Showing posts sorted by relevance for query White House. Sort by date Show all posts
Showing posts sorted by relevance for query White House. Sort by date Show all posts

White House sends Congress a long-awaited cybersecurity proposal



The White House on Thursday sent Congress a formal proposal for cybersecurity legislation to help Senate lawmakers craft a passable bill from 50-some measures currently pending in both chambers.
The long-awaited framework would formally grant the Homeland Security Department oversight of cybersecurity operations within civilian federal agencies -- a role it has played in practice since last summer. Given the dearth of cyber experts in civilian agencies, the proposal would give DHS the same flexibility the Pentagon currently has to rapidly hire skilled professionals at competitive salary levels, Obama administration officials told reporters during a Thursday conference call.
The guidelines, which were expected to be released later on Thursday, largely rely on industry's know-how and willing compliance to certify their systems are safe and ask for federal assistance when attacked.
The proposal is silent on several sticking points, including cyberwarfare, classified information and the criteria for so-called critical infrastructure -- or systems that, if disrupted, could wreak havoc on national security. Such networks would be subject to greater regulation under a key Senate bill sponsored by the leaders of the Homeland Security and Governmental Affairs Committee. The White House framework also stays clear of a dispute over whether the president should have the power to hit a "kill switch," shutting down the Internet during emergencies.
The guidelines were prompted by a request from Senate Majority Leader Harry Reid, D-Nev., and chairmen of the committees with jurisdiction over computer security for input from President Obama on the various congressional proposals, White House officials said. The HSGAC and commerce panels passed comprehensive cybersecurity legislation about a year ago, while numerous other congressional panels and individual members have introduced their own piecemeal measures. The executive branch took about a year to reach consensus on which provisions agencies would support and what new ones they would propose.
The proposal would make so-called intrusion prevention systems a permanent fixture in the federal government, according to a fact sheet. As opposed to intrusion detection systems, which flag attacks and alert the appropriate responders, prevention software can actively respond by blocking intrusions. The guidelines say DHS should have the authority to supervise all such programs, including the existing "Einstein" tool. Internet service providers also would have to use the applications for any government traffic they manage.
The White House plan touches on one security element of a growth area in government IT: cloud computing. The practice allows organizations to access computer power, storage and software stored on the Internet by a third-party provider, rather than build on-site server farms. Administration officials are concerned that state protectionist measures are hampering the cloud industry, so the proposal would block state governments from requiring that companies in their states build data centers there, unless authorized by federal law, the fact sheet stated.
The guidelines would enable industry to obtain immediate assistance from Homeland Security in responding to an intrusion, if they wish, officials said. Currently, when organizations ask DHS to review logs to determine when a hacker attacked, the department's ability to intervene is slowed by legal uncertainty. To protect individuals, if a firm or local government wants to share such information with DHS, the organization must first strip out identifying information that is irrelevant to the infraction, according to the fact sheet.
Companies and local governments would be granted immunity for sharing information with the federal government about new computer viruses and cyber events that have compromised their systems. Should entities choose to provide such information, their customers' privacy would not be violated, according to the proposal.
White House officials said their proposal focuses on transparency and incentives to ensure companies managing networks for critical infrastructure in industries like energy and banking are accountable for service continuity. The draft bill directs Homeland Security and the private sector to jointly figure out which operations are the most critical and prioritize the most important threats to those services. An outside commercial auditor would assess the company's plans for mitigating such vulnerabilities.
On the consumer side, the proposal would require that businesses notify customers of certain data breaches to reduce the risk of identity theft. Sony recently took heat for not immediately telling customers that perpetrators had infiltrated the company's online gaming and music networks. The administration's plan would loop together a patchwork of 47 state laws on data breach reporting.
Many in the legislative branch and business community applauded the White House plan on Wednesday.
"The Senate and the White House are on the same track to make sure our cyber networks are protected against an attack that could throw the nation into chaos," HSGAC Chairman Joe Lieberman, I-Conn., ranking Republican Susan Collins, R-Maine, and Federal Financial Management Subcommittee Chairman Tom Carper, D-Del., said in a joint statement. The Senate and the administration "both recognize that the government and the private sector must work together to secure our nation's most critical infrastructure, for example, our energy, water, financial, telecommunications and transportation systems. We both call for risk-based assessments of the systems and assets that run that infrastructure."
The trio agreed with the administration that Homeland Security should take the lead in safeguarding civilian cybersecurity. Other lawmakers, particularly in the House, say the Defense Department, with its established expertise and deep pockets, should play a larger role in guarding U.S. networks. Currently, the Pentagon can monitor only the .mil domain and many civil liberties advocates would like to keep it that way.
Commerce Committee leaders also largely praised the proposed measure. "The White House has presented a strong plan to better protect our nation from the growing cyber threat," Chairman John D. "Jay" Rockefeller, D-W.Va., said in a statement. "I look forward to continuing to work with the White House, and my colleagues in the House and Senate, to pass a comprehensive cybersecurity bill this year."
Ranking member Sen. Olympia Snowe, R-Maine, said, "While the administration's delay in providing critical input to the legislative process is regrettable, it is my understanding that the administration proposal parallels many of the objectives, particularly pertaining to modernizing the public-private partnership, that Sen. Rockefeller and I have advocated."
Officials with trade group TechAmerica generally supported Obama's framework but said they had lingering questions about the flexibility the proposal grants firms to tailor their security strategies.
"The administration's proposal is a clear step forward in the process and we hope that it strikes the right balance between accountability and innovation in this shared responsibility between the public and private sectors," TechAmerica President Phil Bond said in a statement.
"We encourage Congress and the administration to draw a bright line between critical and noncritical infrastructure," Bond said. "Industry and government need to work together to make the right determinations for what is critical, and what the implications are for that designation."
Should the government require firms to take certain actions, the law must provide liability protections to shelter companies from any unanticipated consequences, he said.
Given that the Senate has been pursuing cybersecurity legislation in a bipartisan fashion, and both parties in the House last year actually passed elements of the White House proposal, the expectation is that a law could be enacted this year.
Disagreements over engagement in cyberwar or the job of the Pentagon's National Security Agency and the new U.S. Cyber Command likely will be worked out in separate legislation. Pending House defense and intelligence authorization bills, for instance, address cyberwarfare and require the development of systems for detecting unauthorized activities on classified networks.
But talks on the civilian-oriented bill may take months, especially since all sides appear to want industry involved in the vetting process. One item overlooked in the White House proposal that Congress wants -- the creation of a Senate-confirmed cyber czar -- may take some time to negotiate. And Congress has never considered some of the information-sharing measures the White House introduced on Thursday.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

