Report of the of Report Task Force Task Digital Cyber

Total Page:16

File Type:pdf, Size:1020Kb

Report of the of Report Task Force Task Digital Cyber U.S. Department of Justice REPORT OF THE Cyber -Digital Task Force Report Force Cyber -Digital Task ATTORNEY GENERAL’S CYBER DIGITAL TASK FORCE REPORT OF THE ATTORNEY GENERAL’S CYBER DIGITAL TASK FORCE United States Department of Justice Office of the Deputy Attorney General Cyber-Digital Task Force 950 Pennsylvania Avenue, N.W. Washington, D.C. 20530 https://www.justice.gov/cyberreport INTRODUCTION Table of Contents Letter from the Deputy Attorney General .............................. i Attorney General’s Cyber-Digital Task Force ...................... vii Introduction ........................................................................................ xi Chapter 1 Countering Malign Foreign Influence Operations ...................... 1 Chapter 2 Categorizing Sophisticated Cyber Schemes .................................... 23 Chapter 3 Detecting, Deterring, and Disrupting Cyber Threats ............... 49 Chapter 4 Responding to Cyber Incidents .............................................................. 83 Chapter 5 Training and Managing Our Workforce .......................................... 95 Chapter 6 Looking Ahead ..............................................................................................109 Appendices Appendix 1: Memorandum Establishing the Task Force .......... 131 Appendix 2: Recent Successful Botnet Disruptions ................. 133 Appendix 3: Recent Successful Dark Web Disruptions ............ 137 Appendix 4: Glossary of Key Terms .....................................................141 v TASK FORCE MEMBERS ATTORNEY GENERAL’S CYBER-DIGITAL TASK FORCE Task Force Members Sujit Raman, Chair Associate Deputy Attorney General Office of the Deputy Attorney General John P. Cronan Andrew E. Lelling Assistant Attorney General (Acting) United States Attorney Criminal Division District of Massachusetts John C. Demers David T. Resch Assistant Attorney General Executive Assistant Director National Security Division Federal Bureau of Investigation Carl Ghattas Beth A. Williams Executive Assistant Director Assistant Attorney General Federal Bureau of Investigation Office of Legal Policy John M. Gore Peter A. Winn Assistant Attorney General (Acting) Chief Privacy & Civil Liberties Officer (Acting) Civil Rights Division Director, Office of Privacy & Civil Liberties CYBER-DIGITAL TASK FORCE REPORT Task Force Contributors Matthew J. Sheehan Counsel to the Deputy Attorney General Staff Director Elizabeth Aloi Brendan Groves Erica O’Neil Leonard Bailey Aarash Haghighat Richard Pilger Michael F. Buchwald William Hall Jason Poole Mark Champoux Christopher Hardee Andrew Proia Thomas Dettore Adam Hickey Kimberley Raleigh Richard Downing Ray Hulser Peter Roman Benjamin Fitzpatrick Anitha Ibrahim Opher Shweiki Lindsey Freeman Matthew Kluge Michael Stawasz Tashina Gauhar John T. Lynch, Jr. Andrew Warden Josh Goldfoot Katrina Mulligan J. Brad Wiegmann Bonnie Greenberg Sean Newell Cory Wilson And representatives from: Bureau of Alcohol, Tobacco, Firearms, and Explosives Office of Strategic Intelligence & Information Drug Enforcement Administration Office of Investigative Technology Federal Bureau of Investigation Counterintelligence Division Federal Bureau of Investigation Counterterrorism Division Federal Bureau of Investigation Criminal Investigative Division Federal Bureau of Investigation Cyber Division Federal Bureau of Investigation Digital Transformation Office Federal Bureau of Investigation Information Technology Branch Federal Bureau of Investigation Office of Private Sector Federal Bureau of Investigation Office of the Chief Information Officer Federal Bureau of Investigation Office of the Director Federal Bureau of Investigation Office of the General Counsel Federal Bureau of Investigation Operational Technology Division INTERPOL Washington, the U.S. National Central Bureau Justice Management Division Office of the Chief Information Officer/ Cybersecurity Services Staff United States Marshals Service Investigative Operations Division United States Marshals Service Judicial Security Division viii INTRODUCTION Introduction Cyber-enabled attacks are exacting an enormous toll on American busi- nesses, government agencies, and families. Computer intrusions, cy- bercrime schemes, and the covert misuse of digital infrastructure have bankrupted firms, destroyed