My new professional development course!
The ID Theft Prevention Institute is a professional center for the development of policies at the federal, state, local, & corporate levels that will better protect globally against identity threats. The Institute develops innovative tools for educating employers and employees on safe handling of sensitive information. Research partially funded by NSF and Iowa State University Information Assurance Center. Co-Directors Dr. Steffen Schmidt and Michael McCoy
Did you know that one of the strongest criticisms about United states cybersecurity is that the US government does not provide security for non-governmental organizations or corporations? This is very surprising and alarming because attacks against defense contractors,electric power companies, dams, universities, banks, and other systems are actually a serious threat to US national security and stability. So now comes the first news that the government may be moving in the right direction - of using the cyberwarfare and cyberintelligence tools of the government to more broadly protect the United States and American public and private interests.
Labels: cyberwar, NSA Cyberprotection
As Ronald Reagan used to say "Here we go again!" The Internet insecurity just keeps rolling on threatening more and more American consumers as well as critical infrastructure such as power plants, dams, and national security related facilities. Here are some excerpts from the article.
"Federal regulators are pushing banks to keep customer financial information more secure after about 200,000 Citigroup credit card accounts were hacked last month.
The Federal Deposit Insurance Corp., which regulates the nation's banks, is pushing for stronger account security measures at those institutions. The agency is specifically developing "additional guidance to enhance authentication procedures when customers access their online accounts," FDIC Chair Sheila Bair said in a statement.
"The FDIC continually monitors (security) vulnerabilities as they evolve to prevent and deal with these risks and their impact on institutions and their customers," the statement reads. "Both banks and regulators must remain vigilant."
Although the Citigroup accounts were hacked more than a month ago, the breach was first made public Thursday."
Clearly this is an example of rampant negligence. Imagine if it took a month to report a rape or car accident! There would be a huge public outcry and heads would roll. The problem continues to be that these breaches are almost viewed as "acts of God" and no one is held responsible or punished for negligence!
For an ID Theft Awareness certification course taught by us through Iowa State University Engineering Extension please go here http://www.eol.iastate.edu/Professional-Development/Courses/idtheft.html
Course Summary:
Professionals in the insurance, law enforcement, financial services, education, healthcare, and other industries need to be trained and certified in information security to meet federal and state best practices. This short Internet class provides professionals with the necessary security and Identity theft awareness training and awards a certificate upon successful completion. The class is very user friendly guiding the students through each module to completion at their own pace. We have included video clips and other visual material to make the class interesting as well as practical.
"Did Congressman Anthony Weiner really tweet a photo of his, well, wiener? It's possible, but he also might have been "hacked" via an image service vulnerability that makes it easy for anybody to send a photo to a user's account.
The incident happened over Memorial Day weekend: Weiner's official Twitter account sent a link to a photo on ImageShack's yFrog service of a man's bulging underpants. Weiner immediately denied sending the photo, claiming that his account was hacked. As this is a common defense used by politicians and celebrities against Twitter and Facebook boo-boos, many Weiner-watchers took the hacking claim with a grain of salt.
The truth, though, is that it is possible that the Weiner-wiener incident was pulled off by pranksters who knew how to manipulate yFrog into posting a photo to Weiner's account. yFrog, like many other image services, allows users to send a photo to a specialized e-mail address made for that person's account; when the service receives the message, it gets posted automatically and then tweeted out to the world" More Here: http://arstechnica.com/tech-policy/news/2011/06/lewd-prank-on-congressmans-twitter-account-might-be-yfrogs-fault.ars
Labels: can you be picture spammed, yFrog
Friday, 3 June 2011
It was supposed to be the day Sony clawed back some pride. Yesterday morning, the company announced that its PSN network was back online after the biggest hacking attack in history more than a month earlier.
Last night, though, the Japanese manufacturer was dealing with another disaster, after hackers claimed to have broken into its network yet again, saying they had stolen more than one million users' personal account details and posted them online.
The hackers claimed the data taken during the attacks on Sony and BMG included passwords, email addresses, home addresses, dates of birth and all Sony opt-in data associated with their accounts. A statement from the hackers read: "Among other things, we also compromised all admin details of Sony Pictures (including passwords) along with 75,000 'music codes' and 3.5m 'music coupons'."
The "hacktivist" group LulzSec claims to have carried out the attack – as well as recent ones on the PBS and Fox networks.
On its Twitter account, the group said it had also stolen "unencrypted admin accounts, government and military passwords saved in plaintext" [sic]. The alleged hacking is the latest in a series to be carried out on high profile companies and heaps more embarrassment on the highest profile of them all: Sony. In early May, The Independent reported rumours in the hacking community that the company was to be the target of another group of hacktivists."