White House Unclassified Network Hacked By Chinese Hackers Using Spear Phishing

White House Unclassified Network Hacked By Chinese Hackers Using Spear Phishing

Another cyber espionage generated from China targeted the White House. U.S. government computers reportedly including systems used by the military for nuclear commands were breached by Chinese hackers. The White House it self confirmed the breach, while saying that hackers indeed made an attempt to infiltrate its computer system, but says it thwarted the effort and that no classified networks were threatened. Also the security breach did not appear to have stolen any dataWhite House spokesman Jay Carney told reporters the White House is equipped with mitigation measures that identified the attack, isolated it and prevented its spread. He said there was no indication that any data was removed. “There are distinctions between those networks that contain classified information and those that don’t, and the attack was against an unclassified network,” Carney said. 
The hackers breached the network by using a technique known as spear phishing, in which they target victims who have access to sensitive computer networks by sending personalized emails that appear to come from trusted sources. Once the victims click on the bogus attachment or link, the hackers can install malicious software on the PCs to spy on users and steal data.  A law enforcement official who works with members of the White House Military Office confirmed the Chinese attack to press on Monday, but it remains unclear what information, if any, was taken or left behind. But still The White House officially did not say whether the recent attack was linked to China or not. 

"This [White House Communications Agency] guy opened an email he wasn't supposed to open," the source said. That email contained a spear phishing attack from a computer server in China, the law enforcement source told the press. The attack was first reported by the conservative blog Free Beacon. Spear phishing involves the use of messages disguised to appear as valid; in fact, they contain targeted, malicious attempts to access sensitive or confidential information. 

While talking about this breach, we would like to remind you that just few days ago Chinese hackers breached Telvent's corporate network & gained control of US Power GridCouple of months ago we have seen that Chinese hackers have broken into Indian Navy's Computer System & stolen sensitive data. Few months before this hack, Tokyo based computer security firm Trend Micro confirmed that Chinese hackers were responsible for biggest cyber-espionage in India, Japan & Tibet. Also the director of National Security Agency (NSA) General Keith Alexander confirmed that hackers from China was responsible for the serious attack on one of the leading IT security & cyber security company RSAAlso in 2011 China was responsible behind the attack on US Chamber of Commerce, Satellite System of U.S, Nortel Network & so on.  But few days ago National Computer Network Emergency Response Coordination Center of China (CNCERT/CC), China's primary computer security monitoring network claimed that China fallen victim of one of biggest cyber attacks originated from US, Japan & South Korea. We must have to say that this statement is truly irrelevant. Cyber crime investigator have found that China was directly responsible for the hack into Japan's Biggest Defense Contractor Mitsubishi, Japan Aerospace Exploration Agency (JAXA) & Parliament of Japan. In case of South Korea  more than 13 Million of MapleStory players data has been stolen, there also hackers from China was responsible. 








