sectors worldwide, colleges and universities that decided to pay hackers after breaches occurred only recovered about 60% of their precious information. Less than 5% got it all back. Across higher education, two-thirds that took part in the survey (100 to 5,000 employees) were hit by at least one ransomware attack in the previous year, up nearly 30% from 2020. The majority of hits were done using data encryption rather than simply holding the data hostage.

While two-thirds said they use some forms of backups, half of all institutions still paid to try to get data back. Although Sophos did not break down the payouts by sector, the average cost of ransomware recovery was a little more than $2 million. Cyber insurance has helped institutions, covering 100% of the payments and a lot of the clean-up costs, but only about a third paid out the ransom.

The survey shows that the proportion of victims paying up continues to increase, even when they may have other options available, said Chester Wisniewski, principal research scientist at Sophos. There could be several reasons, including incomplete backups or the desire to prevent stolen data from appearing on a public leak site. In the aftermath of a ransomware attack, there is often intense pressure to get back up and running as soon as possible.

Wisniewski said institutions try to take the easier, more expensive way out and pay hackers for a key that will decrypt their data, rather than go through the painstaking process of restoring information via backups. Not knowing what data has been breached is a major concernfrom research to passwordsso they are more likely to just pay to mitigate the damage. Even then, there could be more to come if they arent careful. If organizations dont thoroughly clean up the recovered data, theyll end up with all that potentially toxic material in their network and potentially exposed to a repeat attack, Wisniewski said.

So what is the best strategy for colleges and universities, which may be hit with attacks at any time and may still have to pay out in the future? Having a second set of information is vital. Higher education cant rely solely on a pay the ransom to recover approach to ransomware, Christopher Budd,senior manager of threat research at Sophos told University Business, highlighting that institutions dont get all of it back anyway. Fortunately, our survey shows that while 50% of respondents paid ransom to recover, 70% used backups to recover. That means in this overlap of the two tactics, higher education organizations can be better placed for faster and fuller recovery when they follow a robust backup strategy.

More from UB: Is cybersecurity insurance worth the investment?

Yet, because of the sheer volume of data and departments and the nature of institutions to be siloed, colleges and universities have many more challenges than the average business.

The survey shows that higher education remains one of the slowest industries to recover, where around 2 in 5 took over one month to recover, Budd said. This tells us that while higher education may have good backup strategies that can augment ransom recovery as a tactic, there is still more work that can be done to make backup and recovery faster and more robust.

Sophos highlighted five strategies that can be employed to help institutions prepare for the worst:

Excerpt from:
Colleges paying ransom only get 60% of data back. Here's how to protect it. | - University Business

Read More..

Pittsburgh calls itself the robotics capital of the world. But it’s also the birthplace of cybersecurity – Technical.ly

Robotics, medical research, bridges, Heinz Ketchup, the Pittsburgh Toilet these are the signatures of innovation in the Steel City. But buried underneath the surface of its journey from kitschy and industrial to kitschy and tech-centric is a story about the origins of the global cybersecurity industry.

Pittsburghs tech economy has long been recognized for its prowess in robotics and artificial intelligence, largely stemming from a strong pipeline of expertise out of local schools like Carnegie Mellon University and the University of Pittsburgh. While autonomous vehicle companies and autonomous mobile robot providers alike have found ways to profit off of those opportunities, theres a bedrock of a wider range of technical know-how still waiting to be leveraged into commercial possibilities.

Enter cybersecurity: an industry that was (arguably) born in Pittsburgh.

As the story goes, it all started with CERT, formerly an acronym for the computer emergency response team. The division was founded within CMUs Software Engineering Institute in 1988 as a response to the internet vulnerabilities exposed by the Morris worm, the countrys first major internet attack.

In the early hours of response to the Morris worm, you had a number of people working at DARPA at the time the Defense Advanced Research Projects Agency who had either ties to the SEI or to Carnegie Mellon School of Computer Science, Bill Wilson, current deputy director of the CERT Division, told Technical.ly.

Bill Wilson. (Courtesy photo)

Those DARPA employees reached out to CMU contacts, and they quickly kind of cobbled together a foundation and framework to begin to work with and build a community to as quickly as possible first, mitigate and solve the vulnerability underlying the Morris worm, Wilson said. But really, the purpose was to respond to what had been a sort of technical wakeup call in the realm of internet security. From the outset, it was always clear that CERT would be a new kind of organization in tech, something to work with a network of vendors and researchers to as best as possible, analyze and identify the [new internet] vulnerabilities and then rally the community to get the necessary solutions in place, he said.

A big part of that effort was building the talent base and expertise of people who could keep up with new cyber threats as computers and associated technology rapidly evolved throughout the 90s. Leveraging both talent within the SEI and working to foster the creation of new agencies across the globe, CERT spent the first 10 years helping other see the necessity of its services.

Much of that involved working with the government. By 2003, the Department of Homeland Security formed its own computer security incident response team, US-CERT. (At this point, CMU had trademarked the CERT name, and it still maintains that trademark. But it frequently licenses it out to organizations doing work in the realm of computer security incident response.) The US organization, which is distinct though often collaborative with the CMU one, is now housed in the DHS Cybersecurity and Infrastructure Security Agency.

That same year saw the founding of another significant effort from CMU, the CyLab Security & Privacy Institute, which is really an umbrella over all of its cybersecurity researchers, Wilson said. Now, CyLab brings together over 100 faculty and 30 graduate students across 15 departments within the university, and has trained over 75,000 people in security and privacy skills since its formation. Its research encompasses hardware security, IoT security and privacy, biometrics, blockchain, network security and more.

Outside of its research, CyLab has also been the source of some of Pittsburghs more noteworthy commercialization efforts in the world of cybersecurity. David Brumley, CEO and cofounder of application security startup ForAllSecure, was previously the director of CyLab. His company made waves earlier this year by closing a $21 million Series B round and promptly launching a new initiative to pay software engineers to use the startups fuzz testing tech to protect their open source software.

He sees CyLab as the organization that really launched a surge in cybersecurity talent concentrated in Pittsburgh.

At one point CMU had the majority of papers at top-tier conferences, he said of the early days for CyLab. So if you went to [the conferences] we had over 50% [of the work there], and its kind of that culture of having that top cybersecurity research that grew the cybersecurity field here. And Pittsburghs relative proximity to DC certainly helped too, Brumley said, adding that having easy access to the funding and resources provided by DARPA or the National Security Agency created more opportunities for CyLab to evolve its research over time as new threats emerged.