billions of dollars in investments, and helped hostile foreign governments launch influence operations de- signed to undermine fundamental American institutions. The Department of Justice’s primary mission is to keep the American people safe. We play a critical role in the federal government’s shared effort to combat malicious, cyber-enabled threats. n February 2018, the Attorney General policy—grounded in our longstanding prin- established a Cyber-Digital Task Force ciples of political neutrality, adherence to within the Department and directed the the rule of law, and safeguarding the public ITask Force to answer two basic, foundational trust—that governs the disclosure of foreign questions: How is the Department respond- influence operations. ing to cyber threats? And how can federal law enforcement more effectively accomplish its Chapters 2 and 3 discuss other cyber-enabled mission in this important and rapidly evolv- threats our Nation faces, particularly those ing area? connected with cybercrimes. These chapters describe the resources the Department is de- This report addresses the first question. It be- ploying to confront those threats, and how our gins by focusing on one of the most press- efforts further the rule of law in this country ing cyber-enabled threats our Nation faces: and around the world. Chapter 4 focuses on the threat posed by malign foreign influence a critical aspect of the Department’s mission, operations. Chapter 1 explains what foreign in which the Federal Bureau of Investigation influence operations are, and how hostile for- plays a lead role: responding to cyber inci- eign actors have used these operations to tar- dents. Chapter 5 then turns the lens inward, get our Nation’s democratic processes, includ- focusing on the Department’s efforts to recruit ing our elections. This chapter concludes by and train our own personnel on cyber mat- describing the Department’s protective efforts ters. Finally, the report concludes in Chapter with respect to the upcoming 2018 midterm 6 with thoughts and observations about cer- elections, and announces a new Department tain priority policy matters, and charts a path xi CYBER-DIGITAL TASK FORCE REPORT for the Task Force’s future work. Over the criminals rely upon to penetrate our borders. next few months, the Department will build We use legal authorities to take control of upon this initial report’s findings, and will virtual infrastructure—such as networks of provide recommendations to the Attorney compromised computers called “botnets”— General for how the Department can even to prevent future victimization. We share in- more efficiently manage the growing global formation gathered during our investigations cyber challenge. to help victims protect themselves. And we do all of these things to fight modern threats The Department’s Cyber Mission while remaining faithful to our Nation’s re- spect for personal freedom, civil liberties, Computer intrusions and attacks are crimes, and the rule of law. and the Department of Justice fights crime. That is true regardless of whether the crimi- Where appropriate, we also work closely nal is a transnational organized crime group, with our interagency partners to support fi- a lone hacker, or an officer of a foreign mil- nancial, diplomatic, and military measures itary or intelligence organization. In addi- to bring all possible instruments of national tion, the Department has unique and indis- power to bear against cyber threats. Other pensable cybersecurity roles in the realm of departments have the primary responsibil- foreign intelligence and counterintelligence. ity for helping victims recover from cyber- attacks; we have the primary responsibility In fighting criminal computer intrusions and for conducting the investigation into who is attacks, the Department identifies, disman- responsible. We do not have the federal gov- tles, and disrupts cyber threats. In doing so, ernment lead for assisting election officials we provide justice to victims and deter others in securing their systems, but we do have the from committing similar offenses. To fulfill primary responsibility for investigating our our mission, we deploy criminal justice and foreign adversaries’ efforts to target election intelligence tools to find malicious hackers, arrest them, incarcerate them, and require infrastructure. them to pay restitution to their victims. We shut down the dark markets criminals de- Similarly, we do not have the government’s