The Cybersecurity Campaign Playbook: European Edition
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
How to Reform Counterintelligence Outreach to Industry
Protecting Partners or Preserving Fiefdoms? How to Reform Counterintelligence Outreach to Industry BY DARREN E. TROMBLAY | OCTOBER 2017 U.S. industry is increasingly independent of federal government direction It’s time for a new in its creation of new knowledge and capabilities. Nonetheless, the approach to counterintelligence outputs of industry support the United States’ ability to maintain outreach to the elements of its national power. Consequently, industry is in the crosshairs commercial sector— of not only foreign competitors, but also of foreign intelligence services one that focuses more that seek to surreptitiously obtain valuable knowledge and other on recognizing and responding to intellectual property. This is an unfair fight. It is further complicated by indicators of the the fact that both adversaries and allies alike have directed their threat, less on turning intelligence resources against U.S. industry. to investigators once the damage has Although the U.S. government has attempted to partner with the private sector on already been done. counterintelligence (CI) awareness and response, these efforts have been plagued by a limited concept of which industry sectors are at risk, inconsistency in programs, and redundancies across agencies. Moreover, the U.S. intelligence community is already being asked to do more with less. It is time for a new approach to the important function of counterintelligence outreach to the commercial sector. Such an approach must focus more on recognizing and responding to indicators of the threat, less on turning to investigators once the damage has already been done. Counterintelligence—in the theoretical sense—means preventing an adversary’s intelligence services from acquiring an information advantage. -
Announcement
Announcement 100 articles, 2016-02-25 12:01 1 Microsoft introduces Windows 10 for PCs build 14271 and Mobile build 14267.1004 to Fast ring (4) Microsoft released two new Insider builds to the Fast ring today. Windows 10 Mobile build 14267.1004 fixes an issue with Lumia 550 and Windows 10 for PCs build 14271 has other fixes. 2016-02-24 18:16:01+00:00 1KB www.neowin.net 2 Apple plans Siri for Mac as tentpole feature for this fall's OS X 10.12 launch (2) Apple has reportedly been testing Siri for Mac since at least 2012, but even though the digital assistant has already made its way from the iPhone to the Apple Watch and Apple TV, it’s been notably absent from OS X.… 2016-02-25 08:32:48 1KB www.techspot.com 3 MasterCard wants to replace passwords and PINs with selfies In the ongoing search for the successor to unsecure passwords and PINs, financial (2) services giant MasterCard is taking a modern approach to authenticating transactions called MasterCard Identity Check. 2016-02-25 11:17:44 2KB www.techspot.com 4 Docker: Build Use-case-appropriate Containers - Developer.com Docker hits a sweet spot with the default container construction. It provides reasonable (2) defaults without hindering productivity of users. 2016-02-25 00:00:00 5KB www.developer.com 5 Alcatel OneTouch Fierce XL now supported by Windows 10 Insider Preview (2) After releasing Windows 10 for PCs build 14271 and Windows 10 Mobile build 14267.1004 today, Microsoft also announced that the Alcatel OneTouch Fierce XL can now enroll in the Insider Program. -
Agenda Document No. 18-43-A
FEDERAL ELECTION COMMISSION AGENDA DOCUMENT NO. 1 8-43-A Washington, DC 20463 AGENDA ITEM For meeting of October 11, 2018 SUBMITTED LATE MEMORANDUM TO: The Commission FROM: Lisa J. Stevenson Acting General Counsel Neven F. Stipanovic Acting Associate General Counsel Robert M. Knop Assistant General Counsel Joseph P. Wenzinger Attorney Subject: AO 2018-12 (Defending Digital Campaigns, Inc.) Draft A Attached is a proposed draft of the subject advisory opinion. Members of the public may submit written comments on the draft advisory opinion. We are making this draft available for comment until 9:00 am (Eastern Time) on October 11, 2018. Members of the public may also attend the Commission meeting at which the draft will be considered. The advisory opinion requestor may appear before the Commission at this meeting to answer questions. For more information about how to submit comments or attend the Commission meeting, go to https://www.fec.gov/legal-resources/advisory-opinions-process/ Attachment 1 ADVISORY OPINION 2018-12 2 3 Marc E. Elias, Esq. DRAFT A 4 Perkins Coie LLP 5 700 13th Street, NW, #600 6 Washington, DC 20005 7 8 Michael E. Toner, Esq. 9 Wiley Rein LLP 10 1776 K Street, NW 11 Washington, DC 20006 12 13 Dear Messrs. Elias and Toner: 14 We are responding to your advisory opinion request on behalf of Defending Digital 15 Campaigns, Inc. (“DDC”), concerning the application of the Federal Election Campaign Act, 52 16 U.S.C. §§ 30101-45 (the “Act”), and Commission regulations to its proposal to provide or 17 facilitate the provision of certain cybersecurity services, software, and hardware for free or at a 18 reduced cost to federal candidate committees and national party committees (collectively, 19 “federal candidates and parties”) on a nonpartisan basis and according to pre-determined, 20 objective criteria. -