But as far as commercialization resources for CyLabs depth of academic projects and research, Brumley sees some struggles that might help explain why more startups havent come out of the organization so far. One is a need for improved tech transfer processes from local universities, but another is the classic problem of limited local venture capital volume, he told Technical.ly.

There is some access to capital, but its typically not an easy process and its not abundant in the amount, he said, though there are signs that has started to change with the pandemic, as some of the biggest VC firms in the country have begun to look outside of their signature markets.

Theyre starting to look at new places, and were starting to see more than one target outside of the West Coast, Brumley said. Still, its a new trend, and top firms like Sequoia Capital or Andreessen Horowitz, theyre not here, they dont have offices here yet.

But what if the reason Pittsburghs cybersecurity industry hasnt generated as many startups as, say, its robotics industry isnt because of funding challenges, but because the latter is product-oriented while the former is a more nuanced service?

David Hickton, who is the former US attorney for the Western District of Pennsylvania and the founding director of the University of Pittsburgh Institute for Cyber Law, Policy and Security (Pitt Cyber), thinks that difference between the two makes sense for why entrepreneurship hasnt taken off for cybersecurity despite a deep well of local expertise. As one of the regions and countrys most prominent cyber attorneys, hes been approached several times by startups looking to take him on as an advisor or leader of some sort. But none have persuaded him.

In order to be a startup that I would be interested in, youd have to have a tangible product to sell as opposed to a labor-intensive service, he said. Im not interested in, for example, being a cybersecurity service tech to teach people how to protect their program. I would be interested in something that would be a more wholesome application.

Outside of the expertise of CERT, CyLab and CMU, Hicktons work as the local US attorney under President Barack Obama and his leadership at Pitt Cyber have anchored the city as more than just a mecca for technical expertise, but for law and policy, too. Recognizing the local talent available in the cyber industry, Hickton focused his team on law enforcement within that industry. He counts six big cases as moments of progress for Pittsburgh in building an understanding of how cybersecurity laws can be formed and enforced, making the city a leader in that space.

From the outset, his team focused on a growing problem at the time, of intellectual property theft through hacking from foreign actors. And in May 2014, the US Justice Department indicted five members of the Chinese military based on findings that Hicktons team had compiled the first time the US would charge another country in connection with cyber-related criminal charges. The other five cases Hickton mentioned as early landmarks in his offices work on cyber law are the June 2014 indictment of Evgeny Bogachev, the July 2015 Darkode case, the Avalanche case in November 2016, Boyusec in November 2017, and the Fancy Bear case in May and October 2018. The latter three concluded after Hickton had left his role as US attorney and helped launch Pitt Cyber in 2016.

When it comes to the local cybersecurity industry, Hickton has one of the more experienced perspectives, which makes his thoughts on the lack of local startups all the more intriguing. Because while cyber-focused entrepreneurship hasnt thrived, local cyber jobs look like they soon might.

According to a CompTIA report published earlier this month, Pittsburghs tech industry currently employs around 5,655 cybersecurity and systems engineers, a number thats expected to grow by at least 0.8% by the end of this year. Nationally, the industrys expected to grow by over 253% by 2030. That makes sense given the rapid increase in the number of cybercrime threats in 2021, which is expected to cost the world $10.5 trillion annually by 2025.

So, what role does Pittsburgh have in mitigating these threats?

Some companies have started to take matters into their own hands, hiring in-house cyber professionals to ensure their technical products are built safely and securely. Meanwhile, local academic institutions continue to partner with nearby corporations to continue building expertise and cross-industry initiatives in cybersecurity.

To grow the local cyber economy even more, though, a key step will be figuring out how to stop losing talent to other markets, Hickton said, noting that there arent as many cybersecurity-focused corporations with locations in Pittsburgh. However, he said, Pittsburgh is increasingly on the map as a tech and advanced manufacturing hub, pointing to Commerce Secretary Gina Reimondos recent remarks on the benefits semiconductor chip funding could have for the Steel Citys economy.

But cyber, in the mind of the everyday person, is still different from other spheres of tech that Pittsburgh has found success in.

Cybersecurity, in the minds of most people, its like the hockey goalie you know, protecting against the other team putting the puck in the net, Hickton said. Its not like the scorers and and so it doesnt have some of the same sex appeal that artificial intelligence, self-driving vehicles and semiconductor tech have.

And maybe thats part of the issue. Maybe the one factor needed to propel the local cyber industry to the success other sectors of tech have seen is simply a bit more excitement. Who knows maybe todays Pittsburgh cyber pros will squash the 21st-century version of the Morris worm.

Read the original:
Pittsburgh calls itself the robotics capital of the world. But it's also the birthplace of cybersecurity - Technical.ly

Read More..

US Gets 60 Countries to Sign ‘Declaration for the Future of the Internet’ – PCMag

The US and dozens of other governments around the world have signed a declaration that says they will cooperate to keep the internet open, free, global, interoperable, reliable, and secure.

The calls for action in this "Declaration for the Future of the Internet," announced Thursday, might not seem controversial, but the last few years have seen increasing moves by governments to raise regulatory barriers that may splinter the global network, while others have restricted or outright blocked internet access for their citizens.

The roughly 2,000-word document (PDF) reflected a year or so of consultation by Biden administration officials with other governments, as well as with private-sector, academia, and civil-society representatives.

In addition to its calls to refrain from government-imposed internet shutdowns or degrading domestic internet access, and blocking or degrading access to lawful content, services, and applications on the internet, the declaration backs measures to promote affordable, inclusive, and reliable access to the internet," plus a variety of privacy, security, and human-rights goals.

For example, the document condemns using surveillance tools to develop social score cards or other mechanisms of domestic social control or pre-crime detention and arrest, a clear jab at Chinas social credit-score system. It also calls for action against cybercrime and online attempts to compromise voting infrastructure and influence elections with propaganda, all things that Russia has repeatedly been caught doing.

Sixty other countriesthe list includes Argentina, Australia, every country in the European Union, Canada, Israel, Japan, Kenya, Taiwan, the United Kingdom, and Ukraineas well as the European Commission signed on to the declaration.

