Search This Blog

24 Steak Burgers FREE with your order of $119+ Use Promo Code 2LOB8B12 to receive 2 Lobster Tails + 8 Steak Burgers

Active Warrants: Erie County Sheriff's Department

Monday, September 20, 2010

Motion Center News at 5PM Eastern

Motion Center News at 5PM (Eastern)
U.S. and China to enhance information sharing

ICE Director John Morton and China's Economic Crimes Investigation Department Director General Meng Qing-feng sign a letter of intent to strengthen investigative cooperation.

Additional photos from this event are available by clicking here. (Photo Courtesy: DHS)


BEIJING - U.S. Immigration and Customs Enforcement (ICE) and the Chinese Ministry of Public Security Economic Crimes Investigation Department signed a letter of intent on Tuesday that will strengthen investigative cooperation between both countries.
ICE Director John Morton and China's Economic Crimes Investigation Department Director General Meng Qing-feng signed the document during a formal signing ceremony in Beijing.



Both nations believe cooperation in fighting intellectual property rights crimes will benefit both the United States and Chinese law enforcement agencies. ICE's Office of Homeland Security Investigations (HSI) and China's Economic Crimes Investigation Department intend to continue cooperation through the ICE-led National Intellectual Property Rights Coordination Center.



"I would like to thank Vice Minister of the Ministry of Public Security Meng Hong-wei and Director General of the Economic Crimes Investigation Department Meng Qing-feng for agreeing to strengthen cooperation on areas of mutual concern," said ICE Director Morton. "This is the first trip to China for an ICE director. The meetings between both countries have been productive and I look forward to building on our law enforcement relationship."



The ICE Office of International Affairs is responsible for enhancing national security by conducting and coordinating international investigations. With agents in over 65 locations around the world, the ICE Office of International Affairs represents DHS' broadest footprint beyond our borders. ICE attaché offices work with foreign counterparts to identify and combat transnational criminal organizations before they threaten the United States.

-------------------------------------------------------------------------------------------------------
Joint Forces Must Maintain Balance, Admiral Says
By Lisa Daniel American Forces Press Service
NATIONAL HARBOR, Md.,  - The success of joint forces depends on their ability to balance competing interests – from preparing for strategic risks to air, land, sea and cyber power, to the work-life balance of servicemembers, the director of the Joint Staff said here today.



"In joint doctrine, balance permeates everything," Navy Vice Adm. William E. Gortney said in a keynote speech to the Air Force Association's Air and Space Conference 2010 here. Gortney was asked to fill in for Navy Adm. Mike Mullen, chairman of the Joint Chiefs of Staff, after Mullen's granddaughter was born yesterday.
"We need to have the right mix of training, personnel, and equipment," Gortney said.
Flexibility is key, the admiral added, because history has shown it's impossible to pinpoint military needs of the future. That's especially true today, he said, due to evolving threats in cyber warfare and from quickly emerging militaries in places such as China.
"If history has taught us anything, it's that the next war will bear little resemblance to the past," Gortney said. "There is no doubt that 15 years from now, we'll talk about how we got it wrong in 2010."
The focus on land forces in today's wars could turn to air and sea power for the next conflicts, Gortney said. Concepts for joint air-sea battles are a natural transition for the future, he said.
The Air Force has a proud history of innovation and hardware expertise that it must continue so it can "be ready to respond to needs not even imagined," he said.
Coordination also is critical to joint forces, as is relationship-building, said Gortney, who commanded U.S. Naval Forces Central Command, the U.S. 5th Fleet and the 26-nation Combined Maritime Forces in the Arabian Gulf. But, he added, "relationships are not built overnight, and they're not built through e-mails and tweets."
Gortney said tough decisions will have to be made while defense budgets flatline for the foreseeable future.
"The downward pressure on the defense budget is real," he said. "We're in a position of having more missions than stuff, so low priority missions are going to suffer. We have to figure out the right balance and figure out where to take risks."

The most important area to strike a balance is not in equipment or training, Gortney said, but in the lifestyles of servicemembers. And in a compliment to the audience, he said the Air Force leads the services in allowing work-life balance.
"The Air Force, hands down, does a better job of it than any service," he said. "It's why I live at Bolling Air Force Base."

