jump to navigation

“RSA Doesn’t Dine Alone” – China Suspected In Pipeline Attack May 13, 2012

Posted by Chris Mark in cybersecurity, InfoSec & Privacy, terrorism.
Tags: , , , , , , , , ,
add a comment

For background on this story, please read the previous post, as well as an earlier post titled: “Cyberattack underway against US Pipelines”. While the timing of this story is fortuitous for this author, the event is frightening.  According to the Christian Science Monitor “Those analyzing the cyberspies who are trying to infiltrate natural-gas pipeline companies have found similarities with an attack on a cybersecurity firm a year ago. At least one US government official has blamed China for that earlier attack.”  The referenced security firm is RSA.   Again quoting CSM: “Investigators hot on the trail of cyberspies trying to infiltrate the computer networks of US natural-gas pipeline companies say that the same spies were very likely involved in a major cyberespionage attack a year ago on RSA Inc., a cybersecurity company. And the RSA attack, testified the chief of the National Security Agency (NSA) before Congress recently, is tied to one nation: China.”

Anyone who doubt that the US is under attack by  China should read about the attacks against Dupont, RSA, Lockheed Martin, and more.

“Communist Chinese Cyber-Attacks, CyberEspionage and Theft of American Technology” May 13, 2012

Posted by Chris Mark in cybersecurity, Data Breach.
Tags: , , , , , , , , ,
1 comment so far

Since it is Mother’s day, I will not ramble on with inane commentary 😉  Instead, here is a link to the report of the same name as the blog title (too lazy to retype)…from the 112 Congress’ Congressional Hearing before the Subcommittee on Oversight and Investigations of the Committee of Foreign Affairs; House of Representatives.   It is very interesting and provides some valuable insight into IP theft.  Don’t forget to thank Mom today!

“I can neither confirm nor deny”; NSA + Google = Glomar Response May 12, 2012

Posted by Chris Mark in News, Risk & Risk Management, terrorism.
Tags: , , , , , , ,
add a comment

In a story on Foxnews it is revealed that a US Federal Appeals court has turned down a request under the Freedom of Information Act that would have forced the National Security Agency to disclose what, if any, relationship it has with Google and specifically a cyberattack against Google which originated in China.  According to the story: “The Electronic Privacy Information Center, which focuses on privacy and civil liberties, sought communications between Google and the NSA, which conducts worldwide electronic surveillance and protects the U.S. government from such spying. But the NSA refused to confirm or deny whether it had any relationship with Google. The NSA argued that doing so could make U.S. government information systems vulnerable to attack.”

Now for some history- In April 1968, the Soviet Union’s K129 nuclear submarine sank.  Seeing an opportunity to get some intelligence, the US CIA’s Special Activities Division came up with a plan known as Project Azorian.  Using Howard Hughes’ company as a front, they commissioned the Hughes Glomar Explorer.  Hughes claimed the ship was designed to extract minerals from the ocean floor.  The HGE was sent to pick up the remains of the submarine and return them to the US.  When the project came to light and the US Government was asked about the project, the response was: “I can neither confirm nor deny” the existence of such a project.  Thus was born the Glomar Response or Glomar Denial…

“Doing Time Before Being Convicted?” – Analyist Accuses Merchant of PCI Non-Compliance May 11, 2012

Posted by Chris Mark in cybersecurity, Data Breach, Industry News, InfoSec & Privacy.
Tags: , , , , , , ,
add a comment

I wrote this in May 2012.  Given the current position in the industry if proclaiming victims of cybercrime to be wholly responsible, I thought it appropriate to publish again.

I was reading a an article on BankInfoSecurity.com titled: “Online Retailer Breached”.  I am taken aback at the attitude of the quoted analyst.  A Gartner analyst took a very bold step of accusing the merchant of “non compliance” then seemingly qualifying his statement by adding: “The attacker was probably able to attack unencrypted card numbers,” he says. “But given the lack of details, it’s hard to say for certain.” (more…)

“Pot…Meet Kettle”…Syria Urges UN to Stop Terrorism in Damascus (cough, cough) May 10, 2012

Posted by Chris Mark in News, terrorism, weapons and tactics.
Tags: , , , , , ,
1 comment so far

I had to comment on an article I just read on MSNBC.com titled: “Syria Urges UN to Stop ‘Terrorism’ Following Damascus Blasts”.  The basis of the article is that Assad’ government is claiming that the two bombs that went off in Damascus yesterday (35 killed and over 300 wounded) is evidence of “foreign terrorism”.  According to the article: “Syria’s foreign ministry said the bombing was a sign the country is facing foreign-backed terrorism and called on the United Nations Security Council to take measures against countries or groups supporting violence in the revolt against President Bashar Assad.”  While I try to keep this blog professional and on the up and up, I do have to say that Syria sure has some…(ahem)…cajones to make a plea like that. “Syria stresses the importance of the UNSC taking measures against countries, groups and news agencies that are practicing and encouraging terrorism,” the state news agency SANA quoted the ministry as saying in a letter addressed to the Security Council.  Lets take a spin over to the Council on Foreign Relations website to investigate our friends in Syria. (not the citizens but the government). 

Does Syria support terrorism? (from the CFR website) (more…)