The most obvious name absent from the declaration is India, which also happens to be the worlds leading internet-shutdown offender. India ordered 106 of them in 2021, according to Brooklyn-based advocacy group Access Now. The administrations answer about India, according to a transcript of a press call posted by the White House: The hope remains that time isnt fully passed yet for India to join.

Access Now published its latest report on network cutoffs Thursday, with India followed by Myanmar (15 shutdowns), Iran and Sudan (five each), Cuba and Jordan (four each), and Ethiopia with three. The only country to appear on both the Access list and the declaration: Niger, which staged one shutdown last year, Access reported.

Sign up for SecurityWatch newsletter for our top privacy and security stories delivered right to your inbox.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.

Go here to read the rest:
US Gets 60 Countries to Sign 'Declaration for the Future of the Internet' - PCMag

Read More..

5 Data Security Challenges and How to Solve Them – Security Intelligence

Nearly two-thirds of the global population will have internet access by next year, according to Ciscos Annual Internet Report (2018-2023) White Paper. There will be 5.3 billion total internet users (66% of the global population) by 2023, up from 3.9 billion (51% of the global population) in 2018. With this growth in internet usage, the need to secure sensitive data across industries has never been more relevant, especially in light of global events ushering in an increase in attacks on data.

To prepare to defend your data, you need a strategy that can keep up with todays environment. You want to be an innovator, a trendsetter and, most of all, a security leader. That requires a comprehensive strategy as you move forward. As technology continues to advance, the need for greater security will increase as well.

The number of data breaches was 17% higher in 2021 than in 2020. The manufacturing and utility sector was affected the most, followed by health care, which saw more than40 million patient records breached. Ransomware attackers earned about $590 millionin the first half of 2021, which surpassed 2020s total estimated earnings of $416 million.

Its no secret that it takes a detailed strategy and a trusted partner to protect your data. Are you struggling to keep up? As a starting point, take a look at these five signs that you might need guidance through your data security journey.

Managing your companys security that focuses on the most crucial gems of the business is serious work. It requires the skills of those best in the business. With how complex modern security strategies can be, your team may be working within multiple environments across many different vendors. To make matters worse, skilled workers are in short supply.

The security industry is ever-changing. The tech in our everyday world advances at a breakneck pace, changing how work in security must be done. By 2022, 70% of companies will be using hybrid multicloud platforms as part of a distributed IT infrastructure, according to McKinsey. By 2025, more than 75% of enterprise-generated data will be processed by edge or cloud computing.

Software sourced by companies from cloud-service platforms, open repositories and software-as-a-service providers will rise from 23% today to nearly 50% in 2025. As a result, leaders in security need to understand the direction their companies are headed and ensure proper protections are put into practice.

Many companies find themselves growing quickly, realizing that their IT infrastructure is becoming too much to handle. They are mired in tool sprawl and looking to scale and provision technologies quickly. In an ideal world, those will be technologies that integrate and work together well. However, they lack the capital to invest in new hardware, software and skilled workers.

Often, organizations will build their security strategy for the current project rather than the future. This is understandable, considering the speed at which the security landscape changes. But the pull of having an adaptive strategy for the long term is always present, even if seemingly unattainable.

Everything comes down to one thing: budget. Given the recent events across the industry, it should be apparent to leadership in all roles that skimping on the security budget is never a good idea. However, even as executive leadership has come to realize the importance of security investment, security still loses out to projects seen as revenue generating rather than as a cost center.

To better prepare for the modern data landscape, businesses should look to partner with a trusted advisor and move toward modern solutions. There is a trend away from simply using a vendors tools. Consulting is often more critical than the tool itself. The benefits of managed service providers take precedence over the services they manage. Why is this?

Well, one assumption we can make, based on the problems outlined earlier, is that working with a skilled advisor or service provider can reduce costs (whether time, money, resources or computing costs), provide long-term direction and help develop a strategy to derive value from existing and new solution investments that may have otherwise sat on the shelf. And thats a good start for the future.

Guardium Insights Product Marketing Manager

Katie Schwarzwalder is a product marketer with IBM Security and focused on Guardium Insights. She has worked in software for the last several years and conti...

Continue Reading

Link:
5 Data Security Challenges and How to Solve Them - Security Intelligence

Read More..

Avast One, Avast Free Antivirus and Avast Secure Browser Win Anti-Phishing Tests – PR Newswire

For the second quarter in a row, Avast One Essential, Avast Free Antivirus and Avast Secure Browser receive the highest phishing detection scores in AV-Comparatives' latest analysis of consumer antivirus and browser products

PRAGUE, Czech Republic, April 27, 2022 /PRNewswire/ -- Avast One Essential and Avast Free Antivirus, the award-winning online protection services from digital security and privacy leader Avast, have secured first place for the second time successively in a quarterly phishing detection comparison test* run by AV-Comparatives, an independent testing organization for antivirus (AV) products. Both products recorded a detection rate of 99%, ahead of Kaspersky (96%), Avira (95%) and Bitdefender (92%). The study also evaluated the effectiveness of phishing page detection among some of the world's leading browsers. Avast Secure Browser, a privacy-first browser with anti-phishing technology, also ranked first with a 97% block rate, a two percent increase on the previous test in January, while Microsoft Edge and Mozilla Firefox came in second and third with block rates of 82% and 79%, respectively.

AV-Comparatives' study, which ran from 21 March to 5 April 2022, tested all browser and antivirus products in parallel, exposing each to 250 valid and independently-selected phishing URLs, and 250 clean URLs for false alarm detection. The phishing protection provided by the AV products was tested on Windows 10 using Google Chrome 97.0 with Google Safe Browsing disabled. The browser extensions of the AVs were installed and enabled, and the competing browsers were tested without an antivirus program running. At the time of testing, all products were updated to their latest software versions.

"Given the prevalence of phishing attacks in both targeted and mass attacks, phishing protection is an important part of IT security measures," said Andreas Clementi, founder and CEO of AV-Comparatives. "In this independent test, Avast proved that its antivirus and browser products provide strong protection against phishing attacks."

"Maintaining an industry-leading detection rate to apply to our products and services is one of the most important components of protecting digital freedom for consumers and businesses," said Siggi Stefnisson, Head of Threat Labs, at Avast. "It is also expected by our customers, so we're very pleased to have maintained our lead for both our AV products and Avast Secure Browser. Last year, our threat detection engine identified and blocked nearly four million unique phishing URLs each month on average. Phishing continues to be one of the most common threats we encounter today as cybercriminals up the ante with spray-and-pray tactics but also targeted and personalized attacks."

