Monthly Archives: September 2013

Tiny Botnet Makes Big Impact on Background Check Companies, ID Thieves Profit.

Security Researcher Brian Krebs has conducted an investigation of a number of identity theft portals active on the internet, where various ne’er-do-wells were able to purchase the personal information (social security numbers and full background check information) of anyone they … Continue reading

Working Paper: Regional Cyber Security: Moving Towards a Resilient ASEAN Cyber Security Regime

Caitríona H. Heinl has written a working paper on the cyber threats facing the ASEAN nations and the international frameworks necessary to combat them. Developing resilience is a focus of the paper, and against a backdrop of rapidly increasing numbers … Continue reading

IT Hubs Launched for Kenyan Primary Schools.

Microsoft, the British Council, and telecoms giant Bharti Airtel have worked together to construct 18 digital hubs for Kenyan primary school students. The computers should help students learn about technology and the internet, and each hub will be shared by … Continue reading

RSA warns against use of DUAL_EC_DRBG

RSA, an internet security firm, has warned customers against using the DUAL_EC_DRBG random number generation algorithm which they distributed with some of their products. The warning comes after the algorithm has been singled out as compromised by the NSA in … Continue reading

Comment Crew Going After Drone Tech

An article in the New York Times by Edward Wong details the efforts of the State-supported Chinese hacking group known as the “Comment Crew” (and widely suspected to be PLA unit 61398) to surreptitiously acquire military drone technology by hacking into … Continue reading

Tomorrow’s cities: How big data is changing the world

The BBC’s technology writer Jane Wakefield has posted an excellent pair of articles on the changing data environment and the rapidly expanding flows of data created by cities. The ways cities respond to this new depth of data will be … Continue reading

New Approaches to Cyber-Deterrence: Initial Thoughts on a New Framework

Cooper_2009_Thoughts on Cyber Deterrence_Final copy This paper argues we are now in a non-polar world wherein states and other entities may be in states of collaboration, competition and/or conflict (3 Cs) simultaneously with each other.  As a result of this … Continue reading

Brazil Exploring Ways to Reduce Dependence on US Internet Services

In response to the revelations about the breadth and scope of NSA surveillance and data collection, Brazilian President Dilma Roussef is taking measures to reduce the influence of US Internet services in the country, and examining ways to transport data … Continue reading

Stealth Hardware Trojans Able to Defeat Encryption Systems

Four researchers from the United States, the Netherlands, Switzerland and Germany have published a paper establishing the feasibility of creating difficult to detect hardware trojans. The trojan is made during the manufacturing process by failing to properly dope a portion … Continue reading

Social Media and Gang Conflict in Chicago

Ben Austen has written an excellent article for Wired talking about the ways social media has fueled violence in some neighborhoods of Chicago. It ably demonstrates that as electronic communication comes to mediate more and more parts of our lives; … Continue reading

Germany’s CCC Hacks iPhone 5s TouchID

The Chaos Computer Club (CCC) of Germany, founded in 1981 and one of the most visible global hacking collectives, has published the details of their successful hack of the new iPhone 5s biometric security fingerprint scanner (a system called TouchID). A member … Continue reading

“Hidden Lynx” Revealed

Internet security researchers at Symantec have just published an analysis of one of the leading hacking groups that have been classified as “Advanced Persistent Threats”. The “Hidden Lynx” group has been credited with the mass break-in on tech companies such … Continue reading

The Bulletin of the Atomic Scientists, September/October 2013

The Bulletin of the Atomic Scientists has published a special Cyber Issue, concentrating specifically on cyber security challenges. In light of the recent governmental emphasis on the national security priorities of cyber security, this publication is quite timely. All of … Continue reading

The Running of the Cyber-Bulls

Recent documents released by NSA leaker Edward Snowden have revealed the existence of a classified NSA program, codenamed Bullrun, which purports to be be able to defeat the encryption standards, such as SSL, that underlie commerce and confidentiality on the world … Continue reading

“Defending an Open, Global, Secure, and Resilient Internet”, Council on Foreign Relations, June 2013

http://www.cfr.org/cybersecurity/defending-open-global-secure-resilient-internet/p30836 “Defending an Open, Global, Secure, and Resilient Internet”, the June publication of an independent task force organized by the Council on Foreign Relations, is a compelling account of the current status of national and international policy within the field … Continue reading