Cyberwar: Reality Or Weapon of Mass Distraction
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
V2I Deployment Coalition Technical Memorandum 4: Phase 1 Final Report
V2I Deployment Coalition Technical Memorandum 4: Phase 1 Final Report January 2017 V2I Deployment Coalition Technical Memorandum 4: Phase 1 Final Report Table of Contents 1. Executive Summary ......................................................................................................................... 1 2. Synthesis of the Technical Memorandum ........................................................................................ 4 3. Overall Progress Advancing V2I Deployments .................................................................................. 6 3.1. Key Outcome: Engaging a Unified Coalition with Common Messages and Discussion ............... 6 3.2. Key Outcome: Narrowing of Initial Focus for V2I Deployments ................................................. 6 3.3. Key Outcome: Definitions of Research Activities to Support V2I Deployment ........................... 7 3.4. Key Outcome: V2I Standards Context Diagram and Supporting Description .............................. 8 3.5. Key Outcome: Creation of the SPaT Challenge .......................................................................... 8 3.6. Key Outcome: Creating a Forum for Collaboration between Infrastructure Owners/Operators and Original Equipment Manufacturers (IOOs and OEMs) ........................................................ 9 4. V2I DC Workshop 2 Summary ........................................................................................................ 11 4.1. TWG 1: Deployment Initiatives .............................................................................................. -
The Spyware Used in Intimate Partner Violence
The Spyware Used in Intimate Partner Violence Rahul Chatterjee∗, Periwinkle Doerflery, Hadas Orgadz, Sam Havronx, Jackeline Palmer{, Diana Freed∗, Karen Levyx, Nicola Dell∗, Damon McCoyy, Thomas Ristenpart∗ ∗ Cornell Tech y New York University z Technion x Cornell University { Hunter College Abstract—Survivors of intimate partner violence increasingly are decidedly depressing. We therefore also discuss a variety report that abusers install spyware on devices to track their of directions for future work. location, monitor communications, and cause emotional and physical harm. To date there has been only cursory investigation Finding IPS spyware. We hypothesize that most abusers find into the spyware used in such intimate partner surveillance (IPS). spyware by searching the web or application stores (mainly, We provide the first in-depth study of the IPS spyware ecosystem. Google Play Store or Apple’s App Store). We therefore We design, implement, and evaluate a measurement pipeline that combines web and app store crawling with machine learning to started by performing a semi-manual crawl of Google search find and label apps that are potentially dangerous in IPS contexts. results. We searched for a small set of terms (e.g., “track my Ultimately we identify several hundred such IPS-relevant apps. girlfriend’s phone without them knowing”). In addition to the While we find dozens of overt spyware tools, the majority are results, we collected Google’s suggestions for similar searches “dual-use” apps — they have a legitimate purpose (e.g., child to seed further searches. The cumulative results (over 27,000+ safety or anti-theft), but are easily and effectively repurposed returned URLs) reveal a wide variety of resources aimed at for spying on a partner. -
In Defense of Cyberterrorism: an Argument for Anticipating Cyber-Attacks
IN DEFENSE OF CYBERTERRORISM: AN ARGUMENT FOR ANTICIPATING CYBER-ATTACKS Susan W. Brenner Marc D. Goodman The September 11, 2001, terrorist attacks on the United States brought the notion of terrorism as a clear and present danger into the consciousness of the American people. In order to predict what might follow these shocking attacks, it is necessary to examine the ideologies and motives of their perpetrators, and the methodologies that terrorists utilize. The focus of this article is on how Al-Qa'ida and other Islamic fundamentalist groups can use cyberspace and technology to continue to wage war againstthe United States, its allies and its foreign interests. Contending that cyberspace will become an