Security Threats and Trends
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Cyber-Conflict Between the United States of America and Russia CSS
CSS CYBER DEFENSE PROJECT Hotspot Analysis: Cyber-conflict between the United States of America and Russia Zürich, June 2017 Version 1 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Cyber-conflict between the United States of America and Russia Authors: Marie Baezner, Patrice Robin © 2017 Center for Security Studies (CSS), ETH Zürich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zürich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zürich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Baezner, Marie; Robin, Patrice (2017): Hotspot Analysis: Cyber-conflict between the United States of America and Russia, June 2017, Center for Security Studies (CSS), ETH Zürich. 2 Cyber-conflict between the United States of America and Russia Table of Contents 1 Introduction 5 2 Background and chronology 6 3 Description 9 3.1 Tools and techniques 9 3.2 Targets 10 3.3 Attribution and actors 10 4 Effects 11 4.1 Social and internal political effects 11 4.2 Economic effects 13 4.3 Technological effects 13 4.4 International effects 13 5 Consequences 14 5.1 Improvement of cybersecurity 14 5.2 Raising awareness of propaganda and misinformation 15 5.3 Observation of the evolution of relations between the USA and Russia 15 5.4 Promotion of Confidence Building Measures 16 6 Annex 1 17 7 Glossary 18 8 Abbreviations 19 9 Bibliography 19 3 Cyber-conflict between the United States of America and Russia Executive Summary Effects Targets: US State institutions and a political The analysis found that the tensions between the party. -
Interview Transcript of Andrew Brown
1 UNCLASSIFIED, COMMITTEE SENSITIVE EXECUTIVE SESSION PERMANENT SELECT COMMITTEE ON INTELLIGENCE, U.S. HOUSE OF REPRESENTATIVES, WASHINGTON, D.C. INTERVIEW OF: ANDREW BROWN Wednesday, August 30, 2017 Washington, D.C. The interview in the above matter was held in Room HVC-304, the Capitol, commencing at 10:04 a.m. UNCLASSIFIED, COMMITTEE SENSITIVE PROPERTY OF THE UNITED STATES HOUSE OF REPRESENTATIVES 2 UNCLASSIFIED, COMMITTEE SENSITIVE Appearances: For the PERMANENT SELECT COMMITTEE ON INTELLIGENCE: For ANDREW BROWN: MARK ELIAS, ESQ. GRAHAM M. WILSON, ESQ. PERKINS COIE POLITICAL LAW GROUP 700 13TH Street NW Suite 600 Washington, D.C. 20005 UNCLASSIFIED, COMMITTEE SENSITIVE PROPERTY OF THE UNITED STATES HOUSE OF REPRESENTATIVES 3 UNCLASSIFIED, COMMITTEE SENSITIVE Good morning. This is a transcribed interview of Mr. Andrew Brown. Thank you for coming in and speaking with us today. For the record, I'm a staff member with the House Permanent Select Committee on Intelligence for the majority. Also with me is -- from the majority staff. And -- with the minority staff. So before we begin, I just want to state a few things for the record. The questioning will be conducted by staff, as you see. During the course of this interview, members -- members will not -- staff will ask questions during their allotted time period. Some questions may seem basic, but that is because we need to clearly establish facts and understand the situation. Please do not assume we know any facts you have previously disclosed as part of any other investigation or review. During the course of this interview, we will take any breaks that you desire. -
The Russian Expat Leading the Fight to Protect America: in a War Against