Editor's Notes:

*This report was commissioned by Avast, however AV-Comparatives' anti-phishing test of all products was carried out impartially and under identical conditions. The phishing sites were selected independently by AV-Comparatives without instruction, influence, dispute, or review from Avast or any of the tested parties.

A complete breakdown of the antivirus and browsers products tested are listed below:

Antivirus Products:Avast Free Antivirus 22.2, Avast One Essential 22.2, Avira Free Security 1.1, Bitdefender Internet Security 26.0, ESET Internet Security 15.0/15.1, Kaspersky Internet Security 21.3, Malwarebytes Premium 4.5, McAfee Total Protection 16.0, Microsoft Defender 4.18 (with Defender browser plugin for Chrome), NortonLifeLock Norton 360 22.22.

Browsers:Avast Secure Browser 99.0, Google Chrome 99.0/100.0 (with Safe Browsing), Microsoft Edge 99.0/100.0, Mozilla Firefox 98.0, Opera 85.0.

About Avast:Avast(LSE:AVST), a FTSE 100 company, is a global leader in digital security and privacy, headquartered in Prague, Czech Republic. With over 435 million users online, Avast offers products under the Avast and AVG brands that protect people from threats on the internet and the evolving IoT threat landscape. The company's threat detection network is among the most advanced in the world, using machine learning and artificial intelligence technologies to detect and stop threats in real time. Avast digital security products for Mobile, PC or Mac are top-ranked and certified by VB100, AV-Comparatives, AV-Test, SE Labs and others. Avast is a member of Coalition Against Stalkerware, No More Ransom and Internet Watch Foundation. Visit: http://www.avast.com.

Keep in touch with Avast:

Media Contact: [emailprotected]

SOURCE Avast Software, Inc.

Read the original:
Avast One, Avast Free Antivirus and Avast Secure Browser Win Anti-Phishing Tests - PR Newswire

Read More..

RussiaUkraine Conflict and Geopolitics of Data Routing | Manohar Parrikar Institute for Defence Studies and Analyses – Institute for Defence Studies…

Summary: The RussiaUkraine conflict, as well as Russias 2014 annexation of Crimea, draw light on the geopolitics of data routing and the usage of the Border Gateway Protocol (BGP) as a tool of control. BGP is used by states to monitor and ensure censorship, block users and websites, carry out cyberattacks on other internet infrastructures, and hijack traffic from other networks. Russia created a sovereign internet network named RuNet, out of concerns that the West can constrict its access to global internet and to ostensibly protect its citizens from alleged disinformation campaigns and cyberattacks. Russia, though, has not been fully successful in achieving the objectives which led it to create the separate network.

Russias military operations in Ukraine brings to the foreground the geopolitics of data routing and the manner in which states use data routing in contested areas to assert their power. In the aftermath of the 2014 Russo-Ukrainian conflict, Russia gained control over the Crimean internet network, as well as that of the Donbas region. Through data protection laws and various other measures, Russia gradually created a Sovereign Internet/RuNet that gave it complete control of all Internet Transit Points in that region through which data packets flow in the network.1 Even before Russian troops set foot in Donbas in the current conflict, Russia had complete control over the regions internet network.2

The shaping of cyberspace by both Russia and Ukraine is based on the technical principles of data routing. As per the International Telecommunication Union (ITU), the Internet is a collection of interconnected networks using the Internet Protocol which allows them to function as a single, large virtual network.3

As shown in Figure 1, these interconnected networks are called Autonomous Systems (ASes). An Autonomous System (AS) itself is a network that manages the internal routing of data, distributes Internet Protocol (IP) addresses, and sets standards for access policies.4 Data or Internet routing is the assignment of a path for the data package through which this package reaches its destination.5 Currently, data routing happens through a routing protocol called Border Gateway Protocol (BGP), which is used in inter-domain routing for ASes. A Regional Internet Registry (RIR) allocates Autonomous System Numbers (ASN) to its ASes and IP addresses to the users within the ASes. An AS establishes a BGP exchange-of-data session with other ASes. These BGP sessions are Transmission Control Protocol (TCP) sessions between two routers connecting different ASes. TCP is essential to manage and keep the connections open.6

Geopolitical Nature of ASes and BGP

Autonomous Systems are Internet Service Providers that can be controlled by governments, universities, or companies. Each AS has an administrator that communicates and agrees to a path followed by data packets to other ASes which is made possible through a BGP. As of 5 April 2022, 1,90,928 active ASes are constituting the Internet, as per the Regional Internet Registries Statistics.7 These ASes have geographical limitations and need common infrastructure like cables to be operational. Also, an AS might have BGP agreements with multiple ASes but not necessarily with all ASes on the Internet. Hence, these agreements need human intervention that might be of political, commercial, or geographical nature. Although these agreements are generally confidential, the BGP needs ASes to communicate with each other for coordinated routing which is done through constantly releasing connectivity update messages. Therefore, through these updates, the cyberspace around these ASes can be mapped and assessed.

In the initial stages of the growth of the internet, the protocol for routing followed a more decentralised structure. Any system on the network was a possible gateway. However, as the networks became more complex, there was a visible hierarchy between paths taken by the data packets and some transit points became more important than others based on commercial, political, and geographical reasons.8 Geopolitical reasons can impact the number of gateways a region has. For example, a remote island like Tonga is connected to the world only through one submarine cable via Fiji, hence, limiting its number of gateway entries severely.9 Chinas Great Firewall10, Irans Halal Internet11, and Russias Sovereign Internet12 are all based on the efforts of these states to better control data and content flow through a combination of techniques including IP blocking, DNS tampering and hijacking, and deep packet inspection and keyword filtering.

The BGP was created in 1989 for the regulation of data gateways or transits between ASes. The ASes receive directions on which path to take to reach the specified IP address. These directions are based on routing policies of BGP rules and the path preference set by an AS administrator. The BGP is controversial in the sense that it was formed from a utilitarian perspective without keeping security in mind and hence, can be exploited for traffic hijacking (re-routing of traffic through malicious transit points), obfuscation of cyberattacks, censorship, internet shutdowns, and cyber espionage.13

Who governs the internet?