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

FBI Draws Interest on Gmail Hacking

 
The computer phishing scam that Google says originated in China was directed at an unknown number of White House staff officials and set off the FBI inquiry that began this week, according to several administration officials. It is unclear how many White House staff members - or those of other departments in the executive branch - might have been targeted, according to two officials with knowledge of the investigation. But the intended victims ranged across different functions in the White House, and were not limited to those working on national security, economic policy or trade areas that would be of particular interest to the Chinese government.  Administration officials said they had no evidence any confidential information was breached, or even that many people fell for the attack by providing information that would allow a breach of their Gmail accounts. White House classified systems run on dedicated lines and information on those systems, the officials said, cannot be forwarded to Gmail accounts. But investigators are trying to determine if the attackers believed that some staff members or other officials used their personal email accounts for sensitive government communications.
"Right now," said one senior official, "that's a theory, not a fact."
Google disclosed the attack this week and said it targeted not only U.S. government officials, but also human right activists, journalists and South Korea's government. Google tracked the attack to Jinin, China, which is the home to a Chinese military school.
But that does not necessarily mean the attackers were Chinese or related to the government. The Chinese government denied any involvement.
The attack used emails that appeared to be tailored to their targets to better fool their victims, a technique known as spear phishing. Recipients were asked to click on a link to a phony Gmail login page that gave the hackers access to their personal accounts.
The attacks come as the U.S. government considers expanding its use of Web-based software for email, along with word processing, spreadsheets and other kinds of documents. Google is one of the many companies vying for the business with its Apps product, as is Microsoft . Web based email would be vulnerable to hackers who steal login information through phishing attacks. But Web-based systems are not necessarily any easier to hack than traditional email, which a government agency would usually manage using its own servers, said Larry Ponemon, chairman of the Ponemon Institute, a computer security company in Traverse City, Mich.
Jay Carney, the White House press secretary, said Thursday that all White House-related electronic mail was supposed to be conducted on work email accounts to comply with the Presidential Records Act, which governs how those communications are protected and archived. Carney said there was no evidence that any White House accounts were compromised.

White House employees are permitted to have private email accounts, he said, but cannot use them for work purposes. Officials at the White House and other agencies often keep two computers in their offices, one for unclassified work and another for classified. Very senior officials sometimes have a "secure facility" in their homes, in which computers and telephones are on dedicated lines and communications are encrypted.
Given its size, Google and its Gmail system will always make an attractive target.
Other personal email services, including Yahoo and Microsoft's Hotmail, have faced similar attacks, according to Trend Micro , a computer security company in Cupertino, Calif. "The types of attacks that are happening against Web mail users aren't confined to Gmail alone and extend to other email platforms," said Nart Villeneuve, a senior threat researcher for Trend Micro.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

White House to unveil Cyber Security Strategy


Analysts at the National Cybersecurity & Communications Integration Center (NCCIC) work at their headquarters in Arlington, Virginia, in September 2010. The White House plans to unveil its policy proposals next week for international cooperation in cyberspace.

The White House said Friday that it plans to release a policy document -- "US International Strategy for Cyberspace" -- at an event on Monday.
"This first-of-its-kind policy document offers our comprehensive vision for the future of international cooperation in cyberspace," the White House said in a statement.
It said the document outlines the US agenda "for partnering with other nations and peoples to ensure the prosperity, security, and openness that we seek in our increasingly networked world."
The State Department said Secretary of State Hillary Clinton, who has made Internet freedom one of her priorities, will deliver keynote remarks at the event.
"The strategy lays out a comprehensive, principled vision for the future of cyberspace," the State Department said.
It said Clinton's remarks "will address the role of cyberspace in advancing the full range of US interests and the importance of international cooperation in advancing cyberspace as a foreign policy priority."
The White House said other top officials attending the event will include John Brennan, President Barack Obama's counter-terror chief, Attorney General Eric Holder, Commerce Secretary Gary Locke and Homeland Security Secretary Janet Napolitano.
The announcement came a day after the White House proposed draft legislation aimed at toughening the defenses of government and private industry against the growing danger from cyber attack.

Obama has identified cybersecurity as a top priority of his administration and the White House legislation joins some 50 cyber-related bills introduced during the last session of Congress.
The White House bill would require critical infrastructure such as the power, financial and transportation sectors to come up with plans to better protect their increasingly Internet-connected computer networks.
The White House is hoping for action by Congress on the bill this year.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

The White House Introduced- Electric Sector Cybersecurity Risk Maturity Model



The White House has launched a new initiative designed to help companies in the electric power industry measure the maturity of their security programs against a new maturity model. The program is being run in tandem with the Department of Homeland Security and Department of Energy and is meant to help the utility companies find their weak spots and where they need to improve.
The Electric Sector Cybersecurity Risk Maturity Model Pilot is the first such program launched by the White House, which has been pointing to information security--and specifically the security of systems running utilities and critical infrastructure--as a priority since the beginning of the Obama administration. The administration has developed a number of strategies and policy documents in the last few years, but this is the first foray into the kind of maturity model that typically is seen in private industry.
The White House, DHS and Energy launched the initiative last week with a meeting of government officials and executives from electric companies to discuss the main problems facing the industry when it comes to information security.
In his blog Howard Schmidt, the White House cybersecurity coordinator, said -
"This initiative -- the Electric Sector Cybersecurity Risk Maturity Model Pilot -- is a new White House initiative led by the Department of Energy, in collaboration with the Department of Homeland Security, to develop a model to help us identify how secure the electric grid is from cyber threats and test that model with participating utilities. Gaining knowledge about strengths and remaining gaps across the grid will better inform investment planning and research and development, and enhance our public-private partnership efforts," 