Party Foul: Inside the Rise of Spies, Mercenaries, and Billionaire Moneymen -- Printout -- TIME
Party Foul: Inside the Rise of Spies, Mercenaries, and Billionaire Moneymen -- Printout -- TIME Back to Article Click to Print Monday, Mar. 03, 2014 Party Foul: Inside the Rise of Spies, Mercenaries, and Billionaire Moneymen By Alex Altman; Zeke Miller On a cold Saturday in January, a spy slipped into a craft brewery in downtown Des Moines, Iowa, where Hillary Clinton's standing army was huddled in a private room. The 43-year-old operative lurked in the corner with a camera on a tripod, recording the group of old Clinton hands as they plotted her path to the presidency. "Nobody," veteran Democratic strategist Craig Smith told the group, "had ever done it like this before." Within hours, a clip of the gathering was shipped to the snoop's employer, a for-profit research firm in northern Virginia. From there, it was packaged for a conservative magazine and subsequently went viral online. It was an early score in a presidential election that won't officially begin for another year--and it happened without any involvement from a candidate or either party. The Clintonites were members of Ready for Hillary, a super PAC that is spending millions of dollars to assemble a grassroots battalion for the former Secretary of State's campaign-in-waiting. And the infiltrator was one of more than two dozen "trackers" dispatched across 19 states by a company looking to damage Democrats. This is the dawn of the outsourced campaign. For decades, elections have been the business of candidates and political parties and the professionals they employed. People with names on the ballot bought their own ads and wielded the ability to smite enemies with a single phone call. -
Session Presentation
#CLUS Internet of Things The Mirai Story Dr. Yatish Joshi – Software Engineer @yatishkjoshi DEVNET-1524 #CLUS Agenda • Introduction • Mirai Design & Development • Victims & Aftermath • Demo • Conclusion #CLUS DEVNET-1524 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Cisco Webex Teams Questions? Use Cisco Webex Teams to chat with the speaker after the session How 1 Find this session in the Cisco Live Mobile App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space Webex Teams will be moderated cs.co/ciscolivebot#DEVNET-1524 by the speaker until June 16, 2019. #CLUS © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 It all started with Minecraft • Second best selling game of all time. • Bought by Microsoft for $2.5 billion • Has sold over 154 million copies by 2018. • 91 million active players/month. • Hosting servers can make $100-$200k/month. #CLUS DEVNET-1524 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 The American Dream The team: Paras Jha, Josiah White Dalton Norman Business 1: • Starts own Minecraft Server. • Gets DDoS attacks on his server. Business 2: • Protraf, a DDoS Mitigation company. • Recruits his friends to launch a new product called Mirai.. #CLUS DEVNET-1524 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Business Plan • DDoS Attack on competing Minecraft servers • Extortion • DDoS as a Service • Click Fraud #CLUS DEVNET-1524 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 Mirai Design • Named after Mirai Nikki, a 2011 anime series. -
News Tech Tools Tech Tools
NEWS Tech Tools Tech Tools NVidia Announces Project Shield Gaming Device Large-Scale Elastic NVidia announces Project Shield, a game and imagined a new way to Architecture new portable gaming device for open play,” said Jen-Hsun Huang, co- Data-as-a-Service platforms. The Project Shield device, founder and chief executive officer at Red Hat Inc. recently announced its which features a 5-inch screen and a NVidia. Project Shield features NVidia’s participation in a European Union ini- full-size ergonomic controller, lets new Tegra 4 processor, which delivers tiative to create a Large-scale Elastic users play both Android and PC titles. powerful gaming capacity from its cus- Architecture for Data-as-a-Service As an Android device, Project Shield tom 72-core GeForce GPU and quad- (LEADS) for mining and analyzing data provides access to any game on core Cortex-A15 CPU. According to the published on the entire public web. Google Play, and, as a wireless receiver announcement, the Project Shield de- The LEADS consortium is composed and controller, it can stream games vice combines the NVidia Tegra 4, of universities and research centers, and access titles on its Steam game li- high-bandwidth, ultra- as well as IT corporations with an in- brary from a PC powered by NVidia fast wireless tech- terest in data mining and analysis GeForce GTX GPUs. Project Shield nology, and HD techniques. The objective of LEADS is comes with the latest Android video and audio “to build a decentralized Data-as-a- Jelly Bean operating sys- with a full-size, con- Service (DaaS) framework that runs tem from Google. -
Lessons and Recommendations from the 2020 General Election
