Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Mobile Telephony, First Cut Is The Deepest

August 18, 2015 by Marc Handelman in All is Information, Communications, Communications Governance, Common Sense, Government, Information Security

Apparently, the United States Supreme Court has been asked (via Petition) to weigh-in on the Department of Homeland Security's Standard Operating Procedure 303, originally developed by the National Security Telecommunications Advisory Committee. My take on it - Not Going To Happen.

August 18, 2015 /Marc Handelman /Source
All is Information, Communications, Communications Governance, Common Sense, Government, Information Security
Share
Timothy D. Cook, Apple Inc.'s highly respected Chief Executive Officer

Timothy D. Cook, Apple Inc.'s highly respected Chief Executive Officer

Cook's Battles →

July 15, 2015 by Marc Handelman in All is Information, Common Sense, Data Security, Demise of Privacy, Information Security

In which, we shall discover why, Apple Inc.'s (NasdaqGS: AAPL) Chief Executive Officer, Tim Cook, is waging faire-la-croisade, in this case targeting the utilization of big data by Google Inc.'s (NasdaqGS: GOOG) and Facebook Inc.'s (NasdaqGS: FB), and the rationale behind this pro-consumer crusade.

July 15, 2015 /Marc Handelman
All is Information, Common Sense, Data Security, Demise of Privacy, Information Security
Share

Le Bots Émerger →

June 24, 2015 by Marc Handelman in All is Information, Automation, Common Sense, Communications, Social Engineering, Must Read

La Fin de Twitter est Proche, otherwise known as The End of Twitter, Inc. (NasdaqGS: TWTR) is Near... via The Harvard Business Review, and written by Alexandera Samuel, comes this tell-all on the rise of 'bots infecting Twitter, and not necessarily the 'bots you may think. Entitled "How Bots Took Over Twitter". Congratulations, you have discovered Today's Must Read.

June 24, 2015 /Marc Handelman
All is Information, Automation, Common Sense, Communications, Social Engineering, Must Read
Share

...to the Battlements, Yonder!

June 16, 2015 by Marc Handelman in Alternate Attack Analysis, All is Information, Common Sense, Critical Thinking, Defending Networks, Electronic Warfare, Information Security, Offensive Infosec, Defensive Infosec

RAND Corporation, has published a not-entirely-surprising study targeting what appears to be the highly unsuccessful security postures of organizations under scrutiny. Entitled "The Defender's Dilemma: Charting a Course Toward Cybersecurity". Apparently, the notion of "Come And Take It" is not a particularly successful stratagem in modern electronic warfare...

Citation Libicki, Martin C., Lillian Ablon and Tim Webb. The Defender's Dilemma: Charting a Course Toward Cybersecurity. Santa Monica, CA: RAND Corporation, 2015. http://www.rand.org/pubs/research_reports/RR1024. Also available in print form.

June 16, 2015 /Marc Handelman
Alternate Attack Analysis, All is Information, Common Sense, Critical Thinking, Defending Networks, Electronic Warfare, Information Security, Offensive Infosec, Defensive Infosec
Share

Alexanders' Warning: Catastrophic Attacks on Energy Sector in the Offing

April 28, 2015 by Marc Handelman in All is Information, Common Sense, Cyberwar, Electronic Warfare, Government, ICS, ICS/SCADA, Information Security, Intelligence, USNSA

via David Bisson, writing at Tripwire's State of Security blog, comes a particularly dire warning from Keith Alexander, GEN (RET) USA (RET), holder of a Bronze Star and the 16th Director of the United States National Security Agency, focusing on the security bulwarks of the embattled Energy Sector.

April 28, 2015 /Marc Handelman
All is Information, Common Sense, Cyberwar, Electronic Warfare, Government, ICS, ICS/SCADA, Information Security, Intelligence, USNSA
Share

IC3 Issues LEO Warning, Targeted 'Cyber' Attacks Against Public Officials

April 24, 2015 by Marc Handelman in All is Information, Behavioral Security, Common Sense, Communications, Crime, Cybersecurity, Data Security, Information Security

The Internet Crime Complaint Center (IC3) has published a warning focusing on Law Enforcement Officers (and other LEO personnel including family members). The warning explicitly states Law Enforcement Officers, personnel and public officials are at an increased risk of cyber related attacks, due to attacks committed by so-called Hactiviists; primarily focused at this time on the act of DOXING, see the etymology of Doxing here). The full text of IC3 Alert Number I-042115-PSA appears below:

Hacktivists Threaten to Target Law Enforcement Personnel and Public Officials

Summary

Law enforcement personnel and public officials may be at an increased risk of cyber attacks. These attacks can be precipitated by someone scanning networks or opening infected emails containing malicious attachments or links. Hacking collectives are effective at leveraging open source, publicly available information identifying officers, their employers, and their families. With this in mind, officers and public officials should be aware of their online presence and exposure. For example, posting images wearing uniforms displaying name tags or listing their police department on social media sites can increase an officer's risk of being targeted or attacked.