Well this is certainly bad news! You'd think that a huge sophisticated company like Sony would have or put in place quickly radical internet security. Truth is these big giants have neglected security for many years. now we reap the biter, bitter fruit of that neglect.
The hackers actually said, "Sony stored over 1,000,000 passwords of its customers in plaintext, which means it's just a matter of taking it. This is disgraceful and insecure:"
Howdja feel about being upbraided and browbeaten by a bunch of hackers Sony?!
What's most disgraceful is that when you go to the Play Station web site and the Sony web site THERE IS NOT ONE WORD ABOUT THE HACK! I guess "Screw our customers we are going to play this quiet and close to the chest and hope that most of our huge customer base won't know their private information has been hacked."
Steffen Schmidt, Professor
.
.
Labels: Sony hacked again
I get daily briefings by e mail from the Rasmussen poll. Since they ask us to share the results with others I wanted to pass this one on to you because it is a rare and very complete poll on cyber attacks and Internet use.
53% Say Major Cyberattack Should Be Viewed As Act of War
Thursday, June 02, 2011
Voters express strong concern about the safety of America’s computer systems and think a major cyberattack on the United States should be grounds for forceful military retaliation.
A new Rasmussen Reports national telephone survey finds that 82% of Likely U.S. Voters are at least somewhat concerned about the safety of the country’s computer infrastructure from cyberattack. Just 17% don’t share that concern. These findings include 35% who are Very Concerned but only three percent (3%) who are Not At All Concerned. (To see survey question wording, click here.)
The Pentagon is currently considering a new defense strategy that would classify a major computer sabotage attack from another country as an act of war justifying a forceful U.S. military response. Fifty-three percent (53%) of voters agree with this proposed new strategy and think a major cyberattack on the United States by another country should be viewed as an act of war. Twenty-two percent (22%) disagree, and another 25% are undecided.
A plurality (45%) of voters regards a cyberattack by another country as a greater economic threat to the United States than a traditional military attack. Twenty-two percent (22%) still see a traditional attack as a bigger threat. One-in-three voters (33%) are not sure which is the greater threat.
Similarly, 45% of Americans said in December 2009 that a cyberattack by terrorist hackers poses a greater economic threat to the United States than another 9/11 attack on New York City and Washington, D.C. Twenty-four percent (24%) disagreed, and 32% were undecided.
The survey of 1,000 Likely Voters was conducted on May 31-June 1, 2011 by Rasmussen Reports. The margin of sampling error is +/- 3 percentage points with a 95% level of confidence. Field work for all Rasmussen Reports surveys is conducted by Pulse Opinion Research, LLC. See methodology.
Only nine percent (9%) of voters think it is possible to make any computer system secure from a cyberattack. Sixty-three percent (63%) say it is not possible to have that level of cybersecurity, but 27% aren’t sure.
Male voters (63%) feel more strongly than female voters (45%) that a major cyberattack by another country should be viewed as an act of war.
Sixty-six percent (66%) of Republicans and 52% of voters not affiliated with either major party share that view, compared to 42% of Democrats.
Middle-aged voters believe more strongly than those in other age groups that a cyberattack poses a greater economic threat to America than a traditional military attack.
Fifty-seven percent (57%) of Mainstream voters believe a major cyberattack should be seen as an act of war justifying a strong military response, while those in the Political Class are almost evenly divided on the question. But then while 49% of those in the Mainstream see a cyberattack as a greater economic threat to the United States than a traditional military attack, the plurality (45%) of Political Class voters are not sure.
Most Americans (57%) are at least somewhat confident in the security of online transactions and banking, including 17% who are Very Confident.
In an effort to enhance online security and privacy, the Obama administration has proposed that Americans obtain a single ID for all Internet sales and banking activity. But most Americans want nothing to do with such an ID if the government is the one to issue it and hold the information.
Just 19% of Americans say they rarely or never use the Internet. But 44% consider the Internet the best way to get news and information.
Seventy percent (70%) of adults are concerned that Americans have become too dependent on electronic devices, including computers and calculators, with 41% who are Very Concerned.
Labels: Rasmussen poll on cyber attack
53% Say Major Cyberattack Should Be Viewed As Act of War
Thursday, June 02, 2011
Voters express strong concern about the safety of America’s computer systems and think a major cyberattack on the United States should be grounds for forceful military retaliation.
A new Rasmussen Reports national telephone survey finds that 82% of Likely U.S. Voters are at least somewhat concerned about the safety of the country’s computer infrastructure from cyberattack. Just 17% don’t share that concern. These findings include 35% who are Very Concerned but only three percent (3%) who are Not At All Concerned. (To see survey question wording, click here.)