S T R E N G T H E N I N G O U R E L E C T I O N S A N D P R E V E N T I N G E L E C T I O N C R I S E S : Lessons and Recommendations from the 2020 General Election Executive Summary The 2020 election was defined by paradox and contradiction. Thanks to millions of poll workers, election officials, and citizens who stepped up to make our democracy work, the election was secure and free from systemic or significant fraud. A record 160 million Americans voted and had their voices heard. Yet still, voter intimidation and racial disparities in access to the ballot continued, our election system was revealed to be aging and unnecessarily confusing, Americans weathered a wave of disinformation and, of course, there were unprecedented efforts to delegitimize and overturn the election results—ultimately leading to a crisis the likes of which we’ve not experienced in modern history. In the end, Congress counted all of the electoral votes, but only after President Trump sought to both coerce federal and state officials to overturn the results, and incited a violent insurrection. This attack on our democracy culminated with white supremacist rioters attacking the Capitol seeking to not only overturn the Constitutional order, but also to take hostages and assassinate members of Congress and the Vice President. While American democracy has survived this crisis so far, we will only be able to prevent the next one if we both 1) ensure accountability for all those who incited, abetted, and participated in the insurrection, and 2) adopt preventative reforms based on the lessons we learned in this election. -
Putin, Trump and Democracy's Slippery Slope Toward Oligarchy
Putin, Trump and Democracy’s Slippery Slope Toward Oligarchy Acknowledgments The Common Cause Education Fund is the research and public education affiliate of Common Cause, founded in 1970 by John Gardner. Common Cause is a nonpartisan, grassroots organization dedicated to upholding the core values of American democracy. We work to create open, honest and accountable government that serves the public interest; promote equal rights, opportunity, and representation for all; and empower all people to make their voices heard in the political process. This report was produced with the support of small dollar contributions from Americans who believe in transparent, open, and accountable govern- ment, as well as generous grants from the WhyNot Initiative and the Philip & Janice Levin Foundation. It was written by Joe Maschman, a Common Cause legal fellow, and edited by Paul Seamus Ryan, vice president for policy and litigation; Scott Swenson, vice president for communications, Susannah Goodman, director of voting integrity; and Dale Eisman, senior writer/editor. The authors and editors wish to express our thanks to Kerstin Diehn for her design and to Common Cause President Karen Hobert Flynn for her guidance and encouragement in the preparation of this report. Introduction Americans are more united than those who benefit from division want us to believe. Republicans, Democrats, and Independents largely agree that registration and voting should be secure, modern, and convenient, and that all eligible people should be encouraged to vote. As voters, we recognize that the more people who participate in our elections, the better it is for our democracy, making it more likely that the representatives who are elected will listen to the people. -
The BIT-Jan-Apr 2013
INFORMATION TECHNOLOGY GENERATION CLOUD COMPUTING WIRELESS NETWORK ARCHITECTURE JANUARY-APRILthe 2013 the Bullettin ofBIT Information Technology TECHNOLOGY 4G A Dream from “Always Connected” to “Always Best Connected” PAGE 4 FACULTY CORNER TRAFFIC FAULTY visit ROUTER For Tcp Congestive Loss Control Over Wireless Network PAGE 5 NEW @ IT TRENDING NEW TECHNOLOGIES PAGE 18 http://rajagiritech.ac.in Department of Information Technology Rajagiri School of Engineering & Technology Rajagiri Valley, Kakkand, Kochi HOD’S MESSAGE Way To Excellence – Role Of Alumni Alumni are the ambassadors of an educational institution in society and industry. They are impor- tant stakeholders of college and lifelong family members of an institution working at various fields thethe Bullettin of Information BIT Technology and at wide geographical locations. Alumni can support the institution and its students by giving truthful feedback on design and scope of the courses, promote entrepreneurship, enlarge outreach, promote industrial interaction and research, training to students, placement, scholarship etc. They can give guidance for orga- ON CREATIVE DESK nizing college programs like teaching, research, innovation and technology transfer to meet the present market and industry needs. Alumni support is very important for the growth and prosperity of the college. They can give valu- Editors able and trusted feedback along with newer ideas needed from time to time to keep the insti- Prof. Kuttyamma A.J. tute in top gear ahead of time. The college and its alumni can function together as one family to (HOD- Department of Information Technology) reach excellence. Mariam Varghese Alumni can support the institute in many ways: Assistant Professor • They can contribute to make education quality and cost competitive. -
