Russia Trolls the Net — A fascinating, must read report from the NY Times: “From a nondescript office building in St.
Latest in Bits and Bytes
China Worried By New US Cyber Strategy. "China's Defence Ministry expressed concern on Thursday at the Pentagon's updated cyber strategy that stresses the U.S.
Neustar looks to lose its contract.
FTC v. Wyndham. The Third Circuit heard oral argument the other day in this long-running case that will test whether or not the FTC can use its "unfair" business practices authority to sanction companies that allegedly take inadequate cybersecurity measures. If the FTC loses, I predict the FCC will fill the void ....
If you weaken crypto ... you weaken crypto. "Technology companies are scrambling to fix a major security flaw that for more than a decade left users of Apple and Google devices vulnerable to hacking when they visited millions of supposedly secure Web sites, including Whitehouse.gov, NSA.gov and FBI.gov." The vulnerability (deliberate use of 512-bit encyrption) is the result of our Crytpo Wars back in the 1990s.
Are Submarines Becoming Obsolete? Perhaps, in light of enhanced data processing capabilities. "[T]he ability of submarines to hide through quieting alone will decrease as each successive decibel of noise reduction becomes more expensive and as new detection methods mature that rely on phenomena other than sounds emanating from a submarine.
What War in the Cyber Age Looks Like. "To the young Syrian rebel fighter, the Skype message in early December 2013 appeared to come from a woman in Lebanon, named Iman Almasri, interested in his cause. Her picture, in a small icon alongside her name, showed a fair-skinned 20-something in a black head covering, wearing sunglasses. . . .
You go off line for 3 days and so much worth noting happens! Here are some recent developments:
DHS Ooops. Responding to a FOIA request regarding Operation Aurora (a Chinese attack on Google) DHS accidentally also releases classified data on Project Aurora (the first demonstration of SCADA vulnerabilities in the electric grid). Our bad!
Hackers for Hire. Hacker's List is the new Uber for hacker hiring. "A man in Sweden says he will pay up to $2,000 to anyone who can break into his landlord’s website.
The Russians are Coming. A trojan horse malware program has deeply penetrated US critical infrastructure and the Russians are probably behind it.
The Crypto-Libertarians are Not Coming. More than 400 Dark Web sites, including the infamous Silk Road 2.0 have been taken down in a joint US-EU law enforcement operation. Some of the sites operated through the TOR network.