The absence of a central organisation to oversee internet operations does not imply that everyone can have unrestricted access. For example, IP addresses and hostnames are finite and are bound by technical and geographical restrictions. The delegation of hostnames and IP addresses was controlled by the United States (US) until 2009, when the US government gave autonomy to ICANN to operate independently. The US Department of Commerce still played a role in reviewing the operations of ICANN till 2016. Another entity called the Internet Engineering Task Force (IETF) consists of experts that develop and approve protocols needed for Internet functioning and is considered to be free of political interference, unlike ICANN. Nonetheless, ICANN does not have the authority to debar any actor from the Internet.

Amidst the RussiaUkraine conflict, the Ukraine Government sent a request to ICANN's Government Advisory Committee for revoking the Russian Internet country code .ru' and its Cyrillic equivalence but this request was rejected. This rejection notwithstanding, it is within the capabilities of ICANN and the Europe and Central Asia's Regional Internet Registry to take back all IP addresses assigned to Russia, essentially causing Russian websites to disappear from the Internet.14

The connections that bind RussiaUkraine internet networks are some of the most complex in the world, involving thousands of small ASes which have evolved based on 30 years of shared historical dependencies. During the time of the USSR, the emerging network in the region was isolated as the the global internet had not formed fully and was exceptionally centralised with hardly any gateway connections with the rest of the world. When the USSR disintegrated, due to the paucity of bandwidth, there was an urgent need to have more ASes for connectivity across the region. This led to a disorganised proliferation of small ASes with not much governmental supervision leading to the unusual complexity of the network. The internet grew faster than the Russian and Ukrainian governments response to tame these ASes, causing much anxiety. Their inability to control the internet infrastructure due to the never-ending demand for more connections and access led the two countries to aggressively shape the routes of data circulation within their respective nations, especially Russia with its Sovereign Internet initiative.15

In December 2019, Russia successfully conducted a test of disconnecting its network from the global internet as an attempt to test its cyber defences. This test was based on the Sovereign Internet/RuNet law passed by the Russian Government in November 2019.16 The law is implemented and monitored by Roskomnadzor, a Russian federal communications agency. Under the law, it is mandatory to install certain tracking software and hardware at all internet gateway points across Russia. The tracking data is then sent to a central monitoring facility that has the power and authority to block the flow of data it deems a threat to Russias sovereignty. The law also lets Russia isolate RuNet from the Global Internet Infrastructure/ World Wide Web in case it anticipates a cyberattack from its adversaries.17 Using a technical process called Deep Packet Inspection (DPI)18, the central monitoring facility will analyse the internet traffic while blocking or redirecting problematic data packets instantaneously.

The Russian government has stated that the legislation is in response to the USs 2018 National Cybersecurity strategy that aims to build a more lethal joint force and compete and deter in cyberspace.19 While Russian analysts justify their countrys concern vis--vis US big tech companies' influence, the flipside is that the Russian government now has complete control over what its citizens consume online.20 Also, Russian fear of the US cutting it out from the global internet is not in-sync with her accusation of the US using its big tech companies platforms to influence Russian citizens.21 This is because it would have been in American interest to keep Russians connected to the global Internet to influence them. Russias Sovereign Internet law is based on politics surrounding data routing which has led to further fragmentation of the Internet in the region.

On the Ukrainian side, its Internet architecture is split between the two global powersthe US, with a few European ASes and Russia. It is connected to Russia through 95 ASes (comprising Rostelecom, Rascom, and Transtelecom) and to the US via 22 ASes, mainly through the Hurricane Electric AS. Ukraines connections with Russia have fallen sharply since the 2014 Russo-Ukrainian conflict. From 2019 onwards, the US has increased its AS connections with Ukraine mainly due to Russia's attempts to control the data flow in Eastern Ukraine, especially in the Donbas region.22

In the 2014 Russo-Ukrainian conflict, the regions of Crimea and Donbas, situated broadly on the eastern and southern sides of Ukraine, were vociferously fought over by Russia and Ukraine (Figure 2). Following this, Crimea came under Russian control and the territories of Donetsk and Luhansk in Donbas came under the authority of Russian-backed separatist groups. Russia also has control over the region's water and energy supply, internet access, and crucial infrastructure. By 2018, Russia had succeeded in the complete integration of Crimean and Donbas network with the Russian network.23

Crimea

Before Russia's successful integration of Crimea's economic, bureaucratic, infrastructural, and informational apparatus, Crimea's network adhered to Ukrainian rules and regulations. Post-annexation, Crimea's Internet infrastructure is entirely integrated with the Russian network. The integration started with the Russian-backed Crimean government building the necessary infrastructure to replace the Ukrainian network. This, however, was a very slow and tedious process as Crimeas location ensured substantial dependency on Ukraines infrastructure. Russia gradually and systematically curtailed reliance on Ukraine through the replacement of ASes and other infrastructure over a period of three years. The systematic overhaul happened in three stages. Firstly, Ukraines telecom companies and internet service providers started pulling out of their operations from Crimea. Some did it willingly, like MTS Ukraine selling its holdings in Crimea, whilst others, like Ukrtelecom, were forced to shut down their operations, when armed militia restricted the entry of the company's staff inside their facilities.24 Later, the operations of Ukrtelecom were overtaken by Russia-backed Krymtelekom.25

Secondly, Russia attempted to truncate all direct links between Crimea and Ukraine. Ukrainian actions did not help its case as it put sanctions against ASes (Russian included) operating in Crimea post-annexation. This further diminished Ukrainian control and access to the region and resulted in the creation of small Crimean ASes connected to Russia-registered ASes like Miranda Media, Crelcom, and CrimeaCom.

Finally, Russia aggressively started building telecommunications infrastructure to connect with Crimea. Russias state-owned telecom company Rostelecom built a 110 Gbps submarine link called the Kerch Strait Cable from Russia to Crimea, costing $25 million. Therefore, from 2014 to 2017, Russia gradually altered Crimea's internet routing routes, essentially moving data through Russia. By mid-2017, no more data paths from Crimea were going through Ukrainian ASes.26 This signifies that Russia-influenced ASes started operating in Crimea, establishing their BGP agreements, and ousting the Ukrainian network. As a result, since 2014, Crimeans have been watching on the internet what Russians want them to see. For the Russian Federation, the lessons they learned from the Crimean experiment were significant and they wasted no time in applying the same strategy to Donbas.