More More Information Click Here


-Source (threatpost)






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

The White House Is Also Not Supporting Stop Online Piracy Act (SOPA)


Not only Anonymous now even The White House also protested against Stop Online Piracy Act (SOPA) & also PROTECT IP Act (PIPA). House of Representatives bill SOPA and its Senate counterpart PIPA are designed to punish websites that make available, for example, free movies and music without the permission of the U.S. rights holders. Opponents of the bills, however, worry that the proposed laws would grant the Department of Justice too much regulatory power. Google Chairman Eric Schmidt has called the measures "draconian." Other Internet giants who oppose the bill include Facebook, eBay, Mozilla, Twitter, and Huffington Post parent company AOL.
The White House on Saturday officially responded to two online petitions, "Stop the E-PARASITE Act" and "Veto the SOPA bill and any other future bills that threaten to diminish the free flow of information," urging the President to reject SOPA and PIPA.
The statement was drawn up by Victoria Espinel, Intellectual Property Enforcement Coordinator at Office of Management and Budget, Aneesh Chopra, U.S. Chief Technology Officer, and Howard Schmidt, Special Assistant to the President and Cybersecurity Coordinator for National Security Staff. They made clear that the White House will not support legislation that disrupts the open standards of the Internet. 

According To The White House :- 
"...we will not support legislation that reduces freedom of expression, increases cybersecurity risk, or undermines the dynamic, innovative global Internet.
We must avoid creating new cybersecurity risks or disrupting the underlying architecture of the Internet. Proposed laws must not tamper with the technical architecture of the Internet through manipulation of the Domain Name System (DNS), a foundation of Internet security. Our analysis of the DNS filtering provisions in some proposed legislation suggests that they pose a real risk to cybersecurity and yet leave contraband goods and services accessible online. We must avoid legislation that drives users to dangerous, unreliable DNS servers and puts next-generation security policies, such as the deployment of DNSSEC, at risk."


For more information & to see the entire post click Here


-Source (Huffington Post)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

The White House Hires Michael Daniel As New Cyber Security Chief

The White House Hires Michael Daniel As New Cyber Security Chief

The White House announced that they have picked a new cyber-security officer amid furious debate between the White House and both chambers of Congress around the future of American cyber defence.
Michael Daniel, a longtime member of the Office of Management and Budget’s national security squad, will fill the gap left by Howard Schmidt, who announced his departure earlier this week. Daniel has been working with securities issues for 10 years and watched over multiple Defense Department programs, as well as the budgets for the federal government’s various cybersecurity programs. He has been involved with “virtually every major issue affecting the Intelligence Community,” according to a White House statement.
“I am very honored to be asked to take on such an important role, especially at a time when cybersecurity issues are so prominent,” said Daniel in a statement. 

What does that mean for the future of the cyber security issue? Probably that we can expect his knowledge of the intelligence community to play a part in not just tracking down hackers, but determining the lines that need to be crossed with future SOPA-like bills. So while this sounds like a relatively nondescript appointment, Daniel will almost definitely be a major player the next time someone comes for your internet.


-Source (Mashable, Gizmodo)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Cyber Security Bill Has Been Rejected By The US Senate

Cyber Security Bill Has Been Rejected By The US Senate

A cybersecurity bill that had been one of the Obama administration’s top national security priorities was blocked by a Republican filibuster in the Senate on Thursday. Still the topic of cyber security remains controversial in the US Congress. The Senate voted 52 to 46 to cut off debate, falling short of the 60 needed to force a final vote on the measure, which had bipartisan support but ran into a fight over what amendments to the legislation could be proposed.
Soon after the vote, the White House released a statement calling the outcome “a profound disappointment.” White House regretted that the act failed to gain approval, saying that it could have protected the US from "potentially catastrophic cyber attacks". According to the White House, the proposed legislation fell victim to "the politics of obstructionism, driven by special interest groups seeking to avoid accountability". US civil rights campaigners Electronic Frontier Foundation (EFF), on the other hand, are celebrating a "victory over cyber spying". 
However, many further amendments were proposed by senators over the week. Ultimately, many voted in line with their concerns. For instance, in a statement after the vote, Democrat Ron Wyden said that in his opinion the Cybersecurity Act in its current form does not sufficiently safeguard Internet users’ privacy and civil liberties. According to Wyden, the act would not create enough incentive to actually promote the exchange of information. Republican senators mainly explained their rejection by pointing out that, despite the amendments, companies would be made to comply with too many bureaucratic reporting requirements.
The bill called for the government to provide businesses with classified information about cyberthreats and gave companies the option of sharing information about cyberthreats with the government. White House officials said the president opposed that bill because it called for too much information sharing between the government and businesses, which could have led to violations of Americans civil liberties.


