Cyber Arms Intelligence Report for September 20th

Heavy week for cyber security news, so let’s get to it. On Friday, White House Advisor Richard A. Clarke warns US could be at high risk of cyber-attack as war with Iran looms on the horizon. Even though the DOD is still struggling to define what cyber war is; legislation for private sector cyber-security reform is in the works.

Looks like the Pentagon is still seriously considering pre-emptive strikes, even as some experts say that our cyber strategy will strike out.

“Predicting cyberattacks is also proving difficult, especially since both state and nonstate actors pose threats…..Given these circumstances, deterrence will necessarily be based more on denying any benefit to attackers than on imposing costs through retaliation.”

Conflicting ideas on foreign relations and cyberwar came out this last week. One group believes that we should have “Cyber War Games” with Russia, working together to defend our mutual systems from cyber attack (From the Chinese I suppose?). At the same time, US Deputy Defense Secretary William Lynn said we need a “Cyber Shield” to protect NATO countries from foreign attack.

“NATO has a nuclear shield, it is building a stronger and stronger defense shield, it needs a cyber shield as well”, Lynn said.

But, the idea has already been shot down. Cyber Crime expert Jeffrey Carr says that the idea is hopelessly flawed.  

Apart from those off-the-cuff examples, there’s the rather obvious fact that some NATO member states conduct cyber intelligence operations against other NATO members which begs the question – who is the cyber shield supposed to be protecting us from?

In international Cybersecurity news, Aviation Week takes a look at Israel’s electronic capabilities and what they are facing. And lastly, the UK plans increased spending on cyber-security:

Investing in better cyber-security will not be an option for the United Kingdom. What is being considered under the National Security Council as part of the SDSR is how that occurs.

We will face increasing threats in cyberspace in the years ahead-the question is how we identify the weakest areas, which need to be looked at first, and how we develop the technologies so that, as the other technologies that might affect us continue to evolve, we are best protected. That will require us to look at research across the board.

In Other News:

Polish hacker gets inside US Military’s Defence Logistic Agency website
There is one movie every Polish person knows. It’s a cult comedy from the 80s called “Miś” – meaning “Teddy Bear”. Now, thanks to a hacker going by a name “Porkythepig”, everyone can see it – but not on YouTube where you would expect it, but on the USA military Defence Logistics Agency website.

Google Fired Worker After Customer Breach
Google Inc., which has been battling government regulators over its collection of personal data, said it fired a software engineer following a breach of its customers’ private information.

GoDaddy Sites Hacked
We can now confirm there is an undetermined number of sites hosted at GoDaddy that have been attacked and exploited. Our research is showing this is an ongoing issue that started within the last couple hours.

Intel confirms HDCP copy-protection crack
Intel has confirmed Blu-ray HDCP encryption is cracked after admitting a leaked master key is the real deal.

Criminals Steal House Thanks To Hacked Email
An international cybercrime investigation is underway into a sophisticated scam network that used email and fax to sell an Australian man’s AU$500,000 property without his knowledge.

New Wave Of DDoS Botnets Emerge
A brazen new DDoS-as-a-service offering out of China operates in the open on the Web, adding 10,000 new infected machines as bots per day. Another DDoS botnet has been attacking Web servers worldwide for months at a major clothing retailer, as well as various banks, social networking sites, insurance, and government agencies. And political hacktivism remains alive and well as sites known to be critical of the Malaysian government currently are under a series of DDoS attacks.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.