Donbas

Where Eastern Ukraine differs from Crimea is the ambiguous political nature of its relationship with Russia and Ukraine, with neither country having complete control over the region. Russia's attempt to control internet routing has been challenging because its network is far more complex with many more actors operating in the region than in Crimea. Reports note that even though there are several direct links between Russia and Ukraine, since 2014, the data flow between these routes has severely dropped.27 The level of Russian control over Donbas is hard to access but according to research by the University of Paris, there are no data routes between Donbas and Ukraine anymore.28 Further, a data package from Donbas directly reached Russia without any rerouting. What this essentially means for Donbas locals is that they have slower connectivity for higher prices and complete Russian control on what they are allowed to access online. Furthermore, the Donbas network is now part of the Russian Sovereign Internet/RuNet indicating the possibility of online surveillance, data capture, and censorship.29 Hence, Russian control over the Donbas network indicates its intention to bring the entire Donbas territory under its influence/ authority.

The RussiaUkraine conflict, as well as Russias 2014 annexation of Crimea, draw light on the geopolitics of data routing and the usage of the Border Gateway Protocol (BGP) as a tool of control. BGP is used by states to monitor and ensure censorship, block users and websites, carry out cyberattacks on other internet infrastructures, and hijack traffic from other networks. Russia not only successfully created a Sovereign Internet named RuNet, out of concerns that the West can constrict its access to global internet and to ostensibly protect its citizens from alleged disinformation and cyberattacks, but has also integrated the Donbas and Crimean networks into RuNet. Has the current conflict between Russia and Ukraine reaffirmed the Russian campaign for Sovereign Internet?

Firstly, Russia established RuNet to ensure protection from cyberattacks. Russias Foreign Ministry alleged that the US and its allies have put together a group of internal offensive cyber-forces, attacking Russias critical infrastructure.30 Therefore, RuNet, it seems, has not been successful in stopping cyberattacks. Secondly, as a result of Russias military operation in Ukraine, Western big tech companies and their platforms have pulled out of the country.31 This, of course, does not equate to Russia being barred from the global internet. ICANN and the US have repeatedly stated that the Russian Internet will not be blocked.32 Therefore, Russian concern of being blocked from the global internet by the West has not materialised. Thirdly, Russian backing of RuNet to protect its citizens from alleged Western disinformation too has not been successful. Reports note that Russians are finding several technical workarounds to bypass the RuNet.33 Finally, the creation of such splinternets, have made the business of data routing slower and more expensive in Donbas and Crimea, forcing the local governments there to unnecessarily invest in infrastructure for connectivity with Russia.34 It would seem that Russia has not been able to fully achieve the objectives which led the country to develop RuNet.

Views expressed are of the author and do not necessarily reflect the views of the Manohar Parrikar IDSA or of the Government of India.

Go here to see the original:
RussiaUkraine Conflict and Geopolitics of Data Routing | Manohar Parrikar Institute for Defence Studies and Analyses - Institute for Defence Studies...

Read More..

How Can Startups Take Their Cybersecurity To The Next Level? – GineersNow

Cybersecurity for Startups

We are living in a world of a startup boom. It is a period where most individuals are looking to make startups of their own and run them. However, it is not so easy to determine the success of a startup because there are so many challenges along the way, and one of them is cybersecurity. Nowadays, hackers are waiting for the right moment so that they can breach into a company or business and steal the data of that company or encrypt it so that the company is also not able to use it.

There have been several instances where we have seen hackers breaching the security of a huge organization and then blackmailing the organization for money. Since startups have relatively weak security as compared to large organizations, they are vulnerable to being a target of hackers. Hackers can easily breach the privacy of startups since they dont have the proper resources to tackle the hackers and stop them from breaching into the companys network.

A startup should take cybersecurity seriously and prevent its system and network from being accessed by a third party. This can be done in various ways as we have discussed below:

Right from the start, a startup should take security seriously. If a startup operates on cloud-based services or deals with technology-related stuff then it should pay even more attention to the security of its company, right from the very start. In the start, cybersecurity may seem like a thing that is valuable for huge companies and organizations, and having cybersecurity experts doesnt seem right but as the startup grows, it will soon become a target for various hackers.

If cybersecurity is not taken seriously from the start then a startup can lose a huge sum of money and time, however, if cybersecurity professionals are present from the start then it can help the company to save a huge sum of time and money that can be invested elsewhere to grow the business. So, taking cybersecurity seriously, right from the start, in this age of technology is very important.

Startups should make another move and keep all the employees informed about security concerns. Employees that arent aware of cybersecurity attacks are the easiest targets of hackers and hackers will do anything to make such people fall victim to their traps. Therefore, it is very important to keep all the employees educated about such things as they are the backbone of a startup but if they arent aware of such cyber-attacks then they can become the weakest link of the chain.

Employees of a startup can also fall victim to phishing attacks in which they can enter their username and password, which would eventually end up in the hackers pocket. This can be encountered by adopting a two-way verification system. A two-way verification system will ensure that every time your employees enter their username and password on the companys system, they would have to enter an additional code to log in that will be sent to their email or mobile number.

Adopting a two-way verification system organization-wide will help in the elimination of potential threats and will keep your system secure. Although the default gateway address of the router such as 10.0.0.1 does not have this feature, it can be implemented on other pages where this feature is available.

If you dont have a secure internet connection then your system will always be vulnerable to hacking. No matter how many security protocols you put in place, if your internet connection is not secure then it can be the gateway through which your system can be hacked.

If your internet connection is secured then it eliminates the risk of getting malware on the network. You can secure the internet connection by installing antiviruses and firewalls on the default gateway of the web router i.e 192.168.254.254. This will prevent the installation and spread of random malware through the network.

Using strong passwords is also very important to keep the network safe. In a company, every employee owns a different system and every system has a different password. All the employees should be advised to use strong passwords for the system and network so that it is difficult for hackers to intrude into the network.

You can take this to the next level and assign the passwords by yourself or you can take the help of a password and use that for assigning the password. You can also make sure that employees dont have administrator-level access to the system.

See the original post:
How Can Startups Take Their Cybersecurity To The Next Level? - GineersNow

Read More..

Durham prosecutors detail criminal probe into tech executive who worked on Trump-Russia back channel claims – CNN

Correction: This story has been updated to correctly reflect which cyber researchers had access to the internet data and the timing of the DARPA contract.