Many legitimate online posts are linked directly to personal social media accounts. Law enforcement personnel and public officials need to maintain an enhanced awareness of the content they post and how it may reflect on themselves, their family, their employer or how it could be used against them in court or during online attacks.

Threat

The act of compiling and posting an individual's personal information without permission is known as doxing. The personal information gathered from social media and other Web sites could include home addresses, phone numbers, email addresses, passwords and any other information used to target an individual during a cyber attack. The information is then posted on information sharing Web sites with details suggesting why the individual should be targeted.

Recent activity suggests family members of law enforcement personnel and public officials are also at risk for cyber attacks and doxing activity. Targeted information may include personally identifiable information and public information and pictures from social media Web sites.

Another dangerous attack often used by criminals is known as “swatting.” This involves calling law enforcement authorities to report a hostage situation or other critical incident at the victim's residence, when there is no emergency situation.

Defense

Defending Against Hacktivism

While eliminating your exposure in the current digital age is nearly impossible, law enforcement and public officials can take steps to minimize their risk in the event they are targeted.

  • Turn on all privacy settings on social media sites and refrain from posting pictures showing your affiliation to law enforcement.

  • Be aware of your security settings on your home computers and wireless networks.

  • Limit your personal postings on media sites and carefully consider comments.

  • Restrict your driver license and vehicle registration information with the Department of Motor Vehicles.

  • Request real estate and personal property records be restricted from online searches with your specific county.

  • Routinely update hardware and software applications, including antivirus.

  • Pay close attention to all work and personal emails, especially those containing attachments or links to other Web sites. These suspicious or phishing emails may contain infected attachments or links.

  • Routinely conduct online searches of your name to identify what public information is already available.

  • Enable additional email security measures to include two factor authentication on your personal email accounts. This is a security feature offered by many email providers. The feature will cause a text message to be sent to your mobile device prior to accessing your email account.

  • Closely monitor your credit and banking activity for fraudulent activity.

  • Passwords should be changed regularly. It is recommended to use a password phrase of 15 characters or more. Example of a password phrase: Thisisthemonthofseptember,2014.

  • Be aware of pretext or suspicious phone calls or emails from people phishing for information or pretending to know you. Social engineering is a skill often used to trick you into divulging confidential information and continues to be an extremely effective method for criminals.

  • Advise family members to turn on security settings on ALL social media accounts. Family member associations are public information and family members can become online targets of opportunity.

April 24, 2015 /Marc Handelman
All is Information, Behavioral Security, Common Sense, Communications, Crime, Cybersecurity, Data Security, Information Security
Share

Kellman's How Not To Do Security

March 23, 2015 by Marc Handelman in All is Information, Common Sense, Education, Information Security

Kellman Meghu's 'How NOT To Do Security: A Sketchnote'. Absolutely on-target sketchup from 2012, this media bit is like fine wine, it ages well, and will be fit for consumption for longer than most. Common Sense Always Ages Well... You should also read Kellman's latest post, targeting security. Highly recommended. Thanks and a Hat Tip to Phoneboy via his short, but always enjoyable podcast..

March 23, 2015 /Marc Handelman
All is Information, Common Sense, Education, Information Security
Share

Apple Removes All Antivirus Apps →

March 20, 2015 by Marc Handelman in All is Information, Common Sense, Antivirus

Apparently, Apple INC. (NasdaqGS: AAPL) has determined that iOS 'antivirus' applications will no longer be retailed on the company's iOS App Store. Consider for a moment: The entire AV/Malware genre is nearly (if not entirely) useless in the iOS sandboxed environment by design, it is surprising Apple has taken this long to act...

March 20, 2015 /Marc Handelman
All is Information, Common Sense, Antivirus
Share

IEEE Standards Association, The Right To Be Forgotten →

March 13, 2015 by Marc Handelman in All is Information, Common Sense, Demise of Privacy, Information Security, Privacy, Right to Privacy
March 13, 2015 /Marc Handelman
All is Information, Common Sense, Demise of Privacy, Information Security, Privacy, Right to Privacy
Share

FAA Systems Found Vulnerable to Attack, GAO Reports

March 10, 2015 by Marc Handelman in All is Information, Common Sense, Compute Infrastructure, Electronics in Warfare, Government, Governance, Information Security, Navigation, Network Security, Persistent Threats, National Security, Transportation Security

News, via The Washington Post's Ashley Halsey III of significant information security issues at the Federal Aviation Agency. In this case, the Government Accountability Office has published a new report entitled "FAA Needs to Address Weaknesses in Air Traffic Control Systems", detailing significant shortcomings in the agency's capability to fend off electronic attacks.