pend upon to buy and sell stolen informa- lead role in protecting private or government tion. We deprive criminals of the tools and networks, in designing security standards, services they use to attack American families or in regulating how the private sector must and businesses. Working with private sec- defend itself. Those are important functions tor partners, we seek to deny foreign gov- for which other government departments ernments the infrastructure they would use take responsibility—often, with our support to conduct illegal influence operations. We and assistance. Our mission is to enforce the seize or disable the servers, domain names, law, to ensure public safety, and to seek just and other infrastructure that transnational
Recommended publications
  • Department of Justice
    DEPARTMENT OF JUSTICE Main Justice Building 950 Pennsylvania Avenue, NW., Washington, DC 20530, phone (202) 514–2000 http://www.usdoj.gov JOHN ASHCROFT, Attorney General, born on May 9, 1942, in Chicago, IL; education: Yale University, graduated with honors, 1964; University of Chicago School of Law, 1967; professional: taught business law at Southwest Missouri State University; and authored, or coauthored, several publications; public service: Missouri Auditor, 1973–1975; Missouri Attor- ney General, 1976–1985; Governor of Missouri, 1985–1993; Chairman, National Governors Association, 1991; U.S. Senate, 1995–2001; family: married to Janet Ashcroft, 1967; three children: Martha, John, and Andrew; nominated by George W. Bush to become the Attorney General of the United States on December 22, 2000, and was confirmed by the U.S. Senate on February 1, 2001. OFFICE OF THE ATTORNEY GENERAL Main Justice Building, Room 5111 Pennsylvania Avenue, NW., 20530, phone (202) 514–2001 Attorney General.—John Ashcroft. Chief of Staff.—David T. Ayres, room 5216, 514–3892. Deputy Chief of Staff and Counsel.—David M. Israelite, room 5222, 514–2291. Counselor to the Attorney General.—Jeffrey Taylor, room 5110, 514–2107. Counsel to the Attorney General: John Wood, 514–2001. Director of Scheduling and Advance.—Andrew A. Beach, room 5133, 514–4195. Advisor to the Attorney General and Deputy White House Liaison.—Susan M. Richmond, room 5214, 514–2927. Confidential Assistant to the Attorney General.—Janet M. Potter, room 5111, 514–2001. OFFICE OF THE DEPUTY ATTORNEY GENERAL Main Justice Building, Room 4111, phone (202) 514–2101 Deputy Attorney General.—James Comey. Principal Associate Deputy Attorney General.—Stuart A.
    [Show full text]
  • ASEC REPORT Malicious Code Trend 5 6 Vol.17 Security Trend Web Security Trend
    Disclosure to or reproduction for others without the specific written authorization of AhnLab is prohibited. ASEC Copyright (c) AhnLab, Inc. All rights reserved. REPORT VOL.17 | 2011.6 AhnLab Monthly Security Report AhnLab ASEC (AhnLab Security Emergency Response Center) is a Security global security response group consisting of virus analysts and CONTENTS Emergency security experts. This monthly report is published by ASEC, response and it focuses on the most significant security threats and the latest security technologies to guard against these threats. For 01. Malicious Code Trend 02. Security Trend Center further information about this report, please refer to AhnLab, a. Malicious Code Statistics 05 a. Security Statistics 14 Inc.’s homepage (www.ahnlab.com). - Top 20 Malicious Code Reports - Microsoft Security Updates- May 2011 - Top 20 Malicious Code Variant Reports b. Malicious Code Issues 16 - Breakdown of Primary Malicious Code Types - Comparison of Malicious Codes with - Zeus Source Code Leaked and Spyeye Trend Previous Month - Coreflood, a Banking Trojan - Monthly Malicious Code Reports - Online Banking Hacking Scam - Top 20 New Malicious Code Reports - Breakdown of New Malicious Code Types 03. Web Security Trend b. Malicious Code Issues 10 a. Web Security Statistics 17 - 'Dislike' Button Scam - Web Security Summary - AntiVirus AntiSpyware 2011 Scam - Monthly Blocked Malicious URLs - Scam Emails From Bobijou Inc. - Monthly Reported Types of Malicious Code - Spam Promising Nude Photo Spreads Malware - Monthly Domains with Malicious Code - Osama Bin Laden Themed Malware - Monthly URLs with Malicious Code - Distribution of Malicious Codes by Type - Top 10 Distributed Malicious Codes b. Web Security Issues 20 - May 2011 Malicious Code Intrusion: Website ASEC REPORT Malicious Code Trend 5 6 Vol.17 Security Trend Web Security Trend 01.
