Category Archives: Cyber-warfare

Cyber-warfare Resources


download webmasters   etext   marvin   here

High-Assurance Cyber Military Systems (HACMS)

The High-Assurance Cyber Military Systems (HACMS) program goal is to create technology for the construction of high-assurance cyber-physical systems, where high assurance is defined to mean functionally correct and satisfying appropriate safety and security properties. Key technologies include interactive software synthesis systems, verification tools, and specification languages.

DoD Cyber Crime Center (DC3)

Welcome to the official website of the DoD Cyber Crime Center. DC3 is designated as a national cyber center and Department of Defense center of excellence, and serves as the operational focal point for the Defense Industrial Base Cybersecurity Program. DC3 operates under the executive agency of the Secretary of the Air Force. DC3’s mission is to deliver superior digital forensics and multimedia (D/MM) lab services, cyber technical training, technical solutions development, and cyber analytics for the following DoD mission areas: information assurance (IA) and critical infrastructure protection (CIP), law enforcement and counterintelligence (LE/CI), document and media exploitation (DOMEX), and counterterrorism (CT). Capabilities & Services

DomainTools (Cybercrime Investigation & Prevention)

DomainTools is the leader in Domain Name and DNS research products. We help security pros and cybercrime investigators with threat intelligence, scoping and attribution. We have the world’s largest database of current and 10-years’ historical data on domain ownership, Whois records, IP, name server, mailserver, SSL cert, screenshots and more.

Sqrrl (Cyber Defense Analytics)

Sqrrl, is the creator of Sqrrl Enterprise, which is a Big Data analytics platform used to uncover hidden patterns, trends, and links in data. Sqrrl Enterprise unifies several Big Data approaches into a single platform, including Hadoop, linked data analysis, machine learning, Data-Centric Security, and advanced visualization. Sqrrl Enterprise excels in use cases such as advanced data breaches resulting from cyber-espionage, insider misuse, and other types of hard-to-detect attacks.

DB Networks (Intelligent Continuous Monitoring)

DB Networks is a cybersecurity innovator of Intelligent Continuous Monitoring. Our customers include the world’s largest financial institutions, manufacturers, healthcare, and governments. Intelligent Continuous Monitoring offers deep visibility into your core networks. Our customers enjoy new insights and a situational awareness of their IT infrastructure they have never had before including: Discovery of all databases – including undocumented ones Detailed insights into applications and database interactions Monitoring core network policies Immediate identification of database attacks

NetFort (Network Security Monitoring)

NetFort LANGuardian is the industry’s leading deep packet inspection software for monitoring, troubleshooting, and reporting on network activity. It uses network packets as a data source and when linked to your Active Directory infrastructure you can find out who is responsible for problems on your network. The optional LANGuardian security module provides an advanced network intrusion detection system (IDS) that enables real-time detection and alerting of malicious events that occur on your network. LANGuardian seamlessly integrates data from the IDS with traffic analysis data to provide an unprecedented level of visibility into activity on your network.

Woodrow Wilson International Center for Scholars  
The Wilson Center aims to be the nation’s key non-partisan policy forum for tackling global issues through independent research and open dialogue to inform actionable ideas for Congress, the Administration and the broader policy community. Publications include research papers, journals, weekly emails, monographs, reports, etc. dealing with a wide range of challenging issues from national security and cyberterrorism to nanotechnology and social media.

Anomaly Detection at Multiple Scales (ADAMS)   
The Anomaly Detection at Multiple Scales (ADAMS) program seeks to create, adapt and apply technology to anomaly characterization and detection in massive data sets. Anomalies in data cue the collection of additional, actionable information in a wide variety of real world contexts.

Cyber Defense (The Cyber Genome Project) 
The Cyber Genome Project is an initiative of DARPA (Defense Advanced Research Projects Agency which, in conjunction with private contractors, aimed to analyse a broad range of data in order to create what what interpreted as a ‘digital DNA’ of the creator. More recent information released from the Project clarifies the focus as analysing malware source code to gain information on its origins. This ‘malware’ aspect was discussed by contractors HBGary and possible contracting partners in private emails during the bidding process.

Programming Computation on Encrypted Data (PROCEED) 
DARPA’s Programming Computation on Encrypted Data (PROCEED) program is a research effort that seeks to develop methods that allow computing with encrypted data without first decrypting it, making it more difficult for malware programmers to write viruses.

Safer Warfighter Communications (SAFER)  
The SAFER program seeks to develop technology to enable safe, resilient communications over the Internet, particularly in situations in which third parties attempt to discover the identity or location of the end users, or block communications. The program also seeks to provide the technological quality of service required to support applications such as electronic mail, instant messaging, voice over IP, and other media that promote effective communication.