increasingly essential terrorist tool, the author examines four key issues surrounding cyberterrorism. The first is a survey of conventional methods of "physical" terrorism, and their inherent shortcomings. Next, a discussion of cyberspace reveals its potential advantages as a secure, borderless, anonymous, and structured delivery method for terrorism. Third, the author offers several cyberterrorism scenarios. Relating several examples of both actual and potential syntactic and semantic attacks, instigated individually or in combination, the author conveys their damagingpolitical and economic impact. Finally, the author addresses the inevitable inquiry into why cyberspace has not been used to its full potential by would-be terrorists. Separately considering foreign and domestic terrorists, it becomes evident that the aims of terrorists must shift from the gross infliction of panic, death and destruction to the crippling of key information systems before cyberattacks will take precedence over physical attacks. However, given that terrorist groups such as Al Qa'ida are highly intelligent, well-funded, and globally coordinated, the possibility of attacks via cyberspace should make America increasingly vigilant. -
Zombies—A Pop Culture Resource for Public Health Awareness Melissa Nasiruddin, Monique Halabi, Alexander Dao, Kyle Chen, and Brandon Brown
Zombies—A Pop Culture Resource for Public Health Awareness Melissa Nasiruddin, Monique Halabi, Alexander Dao, Kyle Chen, and Brandon Brown itting at his laboratory bench, a scientist adds muta- secreted by puffer fish that can trigger paralysis or death- Stion after mutation to a strand of rabies virus RNA, like symptoms, could be primary ingredients. Which toxins unaware that in a few short days, an outbreak of this very are used in the zombie powders specifically, however, is mutation would destroy society as we know it. It could be still a matter of contention among academics (4). Once the called “Zombie Rabies,” a moniker befitting of the next sorcerer has split the body and soul, he stores the ti-bon anj, Hollywood blockbuster—or, in this case, a representation the manifestation of awareness and memory, in a special of the debate over whether a zombie apocalypse, manu- bottle. Inside the container, that part of the soul is known as factured by genetically modifying one or more diseases the zombi astral. With the zombi astral in his possession, like rabies, could be more than just fiction. Fear of the the sorcerer retains complete control of the victim’s spiri- unknown has long been a psychological driving force for tually dead body, now known as the zombi cadavre. The curiosity, and the concept of a zombie apocalypse has be- zombi cadavre remains a slave to the will of the sorcerer come popular in modern society. This article explores the through continued poisoning or spell work (1). In fact, the utility of zombies to capitalize on the benefits of spreading only way a zombi can be freed from its slavery is if the spell public health awareness through the use of relatable popu- jar containing its ti-bon anj is broken, or if it ingests salt lar culture tools and scientific explanations for fictional or meat. -
Kaspersky Lab, Inc. V. United States, No
United States Court of Appeals FOR THE DISTRICT OF COLUMBIA CIRCUIT Argued September 14, 2018 Decided November 30, 2018 No. 18-5176 KASPERSKY LAB, INC. AND KASPERSKY LABS LIMITED, APPELLANTS v. UNITED STATES DEPARTMENT OF HOMELAND SECURITY AND KIRSTJEN M. NIELSEN, IN HER OFFICIAL CAPACITY AS SECRETARY OF HOMELAND SECURITY, APPELLEES Consolidated with 18-5177 Appeals from the United States District Court for the District of Columbia (No. 1:17-cv-02697) (No. 1:18-cv-00325) Scott H. Christensen argued the cause for appellants. With him on the briefs were Ryan P. Fayhee and Stephen R. Halpin III. Lewis S. Yelin, Attorney, U.S. Department of Justice, argued the cause for appellees. With him on the brief was H. Thomas Byron, III. 2 Before: TATEL, Circuit Judge, and EDWARDS and GINSBURG, Senior Circuit Judges. Opinion for the Court filed by Circuit Judge TATEL. TATEL, Circuit Judge: Kaspersky Lab is a Russian-based cybersecurity company that provides products and services to customers around the world. Recently, however, Kaspersky lost an important client: the United States government. In September 2017, based on concerns that the Russian government could exploit Kaspersky’s access to federal computers for ill, the Acting Secretary of Homeland Security directed federal agencies to remove the company’s products from government information systems. And a few months later, Congress broadened and codified that prohibition in the National Defense Authorization Act. Kaspersky sued, arguing that the prohibition constitutes an impermissible legislative punishment—what the Constitution calls a bill of attainder. The government responded that the prohibition is not a punishment but a prophylaxis necessary to protect federal computer systems from Russian cyber-threats. -