    [Show full text]
  • Homeland Threats and Agency Responses”
    STATEMENT OF ROBERT S. MUELLER, III DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED “HOMELAND THREATS AND AGENCY RESPONSES” PRESENTED SEPTEMBER 19, 2012 Statement of Robert S. Mueller, III Director Federal Bureau of Investigation Before the Committee on Homeland Security and Governmental Affairs United States Senate At a Hearing Entitled “Homeland Threats and Agency Responses” Presented September 19, 2012 Good morning, Chairman Lieberman, Ranking Member Collins, and Members of the Committee. Thank you for the opportunity to appear before the Committee today and for your continued support of the men and women of the FBI. As you know, the Bureau has undergone unprecedented transformation in recent years. Since the attacks of September 11th, we have refocused our efforts to address and prevent emerging terrorist threats. The terrorist threat is more diverse than it was 11 years ago, but today, we in the FBI are better prepared to meet that threat. We also face increasingly complex threats to our nation’s cyber security. Nation-state actors, sophisticated organized crime groups, and hackers for hire are stealing trade secrets and valuable research from America’s companies, universities, and government agencies. Cyber threats also pose a significant risk to our nation’s critical infrastructure. As these threats continue to evolve, so too must the FBI change to counter those threats. We must continue to build partnerships with our law enforcement and private sector partners, as well as the communities we serve. Above all, we must remain firmly committed to carrying out our mission while protecting the civil rights and civil liberties of the people we serve.
    [Show full text]
  • LIVE Or DELAYED STATION CLEARANCES CRUZ / O'rourke
    LIVE or DELAYED STATION CLEARANCES CRUZ / O’ROURKE U.S. SENATE DEBATE Tuesday, Oct. 16, 2018 KENS‐TV / San Antonio (As of Friday, 10/12/18 @ 11 AM) MARKET CALL SIGN CHAN./FREQ. NETWORK LIVE/DELAY TIME/DATE LANGUAGE STREAM WEBSITE Abilene KXVA‐TV 15.1 FOX LIVE 8 pm English Yes www.fox15abilene.com Amarillo KACV‐TV 2.1 PBS LIVE 8 pm English ‐‐ ‐‐ Austin KVUE‐TV 24.1 ABC LIVE 8 pm English Yes www.kvue.com Austin KLRU‐TV 18.1 PBS DELAYED 9pm English ‐‐ ‐‐ Beaumont KBMT‐TV 12.1 ABC LIVE 8 pm English Yes www.12newsnow.com Beaumont KJAC‐TV 12.2 NBC LIVE 8 pm English ‐‐ ‐‐ Corpus Christi KIII‐TV 3.1 ABC LIVE 8 pm English Yes www.kiiitv.com Corpus Christi KEDT‐TV 16.1 PBS DELAYED 10 pm English ‐‐ ‐‐ Dallas‐Fort Worth WFAA‐TV 8.1 ABC LIVE 8 pm English Yes www.wfaa.com Dallas‐Fort Worth KERA‐TV 13.1 PBS DELAYED 10 pm English ‐‐ ‐‐ Del Rio KTPD‐FM 89.3 NPR LIVE 8pm English ‐‐ ‐‐ El Paso KFOX‐TV 14.2 Comet LIVE 8 pm English Yes www.kfoxtv.com El Paso KVIA‐TV 7.1 ABC ‐‐ ‐‐ English Yes www.kvia.com Gonzales KCTI‐AM 1450 NPR LIVE 8pm English ‐‐ ‐‐ Harlingen‐Weslaco‐ KRGV‐TV 5.2 Ind. LIVE 8 pm English Yes www.krgv.com Brownsville‐McAllen Harlingen‐Weslaco‐ KGBT‐TV 4.1 CBS ‐‐ ‐‐ English Yes www.valleycentral.com Brownsville‐McAllen Houston KHOU‐TV 11.1 CBS LIVE 8 pm English Yes www.khou.com Houston KUHF‐FM 88.7 NPR DELAYED 9pm English ‐‐ ‐‐ Llano‐Highland Lakes KVHL‐FM 91.7 NPR LIVE 8pm English ‐‐ ‐‐ Lubbock KJTV‐CD 32.1 FOX34 NewsNow LIVE 8 pm English Yes www.fox34.com Lubbock KTTZ‐TV 5.1 PBS LIVE 8 pm English ‐‐ Repeating 10/21 at 9 am and 6 pm Odessa‐Midland
    [Show full text]
  • Station City Title Year Accomplishment KARE-TV