Washington CNN

Special counsel John Durham has an active and ongoing criminal probe into a tech executive who worked with a Hillary Clinton 2016 campaign lawyer to share claims of a cyber back channel between Donald Trump and Russia, prosecutors said in court Wednesday.

Prosecutors said the Durham team is still looking closely into whether Rodney Joffe, a tech executive and leading cybersecurity expert, defrauded the US government by misusing internet data from government contracts to search for derogatory information about Trump and Russia.

We have not, to this point, charged a crime but we are not able to say that a crime was not committed, prosecutor Andrew DeFilippis told a judge Wednesday, adding that the statute of limitations for Joffes potential conduct has not expired and the probe is still underway.

These comments at a hearing about the upcoming trial of Clinton campaign lawyer Michael Sussmann were the first time Durhams team publicly detailed their investigation into Joffe. It means prosecutors are considering new defendants and additional charges as part of their sprawling investigation into the origins of the Trump-Russia probe, now in its fourth year.

Joffe worked on the Trump-Russia material with Sussmann, the Clinton campaign lawyer who was charged in September with lying to the FBI during a 2016 meeting where he passed along the data. Prosecutors claim Sussmann falsely told the FBI he shared the data as a concerned citizen, but he was really there on behalf of his clients: the Clinton campaign and Joffe.

The trial against Sussmann is scheduled to take place next month in DC federal court. He pleaded not guilty and says he never had any reason to doubt the data that came from Joffe and his researchers. The FBI looked into Sussmanns tip about a potential server back channel between Trump and the Moscow-based Alfa Bank but did not find any improper cyber links.

Responding to Wednesdays hearing, a spokesperson for Joffe said the latest comments from prosecutors were baseless and reckless and accused Durham of pushing an unfounded political narrative through false innuendo to connect Joffe to a supposed anti-Trump plot.

Mr. Joffe did not defraud or mislead any branch of the US Government, the spokesperson said in a statement. Furthermore, the data at issue did not belong to the Government and did not contain private or personal information about any individual, nor was it manipulated in any way.

Lawyers for Sussmann say Joffe is a key part of their defense and will offer testimony that helps exonerate Sussmann. Sean Berkowitz, a Sussmann attorney, accused the prosecutors of making a tactical decision by holding the criminal probe over Joffes head as a way of blocking him from testifying at trial. Because of the potential criminal exposure, Joffe intends to plead the Fifth, according to his lawyers.

Theyve been looking at this forever, Berkowitz said. They ought to be able to make a (charging) decision.

Berkowitz has asked federal Judge Christopher Cooper to dismiss the case if prosecutors dont give Joffe immunity to testify. Cooper said Wednesday that hell try to issue a ruling soon.

Lawyers representing Joffe previously told CNN that Durham is pushing a cherry-picked narrative to make it look like Joffe fudged the data to harm Trump and help Clinton get elected. Instead, they said it was his patriotic duty to share the data with the FBI. He and Sussmann maintain that they funneled the data to the US government out of national security concerns.

It has been known for a while that Sussmann shared the data from Joffe and his researchers with the FBI and later with the CIA after Trump was inaugurated in January 2017. Prosecutors said Wednesday for the first time that the material had been later shared with Congress as well.

Prosecutors have previously said that Joffes associates at Georgia Tech had access to the internet data ahead of a pending contract with DARPA, a Pentagon research agency. The contract was intended to hunt for cyber intrusions by hostile countries. Durham has said Joffe and his associates exploited their access to domain name system information to find dirt on Trump.

Some of the internet data also pertained to Russian-made Yota phones that were allegedly pinpointed near the Trump campaign headquarters and the White House offices. Past Durham filings about the Yota phones stirred a frenzy in right-wing media about supposed spying on Trump, which led to a rebuke from the judge and a partial walk-back from prosecutors.

A spokesman for Joffe previously said he is an apolitical internet security expert with decades of service to the U.S. Government and that his dealings with the data were perfectly legal. In court filings, Joffes lawyers said he has received harassing and threatening messages in the wake of the Sussmann indictment, in which he was repeatedly referred to as Tech Executive 1.

Go here to see the original:
Durham prosecutors detail criminal probe into tech executive who worked on Trump-Russia back channel claims - CNN

Read More..

The Increase in Credit-Relevant Cyber Events – S&P Global

Risk management has historically been comprised of independent disciplines, with professionals focused on credit, market or operational risk. Over time, firms have been moving to a true enterprise view, with disciplines converging. This was underscored by the Financial Accounting Standards Boards latest Current Expected Credit Loss(CECL) standard that links credit, accounting and reputational risk assessments to help financial institutions estimate expected lifetime credit losses.

As this convergence has been taking place, new areas of risk have continued to emerge requiring credit and risk management professionals to widen their scope to effectively assess potential vulnerabilities within companies, supply chains and loan and investment portfolios. We now hear a great deal about climate and regulatory risk, for example. In addition, there is an ever-increasing focus on cyber risk, which escalated during the COVID-19 pandemicwith the move to remote work environments and the migration of company data to the cloud.

Cyber Risk is a Growing Concern

Statistics on cyber risk are astounding. The FBIs Internet Crime Complaint Center pointed to a 300% increase in reported cybercrimes during the pandemic,[1]while the U.N. disarmament chief pointed to a 600% increase in malicious emails.[2]In addition, in 2021 theWorld Economic Forum ran a survey among members of a cybersecurity leadership community (representing about 100 senior cybersecurity executives from around the globe) and found that 80% saw ransomware as a dangerous threat that is impacting public safety.[3]Moreover, 97% of this community pointed to business continuity as the main risk when it comes to ransomware attacks. Looking to recent events, the Russia-Ukraine conflict has raised alarm bells for the U.S. to prepare for Russian cyberattacks. "There is a growing concern that massive cyber warfare could be on the near-term horizon, which would certainly catalyze an increase in spending around preventing sophisticated Russian-based cyber attacks going after datacenters, networks, vulnerability points, and other highly sensitive data," wrote Wedbush analyst Dan Ives, who focuses on tech stocks, wrote in a Feb. 24 research note.[4]

Cybercrimes Impact Creditworthiness

As digital transformation takes hold across industries, cybersecurity is no longer the sole responsibility of IT departments and must be considered in assessments of credit risk. After all, computer-based systems are used to manage inventories and supply chains, communicate with customers and employees, generate online sales and much more. Technology breaches can result in a significant loss of revenue, large legal costs and damage to a companys reputation all on top of the time and expense associated with repairing networks and devices that have been affected. Such breaches can become a red flag for investors wanting to minimize vulnerabilities in their portfolios.

