
Volume 2, Edition 16 CyberPro August 13, 2009 Keeping Cyberspace Professionals Informed Officers The articles and information appearing herein are intended for President educational purposes to promote discussion in the public interest and to Larry K. McKee, Jr. keep subscribers who are involved in the development of Cyber-related concepts and initiatives informed on items of common interest. The Chief Operations Officer newsletter and the information contained therein are not intended to Jim Ed Crouch provide a competitive advantage for any commercial firm. Any misuse or unauthorized use of the newsletter and its contents will result in removal ------------------------------ from the distribution list and/or possible administrative, civil, and/or CyberPro Editor-in-Chief criminal action. Lindsay Trimble The views, opinions, and/or findings and recommendations contained in CyberPro Research Analyst this summary are those of the authors and should not be construed as an Kathryn Stephens official position, policy, or decision of the United States Government, U.S. Department of Defense, or National Security Cyberspace Institute. CyberPro Archive To subscribe or unsubscribe to this newsletter click here CyberPro News Subscription. Please contact Lindsay Trimble regarding CyberPro subscription, sponsorship, and/or advertisement. All rights reserved. CyberPro may not be published, broadcast, rewritten or redistributed without prior NSCI consent. 1 1 0 R o y a l A b e r d e e n Smithfield, VA 23430 ph. (757) 871 - 3578 CyberPro National Security Cyberspace Institute P a g e | 1 Volume 2, Edition 16 CyberPro August 13, 2009 Keeping Cyberspace Professionals Informed TABLE OF CONTENTS This Week in CyberPro ........................................................................................................... 5 Senior Leader Perspective: Daniel Hingtgen ........................................................................... 6 Cyberspace – Big Picture ...................................................................................................... 11 What are the Rules of Engagement? ..................................................................................................... 11 Like it or Not, We’re Stuck with an Insecure Information Infrastructure ................................................. 11 Regulation is Harming Computer Security, Say Experts ........................................................................ 11 Cyberspace – U.S. Government ............................................................................................ 12 U.S. Web-Tracking Plan Stirs Privacy Fears .......................................................................................... 12 White House Backing Could Leave Social Media Sites more Vulnerable .............................................. 12 ‘Smart Grid’ Raises Security Concerns .................................................................................................. 12 U.S. Cyber Leadership Debate .............................................................................................. 13 DoD Official Says U.S. Needs Separate Cyberczar for Online Identity.................................................. 13 Hathaway Resigns as Federal Cybersecurity Adviser............................................................................ 13 In Cybersecurity, Everyone’s a Critic ...................................................................................................... 13 Collins Seeks Information on Hathaway Departure ................................................................................ 13 Cyberspace – Department of Defense (DoD) ........................................................................ 14 House Hot About ‘Propaganda’ Info Ops ............................................................................................... 14 The Pentagon War on Twitter ................................................................................................................. 15 Pentagon Social Media Czar Pushes Web 2.0, Despite Ban Threat ..................................................... 15 A Social Network Happy Medium ........................................................................................................... 15 Marines Jump the Gun on Networking ................................................................................................... 15 Malware, Oversharing Lead Marines to Ban Social Networks ............................................................... 16 Marines and Social Nets: We Goofed .................................................................................................... 16 Security Upgrades Highlight DISA Buying Surge ................................................................................... 16 Defense Department Eyes Hacker Con for New Recruits ...................................................................... 16 U.S. Seeks ‘Top Guns’ for Cybersecurity ............................................................................................... 17 Cheshire Teenager Takes Top Prize in Cyber Challenge ...................................................................... 17 U.S. Military Academies to Use ‘PhishMe’ ............................................................................................. 17 Cyberspace – Department of Homeland Security (DHS) ........................................................ 18 Social Networking for Better Government .............................................................................................. 18 Cybersecurity Official Resigns ................................................................................................................ 18 1 1 0 R o y a l A b e r d e e n Smithfield, VA 23430 ph. (757) 871 - 3578 CyberPro National Security Cyberspace Institute P a g e | 2 Volume 2, Edition 16 CyberPro August 13, 2009 Keeping Cyberspace Professionals Informed Kwon to Join RSA as VP ........................................................................................................................ 18 Cyberspace – International .................................................................................................. 19 Dirty Deeds Done Dirt Cheap ................................................................................................................. 19 New Undersea Cables to Expand Broadband in Africa .......................................................................... 19 Cable Fault Cuts Off West Africa ............................................................................................................ 19 Time to Hit Cyberespionage ................................................................................................................... 19 A Deeper Look at Iranian Filtering .......................................................................................................... 20 After Links to Cybercrime, Latvian ISP is Cut Off ................................................................................... 21 Chinese Enforcers Press Oz .................................................................................................................. 21 Chinese Bandits Can’t Be Touched ........................................................................................................ 21 Korean ‘Journalists’ Booted from Defcon ............................................................................................... 21 Cyber-Spies Pose an Ever-Growing Risk ............................................................................................... 22 Cyberspace Research ........................................................................................................... 22 Researcher Pressured to Pull ‘Conficker’ Talk ....................................................................................... 22 Another Major Mac Computer Security Flaw Discovered ....................................................................... 23 Cyber Attacks at U.S. Energy Companies .............................................................................................. 23 The Project Grey Goose Cyberwar Report ............................................................................................. 23 Researchers Find Insecure BIOS ‘Rootkit’ Pre-Loaded in Laptops ....................................................... 24 Researcher Unmasks Sneaky Clampi Trojan at Black Hat .................................................................... 24 Researcher Reveals Massive ‘Professional Thieving’ Botnet ................................................................ 24 The Underpaid Cybersecurity Pro .......................................................................................................... 24 Nuclear Command and Control Structures Vulnerable to Cyber Terrorism ........................................... 25 Cyberspace Hacks and Attacks ............................................................................................. 26 Hackers Have Grown Up ........................................................................................................................ 26 Vulnerabilities Allow Attacker to Impersonate Any Web site .................................................................. 26 Russian Hackers Besiege Social Sites to Silence Pro-Georgia Blogger................................................ 26 Twitter DDoS Attack Takes Twists and Turns .......................................................................................
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages37 Page
-
File Size-