    Station City Title Year Accomplishment KARE-TV Minneapolis 2001 Overall Excellence KARE-TV Minneapolis 2000 Overall Excellence KARE-TV Minneapolis 2000 Feature Reporting KARE-TV Minneapolis 2000 News Documentary KARE-TV Minneapolis 2000 Sports Reporting KARE-TV Minneapolis 2000 Spot News Coverage KARE-TV Minneapolis 2001 Overall Excellence KARE-TV Minneapolis The Bitter Pill 2001 Investigative Reporting KARE-TV Minneapolis KARE 11 News at 10 p.m. 2001 Newscast KARE-TV Minneapolis Fishing for Love 2001 Use of Video KATU-TV Portland, OR 2000 Continuing Coverage KCBS-TV Los Angeles California's Billion Dollar Rip Off 2001 News Series KCBS-TV Los Angeles 2000 Investigative Reporting KCBS-TV Los Angeles 2000 News Series KCBS-TV Los Angeles California's Billion Dollar Ripoff 2001 News Series KCNC-TV Denver Erin's Live3/4 10 Years Later 2001 Feature Reporting KCNC-TV Denver 2000 Spot News Coverage KCNC-TV Denver 2000 Use of Video KCNC-TV Denver Erin's Live - Ten Years Later 2001 Feature Reporting KCNC-TV Denver Houseboat Investigation 2001 Investigative Reporting KCOP-TV Los Angeles 2000 Continuing Coverage KCOP-TV Los Angeles Marlin Briscoe 2001 Sports Reporting KCRA-TV Sacramento 2000 Newscast KENS-TV San Antonio Tommy Lynn Sells 2001 Continuing Coverage KGTV San Diego Electric Shock 2001 Continuing Coverage KGW-TV Portland, OR Michael's Big Game 2001 Feature Reporting KGW-TV Portland, OR Vermiculite Investigation 2001 News Series KGW-TV Portland, OR kgw.com 2001 Web Site KHOU-TV Houston Treading On Danger 2001 Investigative Reporting KHOU-TV
    [Show full text]
  • Review of the Department of Justice's Implementation of the Death In
    Office of the Inspector General U.S. Department of Justice OVERSIGHT INTEGRITY GUIDANCE Review of the Department of Justice’s Implementation of the Death in Custody Reporting Act of 2013 Evaluation and Inspections Division 19-01 December 2018 Introduction The Department Has Not Yet Collected State Arrest- Related Death Data Despite DCRA’s Requirement to Do Congress enacted the Death in Custody Reporting Act of So by Fiscal Year 2016 2013 (DCRA) to address the lack of reliable information about law enforcement-related deaths and deaths in We found that, despite the DCRA requirement to collect correctional institutions. DCRA requires state and federal and report state arrest-related death data by fiscal year law enforcement agencies to report to the Attorney (FY) 2016, the Department does not expect to begin its General information regarding the death of any person collection of this data until the beginning of FY 2020. who is (1) detained by law enforcement, (2) under This is largely due to the Department having considered, arrest, (3) in the process of being arrested, (4) en route and abandoned, three different data collection proposals to be incarcerated or detained, or (5) incarcerated at any since 2016. correctional facility. To encourage state reporting, DCRA If Implemented as Planned, DOJ’s State DCRA Collection Will authorizes the Attorney General to withhold up to Be Duplicative of Other Department Efforts and May Not 10 percent of Edward Byrne Memorial Justice Assistance Result in Complete Data Collection Grant Program funds from states that do not comply with DCRA reporting requirements. We cannot assess the effectiveness of the Department’s state DCRA data collection because it has not begun; The Office of the Inspector General (OIG) conducted this however, we found that the Department’s current state review to evaluate the U.S.