-Source (The-H & NYTimes)








SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Controversial Cyber Security Bill CISPA Passed Again By The US House

Controversial Cyber Security Bill CISPA Passed Again By The US House

Couple of months ago we reported that the White House is planning for an executive cyber security order, from some official sources it has also come to know that the U.S. President Mr. Barack Obama has a special plan to re-introduce the Cyber Intelligence Sharing and Protection Act (CISPA). Today that deceleration get executed as the US House of Representatives has passed the controversial Cyber Information Sharing and Protection Act. This is the second time when CISPA have been passed by the White House, first it was rejected by the Senator while saying that the bill did not do enough to protect privacy. But yet again with the initiative of Obama and a substantial majority of politicians in the House backed the bill. Though there is a huge chance of getting rejected. According to some relevant sources it has been came to light that, this time also CISPA could fail again in the Senate after threats from President Obama to veto it over privacy concerns. Sources are saying that the main reason of re-introducing CISPA is the the President Barack Obama expressed concerns that it could pose a privacy risk. The White House wants amendments so more is done to ensure the minimum amount of data is handed over in investigations.  The law is passing through the US legislative system as American federal agencies warn that malicious hackers, motivated by money or acting on behalf of foreign governments, such as China, are one of the biggest threats facing the nation.  "If you want to take a shot across China's bow, this is the answer," said Mike Rogers, the Republican politician who co-wrote CISPA and chairs the House Intelligence Committee. 

On the other hand CISPA has also secured the backing of several technology firms, including the CTIA wireless industry group, as well as the TechNet computer industry lobby group, which has Google, Apple and Yahoo as members. By contrast, some other big names like Mozilla, Reddit has been vocal in its opposition to the bill. In the beginning the social networking giant Facebook supported CISPA but later they took back its support. The American Civil Liberties Union has also opposed CISPA, saying the bill was "fatally flawed". The Electronic Frontier Foundation (EFF), Reporters Without Borders and the American Library Association have all voiced similar worries.


-Source (BBC)






SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

The White House Official Facebook Page Hacked



Official Facebook page The White House defaced for a short time on Sunday, the tenth anniversary of the 9/11 terror attacks, with posts that appeared to be from Al-Qaeda, Taliban, or perhaps another terrorist organization.The posts came as authorities continue to exercise caution over what they called a "credible" threat against the United States, one that may involve attacks on infrastructure such as bridges or tunnels. The information provided by a source was scant, but indicated that three men would travel from Pakistan to the U.S. to carry out an attack.
The messages have been removed from the Facebook page, but one message, which featured an image of now dead 9/11 mastermind and Al-Qaeda leader Osama bin Laden, said, "We'll come back U.S.A. One day only 11/9/2011." Despite the format, the message refers to 9/11, using the day / month format used in other parts of the globe.
Another said, "We'll come to u white house sooooooooooon." A third said, "We'll come back 11/9/2011 to kill u all."



Secret Service spokesman Ed Donovan said that the agency had referred the messages to its Internet threat desk. 

-News Source (Examiner) 


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

White House Calls China to Stop Hacking & Cyber Espionage Against U.S.

White House Calls China to Stop Hacking & Cyber Espionage Against U.S.

