Exciting News!

Exciting News!

WWW.ISSA - COS.ORG VOLUME 7 NUMBER 7 J U L Y 2 0 1 8 Exciting News! olleagues, and in emails soon. Please note that the HP facility sits ~600 feet west off Rockrimmon. I have some exciting news! Ms. Kim C Zetter, author of the book: As usual, lunch is free for members. Countdown to Zero Day, Stuxnet and Non-members may join us for this meeting the Launch of the World's First Digital by registering and paying $12 to help offset Weapon, is our guest speaker for the 18 the cost for the lunch meal. Feel free to July lunch meeting. She's an award-winning invite colleagues to join us, but please have investigative journalist who specializes in them register and pay to attend. cybersecurity and national security, as well Also, please note that registrations for as privacy and civil liberties issues. I read this event will close two days prior to the her book some time ago, it’s event so we'll have a good excellent! I highly encour- head count for our age everyone to read it. caterer. Top cybersecurity journal- ist Kim Zetter was among A Note From Peak Cyber is the first journalists to cover Stuxnet after its discovery coming soon! and has also broken Our President Our Peak Cyber numerous stories over the conference will be here years about WikiLeaks, soon – on 22-23 August. NSA surveillance, and the We have some excellent hacker underground. By Ms. Colleen Murphy keynote speakers already Please register ASAP (via our website) to confirmed: meet and hear from this excellent guest • COL Robert McVay, Deputy CIO, MDA speaker! • Dr. Meyerrose, The MeyerRose Group Please note that our lunch meeting (this • Dr. Joseph Mitola III, Chief Technologist, month see Page 9) will once again be held ENSCO Aerospace Sciences and Engi- at the Hewlett-Packard Enterprise (HPE) neering Division, Fellow of the IEEE facility located at 305 South Rockrimmon • Ron Ross, Fellow, Computer Security Blvd. To ensure maximum attendance, Division, NIST we’re only holding a lunch meeting in • Jeff Snyder, Jeff Snyder Cyber July. The dinner meeting is cancelled. Recruiting & Coaching Additional information will be on our website (Continued on page 4) The ISSA Colorado Springs Newsletter incorporates open source news articles in compliance with USC Title 17, Section 107, Paragraph a (slightly truncated to avoid copyright infringement) as a training method to educate readers on security matters . The views expressed in articles obtained from public sources within this newsletter do not neces- sarily reflect those of ISSA, this Chapter or its leadership. Names, products, and services referenced within this document may be the trade names, trade- marks, or service marks of their respective owners. References to commercial vendors and their prod- ucts or services are provided strictly as a convenience to our members, and do not constitute or imply endorsement by ISSA or the Colorado Springs Chapter of ISSA of any entity, event, product, service, or enterprise. P A G E 2 The Wiretap Rooms By Ryan Gallagher and Henrik Moltke, The purposes, commandeering AT&T’s massive Intercept, June 25, 2018 infrastructure and using it as a platform to covertly tap into communications processed by Federal agencies are so far unable to other companies. comply with a law banning Kaspersky Lab software from U.S. government networks Much has previously been reported about by October, The Daily Beast has learned. the NSA’s surveillance programs. But few Multiple divisions of the U.S. government details have been disclosed about the physical are confronting the reality that code written infrastructure that enables the spying. Last by the Moscow-based security company year, The Intercept highlighted a likely NSA is embedded deep within American facility in New York City’s Lower Manhattan. infrastructure, in routers, firewalls, and Now, we are revealing for the first time a series other hardware—and nobody is certain of other buildings across the U.S. that appear to how to get rid of it. serve a similar function, as critical parts of one of the world’s most powerful electronic The secrets are hidden behind fortified eavesdropping systems, hidden in plain sight. walls in cities across the United States, inside towering, windowless skyscrapers and “It’s eye-opening and ominous the extent to fortress-like concrete structures that which this is happening right here on American were built to withstand earthquakes and soil,” said Elizabeth Goitein, co-director of the even nuclear attack. Thousands of Liberty and National Security Program at the people pass by the buildings each day Brennan Center for Justice. “It puts a face on and rarely give them a second glance, surveillance that we could never think of before because their function is not publicly in terms of actual buildings and actual facilities known. They are an