    [Show full text]
  • Federal Register/Vol. 85, No. 103/Thursday, May 28, 2020
    32256 Federal Register / Vol. 85, No. 103 / Thursday, May 28, 2020 / Proposed Rules FEDERAL COMMUNICATIONS closes-headquarters-open-window-and- presentation of data or arguments COMMISSION changes-hand-delivery-policy. already reflected in the presenter’s 7. During the time the Commission’s written comments, memoranda, or other 47 CFR Part 1 building is closed to the general public filings in the proceeding, the presenter [MD Docket Nos. 19–105; MD Docket Nos. and until further notice, if more than may provide citations to such data or 20–105; FCC 20–64; FRS 16780] one docket or rulemaking number arguments in his or her prior comments, appears in the caption of a proceeding, memoranda, or other filings (specifying Assessment and Collection of paper filers need not submit two the relevant page and/or paragraph Regulatory Fees for Fiscal Year 2020. additional copies for each additional numbers where such data or arguments docket or rulemaking number; an can be found) in lieu of summarizing AGENCY: Federal Communications original and one copy are sufficient. them in the memorandum. Documents Commission. For detailed instructions for shown or given to Commission staff ACTION: Notice of proposed rulemaking. submitting comments and additional during ex parte meetings are deemed to be written ex parte presentations and SUMMARY: In this document, the Federal information on the rulemaking process, must be filed consistent with section Communications Commission see the SUPPLEMENTARY INFORMATION 1.1206(b) of the Commission’s rules. In (Commission) seeks comment on several section of this document. proceedings governed by section 1.49(f) proposals that will impact FY 2020 FOR FURTHER INFORMATION CONTACT: of the Commission’s rules or for which regulatory fees.
    [Show full text]
  • Pirates of the Isps: Tactics for Turning Online Crooks Into International Pariahs
    21st CENTURY DEFENSE INITIATIVE CyBER SECuRITy #1 July 2011 Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman 1775 Massachusetts Ave., NW Washington, D.C. 20036 brookings.edu Pirates of the ISPs: Tactics for Turning Online Crooks Into International Pariahs Noah Shachtman CyberSeCurity #1 July 2011 21st CENTURY DEFENSE INITIATIVE Acknowledgements every research paper is a group effort, no mat- My Wired.com colleagues—ryan Singel, kevin ter what it says on the byline. this project relied Poulsen, kim Zetter and David kravets—cover more on outside assistance than most. brookings the cybersecurity beat better than anyone. this Senior fellows Peter Singer and ken lieberthal paper would have been impossible without them, were the ones who convinced me to explore the and without brian krebs, master investigator of broad topic of cybersecurity. the panel they as- the online underworld. sembled gave me new insight with every meeting; my colleague allan friedman was an especially bill Woodcock, rick Wesson, Jeff Cooper, tyler invaluable tutor and remarkably generous with Moore, audrey Plonk, Jim lewis, Dmitri alpero- his time. heather Messera and robert o’brien vitch, Paul Nicholas, Jessica herrera-flannigan, provided important research and logistical sup- Jart armin, richard bejtlich, Steve Schleien, Jona- port. My research assistant, adam rawnsley, was than Zittrain and many, many others steered me tireless in his exploration of the minutiae of ev- away from my worst ideas and towards those few erything from tort law to pirate havens. not-so-bad ones. for that, i am deeply in their debt. brookings recognizes that the value it provides to any supporter is in its absolute commitment to quality, independence and impact.