Dominant Land Forces for 21St Century Warfare
No. 73 SEPTEMBER 2009 Dominant Land Forces for 21st Century Warfare Edmund J. Degen A National Security Affairs aperP published on occasion by THE INSTITUTE OF LAND WARFARE ASSOCIATION OF THE UNITED STATES ARMY Arlington, Virginia Dominant Land Forces for 21st Century Warfare by Edmund J. Degen The Institute of Land Warfare ASSOCIATION OF THE UNITED STATES ARMY AN INSTITUTE OF LAND WARFARE PAPER The purpose of the Institute of Land Warfare is to extend the educational work of AUSA by sponsoring scholarly publications, to include books, monographs and essays on key defense issues, as well as workshops and symposia. A work selected for publication as a Land Warfare Paper represents research by the author which, in the opinion of ILW’s editorial board, will contribute to a better understanding of a particular defense or national security issue. Publication as an Institute of Land Warfare Paper does not indicate that the Association of the United States Army agrees with everything in the paper, but does suggest that the Association believes the paper will stimulate the thinking of AUSA members and others concerned about important defense issues. LAND WARFARE PAPER NO. 73, September 2009 Dominant Land Forces for 21st Century Warfare by Edmund J. Degen Colonel Edmund J. Degen recently completed the senior service college at the Joint Forces Staff College and moved to the Republic of Korea, where he served as the U.S. Forces Korea (USFK) J35, Chief of Future Operations. He is presently the Commander of the 3d Battlefield Coordination Detachment–Korea. He previously served as Special Assistant to General William S. -
Mcafee Potentially Unwanted Programs (PUP) Policy March, 2018
POLICY McAfee Potentially Unwanted Programs (PUP) Policy March, 2018 McAfee recognizes that legitimate technologies such as commercial, shareware, freeware, or open source products may provide a value or benefit to a user. However, if these technologies also pose a risk to the user or their system, then users should consent to the behaviors exhibited by the software, understand the risks, and have adequate control over the technology. McAfee refers to technologies with these characteristics as “potentially unwanted program(s),” or “PUP(s).” The McAfee® PUP detection policy is based on the process includes assessing the risks to privacy, security, premise that users should understand what is being performance, and stability associated with the following: installed on their systems and be notified when a ■ Distribution: how users obtain the software including technology poses a risk to their system or privacy. advertisements, interstitials, landing-pages, linking, PUP detection and removal is intended to provide and bundling notification to our users when a software program or technology lacks sufficient notification or control over ■ Installation: whether the user can make an informed the software or fails to adequately gain user consent to decision about the software installation or add- the risks posed by the technology. McAfee Labs is the ons and can adequately back out of any undesired McAfee team responsible for researching and analyzing installations technologies for PUP characteristics. ■ Run-Time Behaviors: the behaviors exhibited by the technology including advertisements, deception, and McAfee Labs evaluates technologies to assess any impacts to privacy and security risks exhibited by the technology against the degree of user notification and control over the technology. -
The German Army, Vimy Ridge and the Elastic Defence in Depth in 1917