The story of cyber espionage by Chinese hackers used to remain on the spot light due to its consistency, but now the situation get nasty and takes a new way as the national security adviser of U.S. President Obama directly pointed his finger to China. Many of our readers might take this issue lightly as earlier China has been blamed for engaging cyber attacks against different countries for many times. But this time there is a twist as the U.S. government vows to take the issue in a very serious manner. In his speech the national security advisory Tom Donilon said that "The international community cannot afford to tolerate such activity from any country," Like earlier China has denied any type of involvement and condemned the report for lack of hard evidence. But this time such reaction will not at all be entertained as the president said in the State of the Union, "we will take action to protect our economy against cyberthreats." The above two statements can be taken in both friendly warning or also in a serious threat. The White House already warned China to end the campaign of cyber espionage against U.S. companies, saying in its toughest language yet on the issue that the hacking activity threatens to derail efforts to build stronger ties between the two countries. 
Donilon did not directly accuse the Chinese government of launching the attacks on U.S. computer systems, only noting that the attacks are coming from inside the country. "Increasingly, U.S. businesses are speaking out about their serious concerns about sophisticated, targeted theft of confidential business information and proprietary technologies through cyber intrusions emanating from China on an unprecedented scale," he said. Another important message came from the Obama administration saying United States “will not accept North Korea as a nuclear state” and called on Chinese leaders to get serious about cracking down on cyber-related crimes. 
While covering this story we would like to remind you that couple of weeks ago Chinese officials issued a same complain against United States where they blamed U.S. for engaging massive cyber attacks against Chinese military and defense system. If you look at the story of major cyber attacks of last few days we will find that the name of China has been involved several times for engaging cyber attacks against several high profile websites and organization of U.S. including New York TimesTwitterNBC and so on. And if you refresh our memory then then we will find the scenario of big cyber attack and espionage by Chinese hackers have been spotted several times. In 2012 Chinese hackers had  breached Telvent's corporate network & gained control of US Power GridAlso in the middle of last year, we have seen that Chinese hackers have broken into Indian Navy's Computer System & stolen sensitive data. Few months before this hack, Tokyo based computer security firm Trend Micro confirmed that Chinese hackers were responsible for biggest cyber-espionage in India, Japan & Tibet. Also the director of National Security Agency (NSA) General Keith Alexander confirmed that hackers from China was responsible for the serious attack on one of the leading IT security & cyber security company RSAAlso in 2011 China was responsible behind the attack on US Chamber of Commerce, Satellite System of U.S, Nortel Network & so on.  But few days ago National Computer Network Emergency Response Coordination Center of China (CNCERT/CC), China's primary computer security monitoring network claimed that China fallen victim of one of biggest cyber attacks originated from US, Japan & South Korea. We must have to say that this statement is truly irrelevant. Cyber crime investigator have found that China was directly responsible for the hack into Japan's Biggest Defense Contractor Mitsubishi, Japan Aerospace Exploration Agency (JAXA) & Parliament of Japan. In case of South Korea  more than 13 Million of MapleStory players data has been stolen, there also hackers from China was responsible. 


-Source (The Hill, Cnet & WT)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Obama Administration Is Implementing Tighter Penalties For Cybercrimes


The Obama administration is seeking tougher sentences for people who are found guilty of hacking or other digital offenses, two officials said Wednesday.  
Associate Deputy Attorney General James Baker and Secret Service Deputy Special Agent in Charge Pablo Martinez said the maximum sentences for cyber crimes have failed to keep pace with the severity of the threats.  
Martinez said hackers are often members of sophisticated criminal networks.
"Secret Service investigations have shown that complex and sophisticated electronic crimes are rarely perpetrated by a lone individual," Martinez said.
"Online criminals organize in networks, often with defined roles for participants, in order to manage and perpetuate ongoing criminal enterprises dedicated to stealing commercial data and selling it for profit," he said.
Baker and Martinez appeared before the Senate Judiciary Committee to discuss the portion of the White House's cybersecurity legislative proposal that calls for stiffer penalties for cyber crimes as part of an update to the Computer Fraud and Abuse Act (CFAA).

The administration argues the Racketeering Influenced and Corrupt Organizations Act should be updated to make CFAA offenses subject to its terms. That law is used to prosecute organized crime. 
Baker said hacking has increasingly become a tool of choice for crimes like identity theft, extortion and corporate espionage.
"As computer technology has evolved, it has become a key tool of organized crime," Baker said. "Many of these criminal organizations are similarly tied to traditional Asian and Eastern European organized crime organizations."
The administration's proposal also calls for a national data breach standard to replace the current patchwork of state laws. Sen. Al Franken (D-Minn.) expressed concern that the proposed 60-day window for companies to notify customers their data has been breached would be too long, but Baker said the administration is willing to work with Congress on the issue. Sen. Richard Blumenthal (D-Conn.) shifted the conversation to the portion of the White House plan dealing with protecting critical private sector networks from outside attacks.

Baker said the White House plan does not include any criminal or civil provisions for forcing companies to comply with Department of Homeland Security cyber security standards. "The idea was to create a lighter touch ... to build incentives into the system," Baker said.

Experts have warned that without some sort of enforcement mechanism companies will not take the necessary security precautions. Blumenthal echoed that stance, suggesting the administration "consider some kind of stick as well as a carrot." Industry has argued that resources are the main limitation and argued for incentives such as liability protection for firms that experience attacks. 
But Baker expressed agreement with Blumenthal and said the current range of incentives built into the system, such as the loss of investor trust, stock market value and privileged corporate data has not been enough to convince companies to take adequate security measures.


-News Source (The HILL, CCFA, HLS)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

White House Orderd to Issue New Cyber Security Policies


The White House will issue Friday an executive order on computer security to prevent breaches of the sort that occurred with the release last year of hundreds of thousands of classified documents to the Web site WikiLeaks.
The order, coinciding with National Cybersecurity Month, replaces an outdated policy predating the Obama administration and caps a seven-month review of procedures for handling classified information.
The order directs agencies to designate a senior official to oversee classified information sharing and safeguarding for the agency and enshrines a number of measures the Pentagon and other agencies have announced, including the Pentagon’s disabling the “write” capability on most computers in the military’s secret-level classified network to prevent downloading classified data onto removable drives.
“Our nation’s security requires classified information to be shared immediately with authorized users around the world, but also requires sophisticated and vigilant means to ensure it is shared securely,” Obama’s order said.
The order, first reported by the New York Times on Thursday night, also creates an interagency task force headed by the attorney general and the director of national intelligence to detect and prevent leaks from government employees  what is known as the “insider threat.”
It also calls for a Senior Information Sharing and Safeguarding Steering Committee with responsibility for coordinating interagency efforts and ensuring that agencies are held accountable for carrying out the policies and standards.