    [Show full text]
  • Forensics 2Ème Partie
    actu l’ACTUSÉCU est un magazine numérique rédigé et éditésécu par les consultants du cabinet de conseil XMCO 34MAI 2013 SPÉCIAL INVESTIGATIONS Forensics 2ème partie Investigations Forensics Les étapes et réflexes essentiels pour la réalisation d’une mission forensics. APT1 Résumé et analyse de l’étude menée par Mandiant. Conférences BlackHat, JSSI et HITB. Actualité du moment Analyses du malware Dervec, de la vulnérabilité Java (CVE-2013-0422) et des at- - taques 0day ciblant ColdFusion. buildscharac Et toujours… les logiciels et nos Twitter favoris ! 1 Ce document est la propriété du cabinet XMCO. Toute reproduction est strictement interdite. ® we deliver security expertise www.xmco.fr 2 Ce document est la propriété du cabinet XMCO. Toute reproduction est strictement interdite. édito MAI 2013 [ 45 millions de dollars.... 5 millions chacun ] Ils sont neuf. Ils ont agi dans 27 pays et sont allés jusqu’à retirer 2,4 millions dans des distributeurs automatiques de billets : plus de 40 000 retraits en espèces !!! Bref, un job à plein temps, particulièrement bien rémunéré, mais qui comporte quand même quelques risques... Voici, en synthèse, la news qui est tombée le 10 mai 2013. Comment ne pas la reprendre dans le deuxième numéro de l’ActuSécu consacré au Forensic ? Attention, n’y voyez aucune espèce d’opération marketing conjointe : nous n’avons pas mandaté ces cybercriminels pour promouvoir l’activité de recherche de preuve ! Plusieurs anomalies, dont cette phrase, se trouvent dans cet édito. J’ai fait cela parce que personne ne fait jamais aucun retour sur mon unique contribution à notre magazine. Mais il faut bien admettre que cette information vient confirmer un phénomène de plus en plus constaté : la reconversion d’une partie de la criminalité vers la cybercriminalité.
    [Show full text]
  • An Interdisciplinary Introduction
    Index # See OMB and, 82, 83–84 2-factor authentication, 57, 295, 296 Paperwork Reduction Act, 82 9/11/2001. September 11, 2001 supply chain security, 166, 170 60-Day Cyberspace Policy Review, 100–101, 130, 259 active responses to threats, 207–208, 237–238 256-bit encryption, 193 acts of law, 263 300A and 300B reports, 170 actual cost (AC), 152–154, 156, 299–300, 302 414s (hackers), 6 ACWP (actual cost of work performed), 152 1930s IT infrastructure, 185 “adequate security,” 171 1940s IT infrastructure, 75 Administrative Procedure Act (APA), 266 1950s IT infrastructure, 75–76, 185¬ advanced notices of proposed rulemaking (ANPR), 260, 1960s cybersecurity issues, 4, 76–77, 95 266 1970s cybersecurity issues, 5, 179 advanced persistent threats (APTs), 203–204, 276,- 277 1980s cybersecurity issues, 4–9, 77–81, 82, 185 Advanced Research Projects Agency (ARPA), 4 1990s cybersecurity issues, 9, 81–90, 223–225, 276 Advanced Research Projects Agency Network (AR 2000s cybersecurity issues, 9, 89, 90–101, 220, 276 agenciesPANET), 4, 179 A2010s cybersecurity issues, 10, 101–104, 221–222, 276 African Network Information Centre (AfriNIC), 278 A circulars. See under civilian.audits, 241 See civilian agencies OMB budgets, 260 AC (actual cost), 152–154, 156, 299–300, 302 acceptable levels of risk, 36 classified/unclassified protective markings, 79 acceptable quality level (AQL), 145 compliance standards, 168–169 accepting risks, 16, 20, 22, 60–61 creation of, 266 access codes, 236 cybersecurity policy role, 69–70 access points, 233, 258 Federal Register rules publication, 260 accessibility of systems intelligence.FISMA requirements, See intelligence 97–98, agencies 171 corporate systems, 233 impact on projects, 123 health care systems, 224 military.