The Pentagon is currently considering a new defense strategy that would classify a major computer sabotage attack from another country as an act of war justifying a forceful U.S. military response. Fifty-three percent (53%) of voters agree with this proposed new strategy and think a major cyberattack on the United States by another country should be viewed as an act of war. Twenty-two percent (22%) disagree, and another 25% are undecided.
A plurality (45%) of voters regards a cyberattack by another country as a greater economic threat to the United States than a traditional military attack. Twenty-two percent (22%) still see a traditional attack as a bigger threat. One-in-three voters (33%) are not sure which is the greater threat.
Similarly, 45% of Americans said in December 2009 that a cyberattack by terrorist hackers poses a greater economic threat to the United States than another 9/11 attack on New York City and Washington, D.C. Twenty-four percent (24%) disagreed, and 32% were undecided.
The survey of 1,000 Likely Voters was conducted on May 31-June 1, 2011 by Rasmussen Reports. The margin of sampling error is +/- 3 percentage points with a 95% level of confidence. Field work for all Rasmussen Reports surveys is conducted by Pulse Opinion Research, LLC. See methodology.
Only nine percent (9%) of voters think it is possible to make any computer system secure from a cyberattack. Sixty-three percent (63%) say it is not possible to have that level of cybersecurity, but 27% aren’t sure.
Male voters (63%) feel more strongly than female voters (45%) that a major cyberattack by another country should be viewed as an act of war.
Sixty-six percent (66%) of Republicans and 52% of voters not affiliated with either major party share that view, compared to 42% of Democrats.
Middle-aged voters believe more strongly than those in other age groups that a cyberattack poses a greater economic threat to America than a traditional military attack.
Fifty-seven percent (57%) of Mainstream voters believe a major cyberattack should be seen as an act of war justifying a strong military response, while those in the Political Class are almost evenly divided on the question. But then while 49% of those in the Mainstream see a cyberattack as a greater economic threat to the United States than a traditional military attack, the plurality (45%) of Political Class voters are not sure.
Most Americans (57%) are at least somewhat confident in the security of online transactions and banking, including 17% who are Very Confident.
In an effort to enhance online security and privacy, the Obama administration has proposed that Americans obtain a single ID for all Internet sales and banking activity. But most Americans want nothing to do with such an ID if the government is the one to issue it and hold the information.
Just 19% of Americans say they rarely or never use the Internet. But 44% consider the Internet the best way to get news and information.
Seventy percent (70%) of adults are concerned that Americans have become too dependent on electronic devices, including computers and calculators, with 41% who are Very Concerned.
Here is the latest news on the hack attack against defense contractors and govt officials.
UPI via COMTEX reports that "U.S. anti-terror experts said they were investigating claims Chinese hackers cracked hundreds of senior U.S. and South Korean officials' Gmail accounts. The Department of Homeland Security, charged with protecting U.S. territory from terrorist attacks, FBI and White House National Security Council computer security experts joined Gmail owner Google Inc. in investigating the offensive, whose targets also included military personnel, Chinese political activists, officials of other Asian countries and journalists ..."
I also saw that a US Cabinet member may have been hacked but there is no comment on that one.
We will continue to monitor this story for you but what I found both surprising, ridiculous and not credible was the comment by an NSC person,"We have no reason to believe that any official U.S. government e-mail accounts were accessed." So that basically means that if Sec of State Hillary Clinton's G-mail account was hacked that does not count? (PS Did you also read my blog about the government now switching from Blackberry to iPhones and iPads and Google G-mail for official government e mail service?! Bad timing!)
The news is also that, "The Pentagon intends to deem cyberattacks "acts of war," giving Washington a peremptory right to retaliate against hackers with conventional military strikes, unclassified portions of a U.S. Defense Department report expected to become public next month indicated."Over a year ago there were other attacks like this that seemed to come from the Lanxiang Vocational School which was founded with funding from the Chinese military.
Military contractors hacked include Northrop Grumman Corp., Lockheed Martin Corp., and L-3 Communications Holdings Inc. L-3 Communications which supplies command and control, communications, intelligence, surveillance and reconnaissance systems and products to the US military. This is serious business since it could compromise US defense and national security in a serious way.
I assume that we will not hear a lot more about this as secrecy is critical in fixing the damage done and in altering the security routines (especially those worthless "security "tokens" that have been used for highly sensitive communication and which now appear to also be damaged goods - see previous blogs on that issue.
Steffen Schmidt
Labels: serious defense contractor hack
In a blog post, the company said that the campaign appeared to originate from the city of Jinan, China, and that the attackers had hijacked the personal Gmail accounts of senior government officials in the United States, Chinese political activists, officials in several Asian countries, military personnel and journalists.
It is the second time that Google has pointed to China as the source of an intrusion. Last year it said it had traced a sophisticated attack on its systems to China-based perpetrators."Labels: Chinese hack of US leaders, g-mail hacked