Journal of Military and Strategic VOLUME 18, ISSUE 2 Studies “Lessons learned” in WWI: The German Army, Vimy Ridge and the Elastic Defence in Depth in 1917 Christian Stachelbeck The Battle of Arras in the spring of 1917 marked the beginning of the major allied offensives on the western front. The attack by the British 1st Army (Horne) and 3rd Army (Allenby) was intended to divert attention from the French main offensive under General Robert Nivelle at the Chemin des Dames (Nivelle Offensive). 1 The French commander-in-chief wanted to force the decisive breakthrough in the west. Between 9 and 12 April, the British had succeeded in penetrating the front across a width of 18 kilometres and advancing around six kilometres, while the Canadian corps (Byng), deployed for the first time in closed formation, seized the ridge near Vimy, which had been fiercely contested since late 1914.2 The success was paid for with the bloody loss of 1 On the German side, the battles at Arras between 2 April and 20 May 1917 were officially referred to as Schlacht bei Arras (Battle of Arras). In Canada, the term Battle of Vimy Ridge is commonly used for the initial phase of the battle. The seizure of Vimy ridge was a central objective of the offensive and was intended to secure the protection of the northern flank of the 3rd Army. 2 For detailed information on this, see: Jack Sheldon, The German Army on Vimy Ridge 1914-1917 (Barnsley: Pen&Sword Military, 2008), p. 8. Sheldon's book, however, is basically a largely indiscriminate succession of extensive quotes from regimental histories, diaries and force files from the Bavarian War Archive (Kriegsarchiv) in Munich. -
The Rhetoric of Perpetual Warfare: a Political Discourse Analysis of the Obama Administration’S Legitimation of U.S
University of Tennessee, Knoxville TRACE: Tennessee Research and Creative Exchange Masters Theses Graduate School 8-2016 The Rhetoric of Perpetual Warfare: A Political Discourse Analysis of the Obama Administration’s Legitimation of U.S. Drone Strikes Douglas Ray Oeser University of Tennessee, Knoxville, [email protected] Follow this and additional works at: https://trace.tennessee.edu/utk_gradthes Part of the Sociology Commons Recommended Citation Oeser, Douglas Ray, "The Rhetoric of Perpetual Warfare: A Political Discourse Analysis of the Obama Administration’s Legitimation of U.S. Drone Strikes. " Master's Thesis, University of Tennessee, 2016. https://trace.tennessee.edu/utk_gradthes/4013 This Thesis is brought to you for free and open access by the Graduate School at TRACE: Tennessee Research and Creative Exchange. It has been accepted for inclusion in Masters Theses by an authorized administrator of TRACE: Tennessee Research and Creative Exchange. For more information, please contact [email protected]. To the Graduate Council: I am submitting herewith a thesis written by Douglas Ray Oeser entitled "The Rhetoric of Perpetual Warfare: A Political Discourse Analysis of the Obama Administration’s Legitimation of U.S. Drone Strikes." I have examined the final electronic copy of this thesis for form and content and recommend that it be accepted in partial fulfillment of the equirr ements for the degree of Master of Arts, with a major in Sociology. Lois Presser, Major Professor We have read this thesis and recommend its acceptance: Stephanie Bohon, Michelle Brown Accepted for the Council: Carolyn R. Hodges Vice Provost and Dean of the Graduate School (Original signatures are on file with official studentecor r ds.) The Rhetoric of Perpetual Warfare: A Political Discourse Analysis of the Obama Administration’s Legitimation of U.S. -
What You Should Know About Kaspersky
What you should know Proven. Transparent. about Kaspersky Lab Independent. Fighting for your digital freedom Your data and privacy are under attack by cybercriminals and spy agencies, so you need a partner who is not afraid of standing beside you to protect what matters to you most. For over 20 years, Kaspersky Lab has been catching all kinds of cyberthreats. No matter whether they come from script kiddies, cybercriminals or governments, or from the north, south, east or west. We believe the online world should be free from attack and state-sponsored espionage, and will continue fighting for a truly free and safe digital world. Proven Transparent Independent Kaspersky Lab routinely scores the highest We are totally transparent and are making As a private company, we are independent marks in independent ratings and surveys. it