    [Show full text]
  • TEXAS ASSOCIATED PRESS BROADCASTERS 2018 Winners
    TEXAS ASSOCIATED PRESS BROADCASTERS 2018 Winners and Judges’ Comments TELEVISION I, II, RADIO I, II COMBINED: Jordan Flaherty Award First Place KDFW-TV, Dallas TAPB-Freedom of Information Foundation of Texas Award First Place KXAN-TV, Austin TELEVISION I and II COMBINED: Overall Excellence-TV First Place KHOU-TV, Houston RADIO I and II COMBINED: Overall Excellence-Radio First Place WTAW-AM, College Station TELEVISION I: Commentary-Editorial First Place An effective entry, with other voices lending perspective. The KVUE-TV, Austin sharing of social media posts was particularly effective. Stacy Slayden "Quiet No More" Second Place KENS-TV, San Antonio Concise, direct, fair commentary. Evan Closky 1 TEXAS ASSOCIATED PRESS BROADCASTERS 2018 Winners and Judges’ Comments Feature (Light) First Place Well done! Informative and entertaining - with great KENS-TV, San Antonio storytelling. Deborah Knapp and Michael Humphries "Last of the Lanes: The 9-Pin Bowling Clubs of Texas" Second Place KENS-TV, San Antonio So interesting! The characters made the day here. Deborah Knapp and Michael Humphries "Something Fishy in the Basement" Investigative Report First Place WFAA-TV, Dallas-Fort Worth Tanya Eiserer and Mark Smith "Atmos Gas Explosion" Second Place KXAN-TV, Austin "Denied" Photojournalism-Station First Place KHOU should be very proud of its photographers. The stories KHOU-TV, Houston are filled with beautiful video, great lighting, interesting camera angles and very nice use of nats. Great job! Second Place KENS-TV, San Antonio Good reporter standup section and military video. Great "Mejor Bella Que Perfecta" photography and great use of nats. 2 TEXAS ASSOCIATED PRESS BROADCASTERS 2018 Winners and Judges’ Comments Photojournalism-Individual First Place Beautiful photography, great lighting, very nice use of nats, KHOU-TV, Houston music and creative camera angles.
    [Show full text]
  • KTAB Tvixstudy
    tvstudy v2.2.2 Database: localhost, Study: DTVBL59988 (97), Model: Longley-Rice Start: 2017.06.22 14:41:03 Study created: 2017.06.22 14:40:44 Study build station data: LMS TV 2017-06-14 (5) Proposal: KTAB-TV D30 DT BL ABILENE, TX File number: DTVBL59988 Facility ID: 59988 Station data: User record Record ID: 74 Country: U.S. Stations potentially affected: Call Chan Svc Status City, State File Number Distance KRBC-TV D29 DT LIC ABILENE, TX BLCDT20070831AAK 0.0 km KDTN D29 DT BL DENTON, TX DTVBL49326 249.4 KMPX D30 DT LIC DECATUR, TX BLCDT20060317AGE 249.1 KPLE-CD D30 DC LIC KILLEEN, TX BLDTL20090416ASY 220.0 KPLE-CD D30 DC CP KILLEEN, TX BPDTA20130211ACF 220.0 KWWT D30 DT LIC ODESSA, TX BLCDT20090612AJT 255.1 KABB D30 DT LIC SAN ANTONIO, TX BLCDT20100527AFI 355.3 KAZD D31 DT BL LAKE DALLAS, TX DTVBL17433 249.2 KLBK-TV D31 DT BL LUBBOCK, TX DTVBL3660 253.3 No non-directional AM stations found within 0.8 km No directional AM stations found within 3.2 km Record parameters as studied: Channel: D30 Latitude: 32 16 38.47 N (NAD83) Longitude: 99 35 52.29 W Height AMSL: 892.0 m HAAT: 286.8 m Peak ERP: 650 kW Antenna: Omnidirectional 40.3 dBu contour: Azimuth ERP HAAT Distance 0.0 deg 650 kW 300.7 m 94.4 km 45.0 650 291.5 93.1 90.0 650 303.7 94.8 135.0 650 300.5 94.4 180.0 650 266.1 89.0 225.0 650 255.1 87.2 270.0 650 242.4 85.5 315.0 650 333.9 97.9 Proposal service area is within baseline plus 1.0% Proposal service area population is more than 95.0% of baseline Distance to Canadian border: 1806.9 km Distance to Mexican border: 327.3 km Conditions
    [Show full text]