integral part of one of the in our own cities, in our own backyards.” world’s largest telecommunications networks There are hundreds of AT&T-owned – and they are also linked to a controversial properties scattered across the U.S. The eight National Security Agency surveillance identified by The Intercept serve a specific program. function, processing AT&T customers’ data and Atlanta, Chicago, Dallas, Los Angeles, also carrying large quantities of data from other New York City, San Francisco, Seattle, and internet providers. They are known as Washington, D.C. In each of these cities, The “backbone” and “peering” facilities. Intercept has identified an AT&T facility While network operators would usually containing networking equipment that prefer to send data through their own networks, transports large quantities of internet traffic often a more direct and cost-efficient path is “The across the United States and the world. A provided by other providers’ infrastructure. If body of evidence – including classified NSA one network in a specific area of the country is Department of documents, public records, and interviews overloaded with data traffic, another operator with several former AT&T employees – Homeland with capacity to spare can sell or exchange indicates that the buildings are central to an Security bandwidth, reducing the strain on the NSA spying initiative that has for years declined to congested region. This exchange of traffic is monitored billions of emails, phone calls, and called “peering” and is an essential feature of comment for online chats passing across U.S. territory. the internet. The NSA considers AT&T to be one of its this story, citing While network operators would usually most trusted partners and has lauded the prefer to send data through their own networks, the pending company’s “extreme willingness to help.” It is often a more direct and cost-efficient path is legal actions by a collaboration that dates back decades. Little provided by other providers’ infrastructure. If known, however, is that its scope is not one network in a specific area of the country is Kaspersky.” restricted to AT&T’s customers. According to overloaded with data traffic, another operator the NSA’s documents, it values AT&T not with capacity to spare can sell or exchange only because it “has access to information bandwidth, reducing the strain on the that transits the nation,” but also because it congested region. This exchange of traffic is maintains unique relationships with other called “peering” and is an essential feature of phone and internet providers. The NSA the internet. exploits these relationships for surveillance Read the rest here: https://theintercept.com/2018/06/25/att-internet- nsa-spy-hubs/ ISSA - C O S N E W S V O L U M E 7 P A G E 3 Membership Update It’s been a dead month on the membership front. Our membership has dropped a little over the last several months to around the 475 mark as of the end of June. For the first time in the four plus years I’ve been involved with membership for the chapter, we enrolled no new members. As you’re going about your daily activities, please take the time to engage your colleagues, ask if they’re ISSA members, and if not take a couple of minutes to convince them of the value of becoming a member of our chapter. Word of mouth is our primary method of advertising. If you don’t take the time to tell people of our organization, folks won’t know all the advantages we bring to their professional life. Renewals are also critical to maintaining our membership. If you are considering not renewing, please talk to me or one of the other board members to help us understand what we can do better to support our membership and retain you as active chapter members. We have lots of upcoming activities scheduled between meetings, training and mini-seminars. Please watch the Newsletter, communications and eVites to ensure you stay aware of what’s going on in the chapter. Please continue to refer new members to the chapter. Referrals are a critical part of developing new members for ISSA. As always, if you have any membership questions don’t hesitate to contact me. Thanks, David Reed Membership Committee Chairman [email protected] Update Your Profile! Don’t forget to periodically logon to www.issa.org and update your personal information. P A G E 4 (Continued from page 1) A Note From Many more speakers – and several cybersecurity training offerings – are also confirmed. Check out this site for more info and to register: Our President https://www.fbcinc.com/e/csttf/. Please register now to guarantee your seat at the Peak Cyber – Cyber Security Training and Technology Forum (CSTTF)!!! Colleen Next Mentorship Group Meeting will be in July.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    20 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us