The GAO report facts speak volumes: The FAA has failed to fully implement the planned, 'agency-wide' information security program. The failure to implement and deploy is a tell-tale of questionable competency within the Agency's information security management, whose duty and primary task is protecting the National Airspace System (aka NAS), of which, should be the core competency of the FAA.

Time for a change at the FAA? Probably, however, the issue of foot-dragging is deeply systemic at the Agency, witness the multi-year effort to implement the FAA's Next Generation Air Transportation System (aka NextGen). Any change will most likely be accomplished over decades, rather than single digit years... After all, thirteen years post-FISMA and the Agency has not yet implemented and deployed the mandated FISMA requirements, is, in a word - astonishing.

Now, focusing on the issues, we turn to the GAO discovered chllanges the FAA faces (of which, a statement from the GAO appears below, and is a direct excerpt from the published report. Read it, my fellow citizens, and weep.

"While the Federal Aviation Administration (FAA) has taken steps to protect its air traffic control systems from cyber-based and other threats, significant security control weaknesses remain, threatening the agency's ability to ensure the safe and uninterrupted operation of the national airspace system (NAS). These include weaknesses in controls intended to prevent, limit, and detect unauthorized access to computer resources, such as controls for protecting system boundaries, identifying and authenticating users, authorizing users to access systems, encrypting sensitive data, and auditing and monitoring activity on FAA's systems. Additionally, shortcomings in boundary protection controls between less-secure systems and the operational NAS environment increase the risk from these weaknesses.

FAA also did not fully implement its agency-wide information security program. As required by the Federal Information Security Management Act of 2002, federal agencies should implement a security program that provides a framework for implementing controls at the agency. However, FAA's implementation of its security program was incomplete. For example, it did not always sufficiently test security controls to determine that they were operating as intended; resolve identified security weaknesses in a timely fashion; or complete or adequately test plans for restoring system operations in the event of a disruption or disaster. Additionally, the group responsible for incident detection and response for NAS systems did not have sufficient access to security logs or network sensors on the operational network, limiting FAA's ability to detect and respond to security incidents affecting its mission-critical systems.

The weaknesses in FAA's security controls and implementation of its security program existed, in part, because FAA had not fully established an integrated, organization-wide approach to managing information security risk that is aligned with its mission. National Institute of Standards and Technology guidance calls for agencies to establish and implement a security governance structure, an executive-level risk management function, and a risk management strategy in order to manage risk to their systems and information. FAA has established a Cyber Security Steering Committee to provide an agency-wide risk management function. However, it has not fully established the governance structure and practices to ensure that its information security decisions are aligned with its mission. For example, it has not (1) clearly established roles and responsibilities for information security for the NAS or (2) updated its information security strategic plan to reflect significant changes in the NAS environment, such as increased reliance on computer networks.

Until FAA effectively implements security controls, establishes stronger agency-wide information security risk management processes, fully implements its NAS information security program, and ensures that remedial actions are addressed in a timely manner, the weaknesses GAO identified are likely to continue, placing the safe and uninterrupted operation of the nation's air traffic control system at increased and unnecessary risk." via the United States Government Accountablity Office Report "FAA Needs to Address Weaknesses in Air Traffic Control Systems"

March 10, 2015 /Marc Handelman
All is Information, Common Sense, Compute Infrastructure, Electronics in Warfare, Government, Governance, Information Security, Navigation, Network Security, Persistent Threats, National Security, Transportation Security
Share

Shift →

March 09, 2015 by Marc Handelman in All is Information, Common Sense, Infosec Policy, Governance, Information Security, Security Education, Security Governance
March 09, 2015 /Marc Handelman
All is Information, Common Sense, Infosec Policy, Governance, Information Security, Security Education, Security Governance
Share

Elazari: Hackers, The Internet's Immune System →

March 02, 2015 by Marc Handelman in All is Information, Freedom, Information Security, Ethics, Computer Science, Common Sense
March 02, 2015 /Marc Handelman
All is Information, Freedom, Information Security, Ethics, Computer Science, Common Sense
Share

j4vv4d, CRASS - Vulnerability Disclosure →

February 23, 2015 by Marc Handelman in All is Information, Information Security, Common Sense, Humor, Sarcasm
February 23, 2015 /Marc Handelman
All is Information, Information Security, Common Sense, Humor, Sarcasm
Share

Mythos of IPv6, It's Too New to be Attacked... →

February 21, 2015 by Marc Handelman in All is Information, Common Sense, Communications, Compute Infrastructure, Cryptography, Data Security, Encryption, ICANN, IANA, Information Security, Internet Governance, IPSec, Network Security, Network Protocols, Networks, Signals

More IPV6 myths exposed by ISOC's Deploy360 Director Chris Grundemann. This time focusing on the myth that IPv6 is too new to be attacked. Today's MustRead!