Understanding the Mirai Botnet
Understanding the Mirai Botnet Manos Antonakakis Tim April‡ Michael Bailey† Matthew Bernhard/ Elie Bursztein◦ Jaime Cochran. Zakir Durumeric/ J. Alex Halderman/ Luca Invernizzi◦ Michalis Kallitsis§ Deepak Kumar† Chaz Lever Zane Ma†∗ Joshua Mason† Damian Menscher◦ Chad Seaman‡ Nick Sullivan. Kurt Thomas◦ Yi Zhou† ‡Akamai Technologies .Cloudflare Georgia Institute of Technology ◦Google §Merit Network †University of Illinois Urbana-Champaign /University of Michigan Abstract of factors—efficient spreading based on Internet-wide The Mirai botnet, composed primarily of embedded scanning, rampant use of insecure default passwords in and IoT devices, took the Internet by storm in late 2016 IoT products, and the insight that keeping the botnet’s when it overwhelmed several high-profile targets with behavior simple would allow it to infect many hetero- massive distributed denial-of-service (DDoS) attacks. In geneous devices—all played a role. Indeed, Mirai has this paper, we provide a seven-month retrospective anal- spawned many variants that follow the same infection ysis of Mirai’s growth to a peak of 600k infections and strategy, leading to speculation that “IoT botnets are the a history of its DDoS victims. By combining a variety new normal of DDoS attacks” [64]. of measurement perspectives, we analyze how the bot- In this paper, we investigate the precipitous rise of Mi- net emerged, what classes of devices were affected, and rai and the fragile IoT ecosystem it has subverted. We how Mirai variants evolved and competed for vulnerable present longitudinal measurements of the botnet’s growth, hosts. Our measurements serve as a lens into the fragile composition, evolution, and DDoS activities from Au- ecosystem of IoT devices. -
International CES Final Report
2013 International CES January 6-11, 2013 Final Report presented by THE MEDIA PROFESSIONAL’S INSIDE PERSPECTIVE 2 2013 International Consumer Electronics Show This Report is Made Possible With the Support of our Executive Sponsors www.ETCentric.org © 2013 etc@usc 2013 International Consumer Electronics Show 3 INTRODUCTION The following report is the Entertainment Technology Center’s post show analy- sis of the 2013 International CES. To access the videos and written reports that were posted live during the show, please visit: http://www.etcentric.org/. Over the course of one week, January 6-11, 2013, the Entertainment Technology Center tracked the most interesting and breaking entertainment technology news coming out of this year’s event. The ETC team reported on new product announcements, evolving industry trends and whisper suite demonstrations. Reports were made available via ETC’s collaborative online destination for enter- tainment media news and commentary, ETCentric: The Media Professional’s Inside Exchange; its accompanying email newsletter, The Daily Bullet; and social networks Facebook and Twitter. The result was nearly 100 postings over a 7-day period (in addition to dozens of pre-show posts). Those stories from the site, rounded out with after-show research and observations, formed the basis for this report. We hope you find the reports useful in putting your finger on the pulse of consumer entertainment technology. As always, we are looking for feedback from you on ETCentric and this report. Please send your comments to [email protected]. -
Carterand Rosenbach
Fall/Winter 2017–2018 www.belfercenter.org Carter and Rosenbach ENVISION THE BELFER CENTER’S FUTURE When Ash Carter became Secretary of Defense in Their playbook is well-suited to guide a similar effort 2015, he inherited the finest fighting force the world has at the Belfer Center. As Director and Co-Director, Carter ever known. Together with Chief of Staff Eric Rosenbach, and Rosenbach have inherited from Graham Allison the they promptly set out to make it even better. By clarifying world’s No. 1-ranked university think tank. They intend America’s strategic posture, diversifying talent, opening to build on that success by sustaining the Center’s core all positions to women, and thickening relations with mission while widening its aperture; enhancing its unique Silicon Valley and other centers of innovation, Carter and ability to leverage science and technology to meet global Rosenbach left no stone unturned in their drive to opti- challenges; and priming the next generation of leaders in mize the U.S. military’s two critical ingredients: people both scholarship and policymaking. and technology. CONTINUED ON PAGE 3 » PLUS: DEFENDING DIGITAL DEMOCRACY ■ DEFEATING ISIS ■ NEW SENIOR FELLOWS www.belfercenter.org From the Director s Secretary of Defense from 2015 to 2017, AI served a mission vital to global peace and prosperity. I met often with foreign leaders, generals, senators, and CEOs. And because the BELCHER JAKE / MIT military’s excellence depended largely on selfless people and unrivalled technology, I prioritized diversifying our pool of talent and deepening our sources of innovation. Today, I’ve moved from the Potomac to the Charles, but my cause con- tinues.