Inside Cyber Warfare - Jeffrey Carr [128]
The SimCenter: National Center for Computational Engineering is a center for integrated research and education whose primary goals are to establish next-generation technologies in computational modeling, simulation and design, to educate a new breed of interdisciplinary computational engineer who can solve a broad range of real-world engineering problems, and to provide consequent leadership and national impact in critical technology areas affecting defense, sustainable energy, environment, and health.
Huawei Symantec is aggressively looking for more channel partners in North America, which began with its first-ever channel summit in Cupertino, California in July 2011.[74] The joint venture has generated more than US$1B in revenue since it was founded in 2008, and it has operations in 42 countries (as of this writing.) Symantec CEO Enrique Salem is apparently happy with his investment of US$150M to launch the joint venture (Huawei put in zero cash) and is looking for options to increase his holdings, up to and including an IPO.[75]
Although there’s nothing illegal about either company’s actions, there is a clear threat to US security interests when one of the world’s leading information security companies (Symantec) has joined forces with a Chinese corporation with strong government ties. The potential security threats are numerous, including, for example, malicious code passed to Huawei hardware through updates or vendor support activities, or the coding of a backdoor in HS devices to intercept data at the source before it’s encrypted.
* * *
[68] John Leyden, “Huawei drops 3Leaf buy,” The Register, February 21, 2011, http://www.theregister.co.uk/2011/02/21/huawei_3leaf_deal_dropped/.
[69] George Leopold, “Report: NSA pressures AT&T on Huawei deal,” EE Times, October 8, 2010, http://www.eetimes.com/electronics-news/4209450/Report--NSA-pressures-AT-T-on-Huawei-deal.
[70] Corporate Briefing of Huawei Symantec (2008), http://www.slideshare.net/sansernl/corporate-briefing-of-huawei-symantec-2008-presentation.
[71] http://www.huaweisymantec.com/en//About_Us/News_Media/Company_News/2010/201012/622402_2569_0.htm.
[72] http://www.huaweisymantec.com/en//About_Us/News_Media/Company_News/2010/201102/622946_2569_0.htm.
[73] Joseph F. Kovar, “Huawei Symantec Intros SSD Array, Shows Hi-End Storage Roadmap,” CRN, July 19, 2011, http://www.crn.com/news/storage/231002111/huawei-symantec-intros-ssd-array-shows-hi-end-storage-roadmap.htm;jsessionid=CAsG5F-ZPtgy0wwMKckZ7Q**.ecappj03?pgno=1.
[74] Larry Walsh, “Huawei Symantec Seeks ’Wingmen,’” ChannelNomics, July 19, 2011, http://channelnomics.com/2011/07/19/huawei-symantec-seeks-%E2%80%98wingmen%E2%80%99/.
[75] Jim Finkle and Nadia Damouni, “Reuters Summit—Update 1—Symantec looking to buy,” Reuters, May 17, 2011, http://www.reuters.com/article/2011/05/17/idUSN1718067920110517.
Chapter 15. The Russian Federation: Information Warfare Framework
Russia: The Information Security State
The Russian Federation’s cyber posture was one of President Putin’s highest priorities after taking office in December 1999. As a result, Russia probably has the most coherent state plan integrating private and government cyber sectors. The plan’s unclassified aspects are elaborated in documents available on Russian government websites. The plan’s implementation is seen through Russian laws, presidential decrees, and government regulations, contracts, and actions. The plan, however, also has classified annexes addressing perceived internal and external cyber threats, as well as the information operations (IO) capabilities needed to address those threats. Implementation can also be tracked, although with somewhat more difficulty.
Russian Government