Lynn Details Threats to U.S., NATO Cybersecurity

By Jim Garamone American Forces Press Service
BRUSSELS, Belgium, Sept. 15, 2010 – If it’s not protected, the great technological superiority the United States and NATO enjoy also could be a great vulnerability, Deputy Defense Secretary William J. Lynn III said here today.
Speaking at an event sponsored by the Security and Defense Agenda, Lynn said information technology is the basis for much of the military capabilities fielded by the United States and other NATO countries, and that all nations need to invest in cybersecurity.
“[Information systems] provide the kind of real-time situational awareness, the sophisticated command and control, the precision targeting – all the elements that have made it very difficult for any adversary or set of adversaries to challenge us directly in any military confrontation,” he said.
But that strength and reliance also can prove to be a liability, he said. Adversaries can challenge the NATO countries indirectly by compromising information technology. This was brought home in 2008, when a foreign intelligence agency got an infected flash drive into a classified Defense Department computer network in the Middle East. “Malware was loaded on our classified network, and … our systems were compromised,” Lynn said.
The response was called Operation Buckshot Yankee, and it entailed remedial efforts to clean up the spillage, Lynn said. The incident and the subsequent operation led to a change in thinking in the department toward the cybersecurity threat, he added
Officials realized that cyber attacks or cyber espionage will be increasingly a preferred way for enemies to confront the American military, the deputy secretary said.
“It’s relatively low-cost,” said he explained. “You don’t have to invest in fleets of … tanks, planes [or] ships to have a very significant capability to challenge even a sophisticated adversary.”
More than 100 foreign intelligence agencies are trying to hack into Defense Department systems on a daily basis, he said.
Cyber attacks are attractive because of the difficulty of determining who actually launched them, Lynn said. A virus or malware travels at the speed of light, and pinpointing exactly who launched an attack can take months to decipher, if it’s possible at all, he added.
This type of attack also breaks down the strategy of deterrence to an extent, the deputy secretary said. The old idea was that if an adversary launched an attack, the United States would launch a devastating attack in return.
“Where you have difficulties with attribution, it’s hard to guarantee assured retaliation, because you don’t know who to retaliate against,” he explained. “Also, as the set of adversaries we face has shifted to more non-governments – terrorists such as al-Qaida – even if you determine the origin of the attack, they might not have assets that you can truly hold at risk.”
This means the Defense Department has to shift from retaliation to denying an enemy benefit from an attack by beefing up Cybersecurity, Lynn said. Still, he added, this is difficult, because attackers have the advantage.
The Internet is open by its nature, the deputy secretary said, as Defense Advanced Research Projects Agency scientists designed it to facilitate the free and fast flow of information.
“It was not designed with security in mind,” he said. “As defenders, we have to defend every portal. As attackers, a single failure can gain entrance to the networks and allow them to compromise those networks.”
This calls for a different approach to cybersecurity, because no country can hide its networks behind a cyber Maginot Line of firewalls and intrusion devices, the deputy secretary said. “We need a strategy that can deny the benefit to the attackers despite the numerous advantages that the attackers have,” Lynn said.
All of this is further complicated by the fact that attacks are not limited to the Internet.
“You have to look at the supply chain,” Lynn said. Counterfeit chips and malicious code are threats, and they can be extremely difficult to find and fix, he explained.
Lynn said any cybersecurity strategy really has to include nonmilitary systems as well as military systems. The infrastructure networks – the power grid, the transportation networks, the financial networks – are critical in their own right to national security, he said
The deputy secretary argued for a flexible and fast cybersecurity system.
“I think you have to be modest about your ability to predict about where the threat is going to come from,” he said. “The theory is helpful, but not very predictive.”
He said there have been many conjectures, but no one has been particularly good about pinpointing the adversary or what form an attack will take, even in conventional warfare.
“When you look at a strategy, you have to adopt one that is flexible and adaptable in its own right,” he said, “because of the difficulty in predicting the threat and where this threat will appear.”

-----------------------------------------------------------------------------------------------------

No comments:

Advertiser

Technology Headlines

The TSA Blog

FEMA Blog

White House.gov Video Feed

NYSDOT Recent Press Releases

Indian Point Press Releases

Erie County RSS Feed

The Weather Channel: Your Local Weather Outlook--Niagara Falls, NY (14304)