To help quantify the impact of cyber risk on a businesss creditworthiness, in 2021 S&P Global Ratings announced that it was further integrating the cyber risk expertise and insights of Guidewire Cyence Risk Analytics[5]into its product platforms to complement the companys own assessments.

Governance Plays a Critical Role

Boards of Directors are responsible for good corporate governance and the long-term viability of their organizations, and must take an active role in guarding against potential disruptions from cybercrimes. According to the World Economic Forum,[6]leaders need tools and guidelines in order to fulfill their obligations where cybersecurity issues threaten an organizations reputation and trust among players in an ecosystem. The Forum is therefore updating guidance for the corporate governance of cyber risk in response.

In addition, in recognition of the importance of governance in addressing cyber risks, the Cybersecurity andInfrastructure Security Agency's (CISA) CybersecurityDivision and the National Association of State Chief Information Officers (NASCIO) partnered to develop a state cybersecurity governance report, along with a series of case studies that explore how states govern cybersecurity. Together these pieces identify how states have used laws, policies, structures and processes to help better govern cyber risk as an enterprise-wide strategic issue, providing helpful insights for other states and organizations that face similar challenges.

All Firms Must Protect Their Businesses

Attacks are not only happening with large publicly listed companies, as sovereign states, government agencies and public institutions are acutely vulnerable, too.[7]There have been attacks on the U.S. city of Hartford and numerous Texas school districts, across municipal utility sectors and on the Irish healthcare system, to name a few.

Small private companies are not immune to attacks. A 2019 survey[8]found that an overwhelmingmajority of these businesses believed they were a target of cybercriminals, highlighting the growing awareness among this group about the impending threats. These attacks can cause small- and medium-sized enterprise to close their doors, evidenced by the fact that organizations with fewer than 500 employees spent an average of nearly $3 million per data breach incident in 2021, up 26.8% from the previous year.[9]

To help mitigate the potential negative credit impact of cyberattacks, robust cybersecurity remains vital. There is no substitute for a strong cybersecurity system from internal governance to IT software. Other key factors that determine how well entities manage cyber risk include: prompt remedial action, active detection, C-Suite support (including budget allocation) and a better understanding of risks arising from third-party providers or supply chains.

[4] Russian cyberattack risk may spur US cybersecurity investments, S&P Global Market Intelligence, February 24, 2022. Russian cyberattack risk may spur US cybersecurity investments | S&P Global Market Intelligence (spglobal.com)

[5] Guideware is a third-party firm and is not affiliated with S&P Global or any of its divisions. Guideware Cyence Risk Analytics are data listening and risk analytics products focused on understanding and modeling new and evolving 21st century risks.

See original here:
The Increase in Credit-Relevant Cyber Events - S&P Global

Read More..

NSWC Crane STEM Program partners with S2MARTS to host 38th Annual Science and Engineering – Naval Sea Systems Command

CRANE, Ind.

Naval Surface Warfare Center, Crane Division (NSWC Crane) held its annual youth Science and Engineering Fair virtually for more than 200 regional students from April 4 8. The NSWC Crane Science, Technology, Engineering, and Math (STEM) Program organized the 38th Annual Science Fair with a partner organization S2MARTS for Junior and Senior High School students.

Tina Closser, the STEM Program Director, says the event was a success.

This year, we partnered with the S2MARTS team, who sponsored the prizes, on the annual STEM Science Fair, says Closser. The STEM team, NSWC Crane scientists and engineers, and S2MARTS personnel participated as judges on the projects. It was great to see the students and how they creatively tackled projects.

Participating students grades six through 12 submitted 120 science and engineering projects covering a wide range of STEM area. Students came from six regional schools, including students who are homeschooled. Closser says hosting a virtual event for the second year was a way to maximize reach of regional students for this year and for future STEM Science Fairs.

The virtual event enabled us to reach many students who might have not been able to get here in person. We do hope to have an in-person event next year.

The NSWC Crane Science and Engineering Fair is one of the events organized by the STEM Program, which is a program that aims to provide STEM-related educational opportunities to regional students from kindergarten to high school seniors. Annually, the program serves approximately four thousand students with engagement opportunities such as field trips, summer camps, and a science equipment lending library.

Jr. Division -

1st place - Cormac Duffy-Paiement and Eullan McLaughlin, 7th grade homeschool students - Project: Can Greenhouses Heat Homes?

2nd place - Greta Dunigan and Bryar Weddle, 7th grade students at Bloomfield Jr. High School - Project: What soap cleans coffee better?

1st place - Engineering Design - Roland Davis and Luke Ingram, 6th grade students at Salem Middle School - Project: Automated Plant Waterier

Sr. Division -

1st place - Reagan Weisheit, 8th grade student at Jasper Middle School - Project: Cover Crops - Conserving Our Future

2nd place - Abigail Burkart9th grade student at Eastern Greene High School - Project: How do different mediums change the speed of light?

About NSWC Crane

NSWC Crane is a naval laboratory and a field activity of Naval Sea Systems Command (NAVSEA) with mission areas in Expeditionary Warfare, Strategic Missions and Electronic Warfare. The warfare center is responsible for multi-domain, multi- spectral, full life cycle support of technologies and systems enhancing capability to today's Warfighter.

Join Our Team! NAVSEA employs a diverse, highly trained, educated, and skilled workforce - from students and entry level employees to experienced professionals and individuals with disabilities. We support today's sophisticated Navy and Marine Corps ships, aircraft, weapon systems and computer systems. We are continuously looking for engineers, scientists, and other STEM professionals, as well as talented business, finance, logistics and other support experts to ensure the U.S. Navy can protect and defend America. Please connect with NSWC Crane Recruiting at this site - https://navsea.recsolu.com/external/form/jmR6cUhZKZ_qD5QUqyMk8w or email us at crane_recruiting@navy.mil

Excerpt from:

NSWC Crane STEM Program partners with S2MARTS to host 38th Annual Science and Engineering - Naval Sea Systems Command

Read More..