4/12/2017 Russian Expat Founds CrowdStrike to Guard Against Russian Email Hackers - Who Is Dmitri Alperovitch? THE RUSSIAN EXPAT LEADING THE FIGHT TO PROTECT AMERICA IN A WAR AGAINST HACKERS, DMITRI ALPEROVITCH AND CROWDSTRIKE ARE OUR SPECIAL FORCES (AND PUTIN'S WORST NIGHTMARE). B Y V I C K Y W A R D O C T 2 4 , 2 0 1 6 3.1k t six o'clock on the morning of May 6, Dmitri Alperovitch woke up in a Los Angeles hotel to an alarming email. Alperovitch is the thirty-six-year-old A cofounder of the cybersecurity firm CrowdStrike, and late the previous night, his company had been asked by the Democratic National Committee to investigate a possible breach of its network. A CrowdStrike security expert had sent the DNC a proprietary software package, called Falcon, that monitors the networks of its clients in real time. Falcon "lit up," the email said, within ten seconds of being installed at the DNC: Russia was in the network. ADVERTISEMENT - CONTINUE READING BELOW http://www.esquire.com/news-politics/a49902/the-russian-emigre-leading-the-fight-to-protect-america/ 1/21 4/12/2017 Russian Expat Founds CrowdStrike to Guard Against Russian Email Hackers - Who Is Dmitri Alperovitch? Alperovitch, a slight man with a sharp, quick demeanor, called the analyst who had emailed the report. "Are we sure it's Russia?" he asked. Christopher Leaman The analyst said there was no doubt. Falcon had detected malicious software, or malware, that was stealing data and sending it to the same servers that had been used in a 2015 attack on the German Bundestag. -
Hacks, Leaks and Disruptions | Russian Cyber Strategies
CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia, -
Outstanding 50 LGBTI Leaders
2018 Outstanding 50 LGBTI Leaders In 2016, Deloitte released Australia’s first list of 50 LGBTI Executives, with the purpose of providing visible business role models to LGBTI Australians of all ages. This year, Deloitte is collaborating with Google to celebrate our Outstanding 50 LGBTI Leaders of 2018. Together, we are extremely proud to be recognising the many role models in business, beyond traditional large corporate organisations. We have taken an inclusive approach to include remarkable leaders from the public sector, government and small to medium-sized businesses alongside those in traditional corporate roles. For more on our Outstanding 50 LGBTI leaders of 2018 please visit www.deloitte.com/au/out50 2018 #out50 03 04 Message from Cindy Hook 08 Feyi Akindoyeni 46 Virginia Lovett 11 Dean Allright 49 Denise Lucero 06 Message from Jason Pellegrino 14 Andrew Barr MLA 50 Graeme Mason 15 Simone Bartley 51 Matthew McCarron 08 Profiles and interviews 16 Mark Baxter 52 Jennifer Morris 20 Nicole Brennan 53 Jude Munro AO 84 Our alumni 21 Councillor Tony Briffa JP 54 Rachel Nicolson 24 David Brine 55 Steve Odell 89 Diversity and inclusion 25 John Caldwell 56 Lisa Paul AO PSM 27 Magali De Castro 57 Luke Pellegrini 30 Emma Dunch 61 Neil Pharaoh 31 Cathy Eccles 62 Janet Rice 32 Luci Ellis 63 Anthony Schembri 33 Tiziano Galipo 64 Tracy Smart 34 Mark Gay 65 Dean Smith 35 Alasdair Godfrey 66 Jarther Taylor 36 Dr Cassandra Goldie 67 Michael Tennant 37 Matthew Groskorth 68 Amy Tildesley 39 Manda Hatter 69 Sam Turner 40 Jane Hill 74 Tea Uglow 41 Dawn Hough 75 Louis Vega 42 Steve Jacques 76 Tess Walsh 43 Leigh Johns OAM 79 Benjamin Wash 44 David Jones 80 Lisa Watts Contents 45 Jason Laufer 83 Penny Wong 04 2018 #out50 2018 #out50 05 Message from Cindy Hook, Chief involvement in bringing this next list of Executive Officer, Deloitte Australia: One of dynamic LGBTI Leaders into the public eye. -
The Australian Workplace Equality Index (Awei) 33
CONTENTS CELEBRATING10 YEARS OF PRIDE IN DIVERSITY 1 President of ACON Dr. Justin Koonin, CEO Nic Parkhill 2 Director Dawn Hough 4 Pride Inclusion Programs Team 2020 6 Our Patrons, Past & Present 11 THE BIRTH OF A PROGRAM 19 Program Beginnings 20 THE AUSTRALIAN WORKPLACE EQUALITY INDEX (AWEI) 33 Launch of the Australian Workplace Equality Index (AWEI) 34 10 years of AWEI Results & Recognition 42 Small Employer Gold Achievements 53 10 Years of Achievement Awards 54 PRIDE IN DIVERSITY IN ACTION 67 10 Years of Key Initiatives 75 THE BIRTH OF TWO NEW PRIDE INCLUSION PROGRAMS 85 Pride In Sport 86 Pride In Health + Wellbeing 89 RESPONDING TO COVID-19 91 LOOKING AHEAD: NEXT 5 YEARS FOR PRIDE IN DIVERSITY 93 A THANK YOU TO OUR SPONSORS 97 In our work with Pride in Diversity in Australia we should, without delay, be considering how we can help