Niagara County RSS Feed

National Weather Service

Albany County RSS Feed

Allegany County RSS Feed

Bronx County RSS Feed

Broome County RSS Feed

Cattaraugus County RSS Feed

Chemung County RSS Feed

City of Toronto News Releases

US Consumer Product Safety Commission - Recent Recalls and Product Safety News

Center for Missing & Exploited Children: NY Missing

Lead Photos - U.S. Dept. of Defense

Contract - U.S. Dept. of Defense

Speech - U.S. Dept. of Defense

Transcript - U.S. Dept. of Defense

FBI Extra

NASA Breaking News

NASACast Video

City of Toronto news releases, Emergency Medical Services

City of Toronto news releases, Fire Services

Speeches

Advertiser

City of Toronto news releases, Fire Services

RoyaltyFreeMusic.com Music Reviews

Automobile RSS Feed

Speed and Accuracy Statement

The information you find here is in the form of raw data, usually delivered via RSS feeds. The information is delivered via website in the most rapid manner possible. Usually this is the manner of delivery of information to media. Therefore, this service gets the audience information to the public more rapidly then any media outlet that has to re-write the information for their email club or SMS feeds.

In some cases, cases, from time to time, updates and correctons are offered by the authors of this information, Motioncenter.info is not responisble for the content of RSS feeds, press releases, or any other content. The content of the information presented is the responsiblity of the producer of the content.

There are many reasons for presenting the information as the page does. The public really never has had a view of the raw data before now. Most cases we see news packaged, polished and prioritized. This blog network offers a wide audience a variety of news, some of it is produced by Motioncenter and some by the government or other sources.

Read what you like, ignore what doesn't interest you, but at least Motioncenter doesn;t tell you what the news is, you choose.

Material Connection Disclosure

You should assume that the owner of this website has an affiliate relationship and/or another material connection to the providers of goods and services mentioned on this site and may be compensated when you purchase from a provider. You should always perform due diligence before buying goods or services from anyone via the internet or offline. THIS IS A BLOG. A NON-COMMERCIAL WEBPAGE At no time does commerce transact on this site. If it had then it would require a Secure Sockets Layer certificate and a merchant account. Being a non-commercial site there are some licensing privledges that this site will participate in. Mystuffnow is an online radio station broadcasting twenty four hours daily. This station can be bet described as a hybrid format of adult contemporary, international and ad popular music. In a sense it may, be compared to compared random radio format, but mystuffnow has three dedicated day parts. These day parts include a morning, evening and overnight separate music selection. The morning and afternoon have a selection of classic rock and current hot hits. To make the station more unique a new track, or tracks from the overnight day part have been added to make the station stand out from traditional stations that broadcast locally. The overnight day part is called “After Hours” and mimics the general principals of a quiet storm programming style where as there are fewer commercials and the music is more adult in nature, not just in lyrics but the music is more unique, offering international and slower tracks. This is meant for relaxation or whatever you may be doing in the late night hours. This station is run by computerized traffic software. At any moment a live deejay can broadcast and a morning show or news programming is possible, all playlists are run automatically. One positive of this is the fact that the software ensures that all artists get paid their royalties and this station avoids any fines for digital media issues. Update: Mystuffnow is currently off the air.

No Endorsement Statement

No endorsement is implied nor should it be inferred. No government agency, or organization has endorsed Motioncenter.Info. Motioncenter.info is a media organization with a mission of offering unbiased information as it becomes available, without any form of bias.

Privacy Policy

This is a website run by Group Speeddog Results Marketing, L.L.C... We take our readers privacy very seriously. Promotions through Third Party Merchants While this site is not endorsed or owned by any of the third party merchants appearing on this site, this site may at times receive various types of compensation when a viewer makes a purchase or clicks on a link appearing on this site. This site is not responsible for any claims or warranties associated with any third-party merchant link or website. This site does not directly collect any information regarding its viewers without your prior knowledge and permission; nor does it share their information with third-party vendors or merchants . It is not now, nor ever will be, our practice to sell your information to any third-party under any circumstance. We use third-party advertising companies to serve ads when you visit our website. These companies may use information (not including your name, address, email address, or telephone number) about your visits to this and other websites in order to provide advertisements about goods and services of interest to you. Google Advertising Cookie and Privacy Policies What is the DoubleClick DART cookie? The DoubleClick DART cookie is used by Google in the ads served on the websites of its partners, such as websites displaying AdSense ads or participating in Google certified ad networks. When users visit a partner’s website and either view or click on an ad, a cookie may be dropped on that end user’s browser. The data gathered from these cookies will be used to help better serve and manage ads on the publisher’s site(s) and across the web. *Google, as a third party vendor, uses cookies to serve ads on your site. *Google’s use of the DART cookie enables it and its partners to serve ads to your users based on their visit to your sites and/or other sites on the Internet. *Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy.
Add to The Free DictionaryAdd to Excite MIXAdd to netomat HubAdd to fwicki