The White House notes that agencies have made “significant progress” in shoring up security. The Pentagon, for instance, has begun to issue smart cards with special identity credentials required to log onto the secret-level classified network. The cards allow holders access to only those portions of the network that contain information relevant to their jobs.
The Pentagon is also piloting insider-threat technology developed by the National Security Agency and is developing an information-technology audit to identify suspicious behavior on all Department of Defense systems.

-News Source (Washington Post)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

#opSOTU By Anonymous To Oppose Executive Cyber Security Order (The Revised CISPA)

#opSOTU By Anonymous To Oppose Executive Cyber Security Order (The Revised CISPA)

Last year the Internet and its trillion of users across the globe has faced several barrier when, number of approach from Senate and government, along with few corporate and other organization were in the target to make the entire Internet censored. To engage this motive they have approached and introduced a number of regulations and act such as SOPA, PIPA, CISPA & ACTA. But to implement those enactment was not that easy, as huge number of organization (including White House, Wikipedia & so on), billions of mass people stand against those controversial act, and as expected those acts were ruled back, that said protest might not get the full success, if hackers around the globe did not take part in it. It was the hackers communities who forced the govt to roll back those rules. But the victory was not that easy to achieve, as the president of U.S. appeared before a joint session of Congress to deliver the State of the Union Address and he plans to sign an executive order for cyber-security as the House Intelligence committee reintroduces the defeated CISPA act which turns private companies into government informants. As soon as the deceleration of the executive order for cyber-security came, immediately protest came. Hacktivist group Anonymous yet against stand against the controversial CISPA, and called an operation dubbed Operation SOTU (#opSOTU). In the campaign the hacker group states a clear intent to obstruct Internet broadcasts of the president's State of the Union address, an action the group justifies by pointing to renewed interest in Congress to pass the Cybersecurity Intelligence Sharing and Protection Act (CISPA), a measure Anonymous has long opposed. 

Press Release of Anonymous (#opSOTU):- 
Citizens of the Internet,
Last year we faced our greatest threat from lawmakers. We faced down SOPA, PIPA, CISPA and ACTA.

And we won!

But that victory did not come easily. Nor did it come without a price.

Aaron Swartz was one of the leading voices in the fight against these idiotic and destructive efforts to control the last free space on Earth.

Aaron Swartz was persecuted. Now Aaron Swartz is dead.
Tonight, the President of the United States will appear before a joint session of Congress to deliver the State of the Union Address and tomorrow he plans to sign an executive order for cyber-security as the House Intelligence committee reintroduces the defeated CISPA act which turns private companies into government informants.

He will not be covering the NDAA, an act of outright tyrannical legislation allowing for indefinite detention of citizens completely outside due process and the rule of law. In fact, lawyers for the government have point-blank refused to state whether or not journalists who cover stories or groups the Government disfavors would be subject to this detention.

He will not be covering the extra-judicial and unregulated justifications for targeted killings of citizens by military drones within the borders of America, or the fact that Orwellian newspeak had to be used to make words like “imminent” mean their opposite.

He will not be covering Bradley Manning, 1000 days in detention with no trial for revealing military murders, told that his motive for leaking cannot be taken into consideration, that the Government does not have room for conscience.

He will not be covering the secret interpretations of law that allow for warrant-less wiretapping and surveillance of any US citizen without probably cause of criminal acts, or the use of Catch-22 logic where no-one can complain about being snooped on because the state won’t tell you who they’re snooping on, and if you don’t know you’re being snooped on, you don’t have a right to complain.

We reject the State of the Union. We reject the authority of the President to sign arbitrary orders and bring irresponsible and damaging controls to the Internet.
The President of the United States of America, and the Joint Session of Congress will face an Army tonight.
We will form a virtual blockade between Capitol Hill and the Internet. Armed with nothing more than Lulz, Nyancat and PEW-PEW-PEW! Lazers, we will face down the largest superpower on Earth.

And we will win!

There will be no State of the Union Address on the web tonight.

For freedom, for Aaron Swartz, for the Internet, and of course, for the lulz.

We Are Anonymous,
We Are Legion,
We Do Not forgive,
We Do Not forget,
Expect Us.

..."