even easier to understand what we do: from short term business considerations and institutional influence. • Measured alongside more than 100 other • Independent review of the company’s well-known vendors in the industry source code, software updates and We share our expertise, knowledge • 72 first places in 86 tests in 2017 threat detection rules and technical findings with the world’s • Top 3 ranking* in 91% of all product tests • Independent review of internal security community, IT security vendors, • In 2017, Kaspersky Lab received processes international organizations, and law Platinum Status for Gartner’s Peer • Three transparency centers by 2020 enforcement agencies. Insight** Customer Choice Award 2017, • Increased bug bounty rewards with up in the Endpoint Protection Platforms to $100K per discovered vulnerability Our research team is spread across the market world and includes some of the most renowned security experts in the world. -
Zero Day Exploits and National Readiness for Cyber-Warfare
Nigerian Journal of Technology (NIJOTECH) Vol. 36, No. 4, October 2017, pp. 1174 – 1183 Copyright© Faculty of Engineering, University of Nigeria, Nsukka, Print ISSN: 0331-8443, Electronic ISSN: 2467-8821 www.nijotech.com http://dx.doi.org/10.4314/njt.v36i4.26 ZERO DAY EXPLOITS AND NATIONAL READINESS FOR CYBER-WARFARE A. E. Ibor* DEPT. OF COMPUTER SCIENCE, CROSS RIVER UNIVERSITY OF TECHNOLOGY, CALABAR, CROSS RIVER STATE NIGERIA E-mail address: [email protected] ABSTRACT A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly reported or announced. But how should a nation react to a zero day? This question is a concern for most national governments, and one that requires a systematic approach for its resolution. The securities of critical infrastructure of nations and states have been severally violated by cybercriminals. Nation-state espionage and the possible disruption and circumvention of the security of critical networks has been on the increase. Most of these violations are possible through detectable operational bypasses, which are rather ignored by security administrators. One common instance of a detectable operational bypass is the non-application of periodic security updates and upgrades from software and hardware vendors. Every software is not necessarily in its final state, and the application of periodic updates allow for the patching of vulnerable systems, making them to be secure enough to withstand an exploit. To have control over the security of critical national assets, a nation must be “cyber-ready” through the proper management of vulnerabilities and the deployment of the rightful technology in the cyberspace for hunting, detecting and preventing cyber-attacks and espionage. -
Last Summer, the World's Top Software-Security Experts Were
A DeclarationLast summer, the world’s top software-security experts were of Cyber-War panicked by the discovery of a drone-like computer virus, radically different from and far more sophisticated than any they’d seen. The race was on to figure out its payload, its purpose, and who was behind it. As the world now knows, the Stuxnet worm appears to have attacked Iran’s nuclear program. And, as MICHAEL JOSEPH GROSS reports, while its source remains something of a mystery, Stuxnet is the new face of 21st-century war: invisible, anonymous, and devastating 152 VANITY FAIR PHOTOGRAPHS BY JONAS FREDWALL KARLSSON APRIL 2011 A DeclarationLast summer, the world’s top software-security experts were of Cyber-War panicked by the discovery of a drone-like computer virus, radically different from and far more sophisticated than any they’d seen. The race was on to figure out its payload, its purpose, and who was behind it. As the world now knows, the Stuxnet worm appears to have attacked Iran’s nuclear program. And, as MICHAEL JOSEPH GROSS reports, while its source remains something of a mystery, Stuxnet is the new face of 21st-century war: invisible, anonymous, and devastating GAME OF SHADOWS Eugene Kaspersky, co-founder and C.E.O. of Kaspersky Lab— a Moscow-based computer-security company and an early investigator of Stuxnet—photographed on the Bolshoy Moskvoretsky Bridge, FOR DETAILS, GO TO VF.COM/CREDITS near the Kremlin. APRIL 2011 153 “PERSON OF INTEREST” Computer-security researcher Frank Rieger, one of the !rst to study the Stuxnet worm closely, at Berlin’s Chaos computer Club.