Australian and other multinational companies to take the lead in neighbouring regions. To spread the word that homophobia and transphobia are bad for business and bad for human rights. Increasingly, we must look beyond Australia. We should insist on equality in our own country. But we should also reach out to promote and support equality and good example beyond our borders. Pride in Diversity’s message must reach the four corners of the planet. THE HON. MICHAEL KIRBY AC CMG CELEBRATING 10 YEARS OF PRIDE IN DIVERSITY While many will remember 2020 ACON’S as a year of upheaval and change, we hope to remember it also as a PRESIDENT time to honour Pride in Diversity’s AND CEO extraordinary achievements over the past ten years. -
Official Aus-China Media Roundup 15 December
relationship Each week China Matters collates news items about the Australia-China relationship Media Roundup Issue 102 (15/12/18 – 20/12/18) 1. Ties with China testify to Australia’s deft handling of foreign policy 15/12/18 John Howard The Australian Australia should never sell short its foreign policy achievements. I reflected on this during the high-level dialogue I attended in Beijing last week. I had been invited by former foreign minister Julie Bishop to lead Australia’s delegation. High-level dialogues, which involve a mixture of diplomats, former ministers, business figures and cultural leaders, and are conducted under Chatham House rules, facilitate much more direct discussion than is sometimes possible in the more formal exchanges between government officials. At last week’s dialogue our team included former Labor foreign minister Stephen Smith, whose contributions reinforced to our Chinese hosts the essentially bipartisan character and continuity of Sino-Australian relations, and Jennifer Westacott of the Business Council of Australia. Journalist Rowan Callick and author Richard McGregor, who have extensive background knowledge of China, also attended. The participation of National Museum of Australia director Mathew Trinca emphasised cultural links. Read more (Paywall): https://www.theaustralian.com.au/news/inquirer/ties-with- china-testify-to-australias-deft-handling-of-foreign-policy/news- story/9d3dadd84c6ab64bc0ff6d813739a126 2. How the Huawei princess at the heart of the US-China trade war affects Australia 15/12/18 Jennifer Duke & David Wroe The Sydney Morning Herald The extraordinary arrest of Chinese tech heiress in Canada, at the request of the United States, on accusations of breaching sanctions against Iran could seem a world away from Australia. -
In the United States District Court for the Southern District of New York
Case 1:18-cv-03501-JGK Document 216 Filed 01/17/19 Page 1 of 111 IN THE UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF NEW YORK DEMOCRATIC NATIONAL COMMITTEE, ) Civil Action No. 1:18-cv-03501 ) JURY DEMAND Plaintiff, ) ) SECOND AMENDED v. ) COMPLAINT ) COMPUTER FRAUD AND ABUSE THE RUSSIAN FEDERATION; ) ACT (18 U.S.C. § 1030(a)) ARAS ISKENEROVICH AGALAROV; ) RICO (18 U.S.C. § 1962(c)) EMIN ARAZ AGALAROV; ) ) RICO CONSPIRACY (18 U.S.C. JOSEPH MIFSUD; ) § 1962(d)) WIKILEAKS; ) WIRETAP ACT (18 U.S.C. JULIAN ASSANGE; ) §§ 2510-22) DONALD J. TRUMP FOR PRESIDENT, INC.; ) ) STORED COMMUNICATIONS DONALD J. TRUMP, JR.; ) ACT (18 U.S.C. §§ 2701-12) PAUL J. MANAFORT, JR.; ) DIGITAL MILLENNIUM ROGER J. STONE, JR.; ) COPYRIGHT ACT (17 U.S.C. ) JARED C. KUSHNER; § 1201 et seq.) GEORGE PAPADOPOULOS; ) ) MISAPPROPRIATION OF TRADE RICHARD W. GATES, III; ) SECRETS UNDER THE DEFEND ) TRADE SECRETS ACT (18 U.S.C. Defendants. ) § 1831 et seq.) ) INFLUENCING OR INJURING ) OFFICER OR JUROR GENERALLY ) (18 U.S.C. § 1503) ) ) TAMPERING WITH A WITNESS, ) VICTIM, OR AN INFORMANT (18 ) U.S.C. § 1512) ) WASHINGTON D.C. UNIFORM ) TRADE SECRETS ACT (D.C. Code ) Ann. §§ 36-401 – 46-410) ) ) TRESPASS (D.C. Common Law) ) CONVERSION (D.C. Common Law) ) TRESPASS TO CHATTELS ) (Virginia Common Law) ) ) ) Case 1:18-cv-03501-JGK Document 216 Filed 01/17/19 Page 2 of 111 CONSPIRACY TO COMMIT TRESPASS TO CHATTELS (Virginia Common Law) CONVERSION (Virginia Common Law) VIRGINIA COMPUTER CRIMES ACT (Va. Code Ann. § 18.2-152.5 et seq.) 2 Case 1:18-cv-03501-JGK Document 216 Filed 01/17/19 Page 3 of 111 TABLE OF CONTENTS Page NATURE OF ACTION ................................................................................................................. -