But unlike last year, this time the approach of CISPA is more organized, as not only Congress but also the White House will also unveil President Barack Obama's long-awaited executive order on cyber security. So to stand against such an organized and well planned act, the protester need to be more decent and more united. As we all want and prefer freedom and privacy in our personal life as well as in the Internet, so we will fight and expect to win. So stay tuned with VOGH, and lets see what is coming for us. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

US National Archives Has Blocked Search Containing 'WikiLeaks'

US National Archives Has Blocked Search Containing 'WikiLeaks'

The movement of WikiLeaks faced another bar, as the searches for “WikiLeaks” in the public search engine for the US National Archives have been blocked. Any search containing the word “WikiLeaks (like “Congress” and “WikiLeaks”; "Obama" and "WikiLeaks") turns up an error message saying "The page you have requested has been blocked, because the URL is banned" as shown the picture below.

The whistle blowing website of WikiLeaks already lashed out at the move, saying the Archives has  literally turned into “Orwell’s Ministry of Truth.” In a tweet the official twitter account of WikiLeaks said “The US state is literally eating its own brain by censoring its own collective memories about WikiLeaks.” And, in another tweet WikiLeaks said, “The US National Archives censoring searches for its records containing the word ‘WikiLeaks’ is absolutely absurd.” 
The block is likely to be in line with the “Protecting Cyberspace as a National Asset Act,” a form of internet censorship the US adopted back in 2010. It did not become law, but it prompted various US government agencies such as the White House Office of Management and Budget and the US Air Force to advise their employees not to read or access classified documents being made available by sites like WikiLeaks. The Library of Congress went further by blocking access to WikiLeaks content from its server in 2010. According to the official blog post of  Library of Congress “The Library decided to block Wikileaks because applicable law obligates federal agencies to protect classified information.  Unauthorized disclosures of classified documents do not alter the documents’ classified status or automatically result in declassification of the documents.” The White House’s Office of Management and Budget today provided the guidance that “federal agencies collectively, and each federal employee and contractor individually, are obligated to protect classified information pursuant to all applicable laws, as well as to protect the integrity of government information technology systems.” -said Matt Raymond in the blog post of LOC. 
Though it is unknown when the Archives began blocking searches, but according to diplomatic cables released over the past months the US Justice Department’s investigation targeting of both Assange and WikiLeaks is real. So may be this block has connection or may be a return from the U.S. Govt of the last release of WikiLeaks that is  'Detainee Policies'  in what it said more than 100 classified or otherwise restricted files from the United States Department of Defense covering the rules and procedures for detainees in U.S. military custody. At the moment WikiLeaks founder Julian Assange is holed up in the Ecuadorian embassy in London as the UK has forcefully asserted that it will deny him safe passage to Ecuador. Ecuador granted Assange political asylum in August over fears that if extradited to Sweden, Assange could be transferred to the US and once there, face execution.



-Source (RT)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

US & Russia "reset" their Cybersecurity Relationship


The United States and Russia have for several years been engaged in a high-level diplomatic “reset” of their relationship, complete with a physical "reset" button; now, that “reset” has been extended to the Internet.
The current goal of a better working relationship with Russia is much like the goal pursued by the US during the Cold War: making sure that the two countries did not misinterpret each others actions in such a way as to start an unnecessary conflict. While such relationships used to be about understanding troop movements or missile positioning, the two countries are now just as concerned with Internet actions.
"Both the US and Russia are committed to tackling common Cybersecurity threats while at the same time reducing the chances a misunderstood incident could negatively affect our relationship," said Howard Schmidt, US Cybersecurity Coordinator, in a statement yesterday.
We’re actively working on doing so in numerous ways: through regular exchanges of information on technical threats to both sides like botnets; by better understanding each other’s military views on operating in cyberspace; and by establishing 24/7 systems allowing us to communicate about cybersecurity issues via our existing and highly successful crisis prevention communications links between our two capitals. We plan to have all three mechanisms established by year’s end.
Such measures are increasingly important. The recent “International Strategy for Cyberspace," released by the US back in May, made clear that American officials would treat things like cyberattacks and Internet espionage the same way they would any offline threat. Indeed, an electronic attack could even bring the US military into action on behalf of an allied country.
"When warranted, the United States will respond to hostile acts in cyberspace as we would to any other threat to our country," said the document. "All states possess an inherent right to self-defence, and we recognize that certain hostile acts conducted through cyberspace could compel actions under the commitments we have with our military treaty partners We reserve the right to use all necessary means—diplomatic, informational, military, and economic—as appropriate and consistent with applicable international law, in order to defend our Nation, our allies, our partners, and our interests."
Given the difficulty of definitively identifying bad actors on the Internet and determining whether they are freelancers, organized crime, or foreign government agents, the possibilities for suspicion and misunderstanding remain high. The newest element of the US/Russian "reset" is meant to create some level of trust between officials on both sides.

To See the Statement of White House Click HERE 
To download the PDF of the International Strategy for Cyberspace Click HERE


-News Source (ars, white-house)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...