Crowd Sourced Formal Verification (CSFV)  
Crowd Sourced Formal Verification (CSFV) is a DARPA program that aims to investigate whether large numbers of non-experts can perform formal verification faster and more cost-effectively than conventional processes. The goal is to transform verification into a more accessible task by creating fun, intuitive games that reflect formal verification problems. Playing the games would effectively help software verification tools complete corresponding formal verification proofs.

The Clean-Slate Design of Resilient, Adaptive, Secure Hosts (CRASH)  
program is focused on the design of new computer systems that are highly resistant to cyberattack, can adapt after a successful attack to continue rendering useful services, learn from previous attacks how to guard against and cope with future attacks, and can repair themselves after attacks have succeeded.

The Cyber Fast Track (CFT)   
program sought revolutionary advances in cyber science, devices, and systems through low-cost, quick-turnaround projects. To achieve this, CFT engaged a novel performer base many of whom were new to government contracting. From August 2011 to April 2013 the program attracted 550 proposal submissions, of which 90 percent were from performers that had never previously worked with the government, and awarded 135 contracts.

The objective of the Binary Executable Transforms (BET)   
program is to produce revolutionary technologies for analyzing executable binaries to identify and extract executable components. Executable components are defined as a fully encapsulated set of subroutines, data structures, objects and global variables that accomplish a particular function, along with metadata documenting the component’s arguments and any system libraries used.

Automated Program Analysis for Cybersecurity (APAC)   
program aims to address the challenge of timely and robust security validation of mobile apps by first defining security properties to be measured against and then developing automated tools to perform the measuring. APAC draws heavily from the field of formal-methods program analysis (theorem proving, logic and machine proofing) to keep malicious code out of DoD Android-based application marketplaces. APAC seeks to apply recent research breakthroughs in this field in an attempt to scale DoD’s program analysis capability to a level never before achieved with an automated solution.

The Active Authentication (AA) program   
The Active Authentication (AA) program seeks to develop novel ways of validating the identity of computer users by focusing on the unique aspects of individuals through software-based biometrics. Biometrics are defined as the characteristics used to recognize individuals based on one or more intrinsic physical or behavioral traits. This program is focused on behavioral biometrics.

Digital Commons Network Open Access Digital Commons is the leading hosted institutional repository software for universities, colleges, law schools, and research centers.

Cyber Law   
Digital Commons Network Open Access Digital Commons is the leading hosted institutional repository software for universities, colleges, law schools, and research centers.

Digital Commons Network Open Access Digital Commons is the leading hosted institutional repository software for universities, colleges, law schools, and research centers.

DBAPPSecurity (Database & Web Application Security)   
DBAPPSecurity Ltd., a Leading company focusing on Web Application and database security technologies. Founded in 2007 in Fremont California, the company now has many branches and strong support team in many cities, including Hong Kong, Shanghai, and Beijing. They provide products and services to over 1000 customers across all industries, form Fortune 500 companies, large and middle-sized organizations. Since 2009, the company’s revenue has continued to grow more than 50% per year.

XBridge (Mainframe Data Loss Prevention)  
Xbridge Systems brings years of mainframe expertise to the market by introducing the first mainframe DLP – Data Discovery — technology called DataSniff. The growing trend to audit databases as a requirement of compliance initiatives puts DataSniff in the forefront of mainframe database compliance. With patent pending technology DataSniff scans structured and unstructured datasets and database tables on disk storage devices as well as migrated data.

HexaTier (Database Security & Compliance)   
Founded in 2009, HexaTier (formerly GreenSQL) delivers database security, Database Activity Monitoring (DAM), and dynamic data masking in one product that addresses today’s database security needs for all organizations. HexaTier’s unified database security suite runs on the cloud, on-premise while ensuring our customers are compliant with regulations. Our approach is to secure databases from SQL injection attacks (the most common data breach method today), securing critical information from unauthorized database access, and enforcing separation-of-duties and meeting regulatory compliance requirements.

Baffle (Data Security & Encryption)  
Baffle was founded to battle the increasing threats to enterprise assets in public and private clouds. Our founders come from strong backgrounds in security, storage and enterprise application development. Baffle is pioneering a solution that makes data breaches irrelevant by keeping data encrypted from production through processing. Unlike other solutions that only encrypt data at-rest and in-flight, Baffle’s solution keeps data encrypted while it is being processed by databases and applications.

Homeland Security Grant Information 
A core mission of the Department of Homeland Security is to enhance the ability of state, local and tribal governments to prepare, prevent, respond to, and recover from terrorist attacks and other disasters. The Homeland Security Grant Program (HSGP) is a primary funding mechanism for building and sustaining national preparedness capabilities.

Homeland Security Digital Library  
Resources from U.S. defense organizations