Telstra Buys Stake in Southern Cross Cable
An iTWire publication www.itwire.com Editor: Stan Beer Wednesday 02 October 2019 TELSTRA BUYS STAKE IN SOUTHERN CROSS CABLE CommsWire (ISSN 2202-4549) is published by iTWire Pty Ltd. 18 Lansdown St, Hampton, Vic, 3188 CommsWire/Telecommunications Editor: Stan Beer Staff writers: Peter Dinham, Alex Zaharov-Reutt, Sam Varghese. Columnist: John de Ridder Advertising: CEO and Editor in Chief, Andrew Matler: [email protected] • Tel: 0412 390 000 TELSTRA TO BUY STAKE IN SOUTHERN CROSS CABLE NETWORK Telstra has put pen to paper with the signing of a conditional agreement to take up a 25% equity interest in the US$300 million trans-Pacific Southern Cross Cable Network (SCCN). Telstra’s signing of the conditional agreement follows its announcement in December last year of its inking of a terms of purchase agreement and intention to take up a 25% equity stake, joining existing shareholders - Spark New Zealand, Singtel and Verizon Business - in the cable company. Telstra Enterprise Group Executive, Michael Ebeid, said Telstra’s investment in the NEXT cable will deliver benefits to all its customers – from enterprise to wholesale and consumer. “With 80 per cent of all the internet traffic to Australia coming from the US, a high speed, low latency direct route to North America is a very important investment for our business and our customers,” Ebeid said. "Southern Cross builds on our existing footprint across Asia Pacific where we carry 30 per cent of the region’s active capacity. We are now even better placed to meet our customers' future data requirements right across Asia Pacific.” SCCN announced on Tuesday that conditional agreements have been executed and regulatory approvals have been obtained to enable construction of the subsea cable to soon begin. -
Cyber Security: Cyber Crime, Attacks and Terrorism
ODU UN Day 2020 Issue Brief GA First Committee (DISC) Cyber Security: Cyber Crime, Attacks and Terrorism Nick Myers ODU Model United Nations Society Introduction rise of cyber-attacks and the security measures against them in the hope of eliciting new Technology has revolutionized the international regulations regarding cyber interconnectedness of the globe. The flagship of security. Yet, the UN is not without problems of that globalization is the Internet. However, like its own in addressing the issues surrounding all other interconnecting technologies before it, cyber security and cyber terrorism. the Internet can become a weapon in the eyes of states, criminals, and terrorists alike. Known as Broadly, the UN is faced with a major roadblock either cyber war or cyber conflict, these attempts related to cyber. Member States have varied to disrupt information technology systems have positions on whether the UN should have provoked an increasingly desperate debate on oversight over what a nation does in cyberspace. how to respond. Some Member States insist current international laws can sufficiently deal with cyber threats. Other Member States fear expanding international law will be used to narrow their national power, or might undermine their freedom of action. Currently, cyberspace is viewed as an extension of international law, meaning cyber-attacks are viewed as legally the same as physical attacks rather than as separate issue without its own norms. There is some interest within the General Assembly and the Security Council to address cyber threats by creating new norms for cyber response and use. But the disconnect between As UN Member States struggle to protect their the international dangers and national networks and linked infrastructure from capabilities in cyberspace weakens the potential disruption, security against foreign-based attacks for forceful UN action, even when it is needed has become vital. -