February 21, 2015 /Marc Handelman
All is Information, Common Sense, Communications, Compute Infrastructure, Cryptography, Data Security, Encryption, ICANN, IANA, Information Security, Internet Governance, IPSec, Network Security, Network Protocols, Networks, Signals
Share

Net Neutrality Doomed? →

February 20, 2015 by Marc Handelman in All is Information, Common Sense, Communications, Compute Infrastructure, Electrical Engineering, Governance, Information Security, Internet Governance, TCP/IP Internetworking

via Jeff Hecht, writing at the IEEE's Spectrum Magazine, notes the fundamental issues with the interwebs may not be oversight, policy or warring leviathan corporate monstrosities. It, that is, Network Neutrality, may be doomed from a technical perspective... Read it and Weep.

February 20, 2015 /Marc Handelman
All is Information, Common Sense, Communications, Compute Infrastructure, Electrical Engineering, Governance, Information Security, Internet Governance, TCP/IP Internetworking
Share

IPv6 Security Myth: No NAT Means No Security

February 04, 2015 by Marc Handelman in All is Information, Common Sense, Communications, Compute Infrastructure, Cryptography, Data Security, Encryption, ICANN, IANA, Information Security, Internet Governance, IPSec, Network Protocols, Network Security, Networks, Signals

Astoundingly, myths still arise in this epoch of science, strangely so, when dealing with new technologies [Read: new means new in the final two years of the last century as IPv4 was originally codified by the IETF in 1981, with the acceptance of RFC 791] - in this case the vaunted move to IPv6. Now,  arising from the ashes of IPv4 exhaustion hysteria, comes a current popular myth surrounds the utilization NATs in IPv4  and the lack of a counterpart construct in IPv6.

⌘

February 04, 2015 /Marc Handelman
All is Information, Common Sense, Communications, Compute Infrastructure, Cryptography, Data Security, Encryption, ICANN, IANA, Information Security, Internet Governance, IPSec, Network Protocols, Network Security, Networks, Signals
Share

Government of Canada, Data From Canada Mandated To Remain In Canada →

February 02, 2015 by Marc Handelman in All is Information, Common Sense, Commerce, Compute Infrastructure, Data Loss Prevention, Cryptography, Database Security, Data Security, Encryption, Enterprise Management, Government, Information Security, Security Governance, Canada

Dr. Michael Geist (Law Professor at the University of Ottawa, and the current holder of the Canada Research Chair in Internet and E-commerce Law) holds forth on current cloud cogitation up north (at least within the data confines of the Government of Canada / Gouvernement du Canada).

 

February 02, 2015 /Marc Handelman
All is Information, Common Sense, Commerce, Compute Infrastructure, Data Loss Prevention, Cryptography, Database Security, Data Security, Encryption, Enterprise Management, Government, Information Security, Security Governance, Canada
Share

Securosis' Toddle

January 27, 2015 by Marc Handelman in All is Information, Common Sense, Communications, Enterprise Management, Information Security, Vulnerabilities

In an outstanding video piece,  the Gentlemen of Securosis contemplate the apparent second childhood of  Goggle, Inc.  (NasdaqGS: GOOG) and  Microsoft Corporation (NasdaqGS: MSFT).

January 27, 2015 /Marc Handelman
All is Information, Common Sense, Communications, Enterprise Management, Information Security, Vulnerabilities
Share

Balls of Gas (Heated)

January 26, 2015 by Marc Handelman in All is Information, Science, Common Sense, Oddities, Opposable Thumbs, Physical Sciences, Physical Security, Sarcasm

'For the Patriots to blame a change in temperature for 15% lower-pressures, requires balls to be inflated with 125-degree air.' — Neil deGrasse Tyson (@neiltyson) January 26, 2015

January 26, 2015 /Marc Handelman
All is Information, Science, Common Sense, Oddities, Opposable Thumbs, Physical Sciences, Physical Security, Sarcasm
Share

GoDaddy, Compromised Again... →

January 22, 2015 by Marc Handelman in Blatant Stupidity, Common Sense, Information Security, Web Security, Vulnerabilities

What, really? Apparently, GoDaddy security has failed to measure up, yet again. via Swati Khandelwal writing at HackerNews, comes the sorry tale of failed code (in the form of XSRF vulnerabilities), obvious failed quality control, and on top of all of that, no security checks pre-deployment. Astounding.

January 22, 2015 /Marc Handelman
Blatant Stupidity, Common Sense, Information Security, Web Security, Vulnerabilities
Share
  • Newer
  • Older