From Russia with Love: Understanding the Russian Cyber Threat to U.S. Critical Infrastructure and What to Do About It
CORE Metadata, citation and similar papers at core.ac.uk Provided by DigitalCommons@University of Nebraska Nebraska Law Review Volume 96 | Issue 2 Article 5 2017 From Russia with Love: Understanding the Russian Cyber Threat to U.S. Critical Infrastructure and What to Do about It Scott .J Shackelford Indiana University, [email protected] Michael Sulmeyer Harvard University, [email protected] Amanda N. Craig Deckard Microsoft Ben Buchanan Harvard University, [email protected] Brian Micic Indiana University Maurer School of Law Follow this and additional works at: https://digitalcommons.unl.edu/nlr Recommended Citation Scott .J Shackelford, Michael Sulmeyer, Amanda N. Craig Deckard, Ben Buchanan, and Brian Micic, From Russia with Love: Understanding the Russian Cyber Threat to U.S. Critical Infrastructure and What to Do about It, 96 Neb. L. Rev. 320 (2017) Available at: https://digitalcommons.unl.edu/nlr/vol96/iss2/5 This Article is brought to you for free and open access by the Law, College of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Nebraska Law Review by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. Scott J. Shackelford, Michael Sulmeyer, Amanda N. Craig Deckard, Ben Buchanan & Brian Micic* From Russia with Love: Understanding the Russian Cyber Threat to U.S. Critical Infrastructure and What to Do About It TABLE OF CONTENTS I. Introduction .......................................... 321 II. A Short History of Russian Hacking of U.S. Government Networks and Critical Infrastructure ..... 322 III. Unpacking the Ukraine Grid Hacks and Their Aftermath ............................................ 324 IV. Analyzing Policy Options to Help Promote the Resilience of U.S. -
Incentivizing Comprehensive Cybersecurity Solutions by Matching Accountability to Capability
POLICY ANALYSIS EXERCISE Incentivizing Comprehensive Cybersecurity Solutions by Matching Accountability to Capability Kevin Mott Master in Public Policy Candidate, Harvard Kennedy School Olivia Volkoff Master in Public Policy Candidate, Harvard Kennedy School PAPER MAY 2018 Belfer Center for Science and International Affairs Harvard Kennedy School 79 JFK Street Cambridge, MA 02138 www.belfercenter.org Statements and views expressed in this report are solely those of the author and do not imply endorsement by Harvard University, the Harvard Kennedy School, or the Belfer Center for Science and International Affairs. This paper was completed as a Harvard Kennedy School Policy Analysis Exercise, a yearlong project for second-year Master in Public Policy candidates to work with real-world clients in crafting and presenting timely policy recommendations. Design & layout by Andrew Facini Cover photo: Adobe Stock Copyright 2018, President and Fellows of Harvard College Printed in the United States of America POLICY ANALYSIS EXERCISE Incentivizing Comprehensive Cybersecurity Solutions by Matching Accountability to Capability Kevin Mott Master in Public Policy Candidate, Harvard Kennedy School Olivia Volkoff Master in Public Policy Candidate, Harvard Kennedy School PAPER MAY 2018 About the Authors Olivia Volkoff is a recent graduate of the Master in Public Policy program at the Harvard Kennedy School and the Master in Business Administration program at Harvard Business School. During this period, she served as both a George and Rubenstein Fellow at the Center for Public Leadership as well as a Belfer International and Global Affairs Fellow. Prior to her graduate studies, Olivia graduated from Harvard College and served as a U.S. Naval officer and engineer at Naval Reactors Headquarters.