skip navigation

More signal. Less noise.

Daily briefing.

Twitter bans SEA hacktivists, and the Syrian Electronic Army vows retaliation. Other loosely affiliated hackers make low-grade hits on Australian and New Zealand sites, targets-of-opportunity in a campaign against nations deemed insufficiently enthusiastic for Bashir Assad. Other cybervandalism appears in the Philippines and South Asia.

BlackHat has wrapped up. Some of the more interesting vulnerability demonstrations include an exploit that bypasses SSL encryption on HTTS-protected sites, the use of Javascript and timing attacks to steal browser information, methods of bypassing file-based sandboxes, simulation of a "catastrophic" SCADA attack, and vulnerabilities in oil platform infrastructure. (Industrial control system threats are beyond proof-of-concept: a honeypot's results show that water infrastructure SCADA systems are indeed being probed.)

Other attack techniques in the air today include "stepping stone" infected sites as a route to desirable targets, creative backdoors, and analysis-resistant malware used in Bitcoin mining.

Government surveillance remains in the news, as VPN vulnerability to snooping is reported. Concerns about extensive cooperation with NSA surveillance rise in New Zealand and the United Kingdom; South African media wonder about their country's policies. The US Congress seems poised to restrict some NSA programs.

Cloud providers concerned about their business, post-Snowden, consider "no-knowledge" offerings. A new startup offers the services-for-hire of bug-bounty winners.

UCLA researchers' "jigsaw" approach to software encryption draws more attention. At BlackHat, panelists warn that the industry-standard RSA algorithm will soon be broken, and that new cryptographic approaches are badly needed.

Google's new Moto-X phone may prove an interesting case study of security design.


Today's issue includes events affecting Algeria, Australia, Canada, China, Czech Republic, India, Kenya, Latvia, New Zealand, Pakistan, Philippines, Russia, Syria, United Kingdom, United Nations, United States..

SINET's Innovation Summit is now full, but if you're unable to attend, you can still keep up with the proceedings through the CyberWire's special coverage on August 6 and 7. (Our coverage will also include live updates via Twitter: follow us @thecyberwire.)

Cyber Attacks, Threats, and Vulnerabilities

Syrian Electronic Army Declares War on Twitter After Hackers' Accounts Are Suspended (Softpedia) Twitter has once again started suspending the accounts of the Syrian Electronic Army. The move comes shortly after the pro-Assad hackers hijacked a Thomson Reuters Twitter account and the personal emails of three White House employees

Official Websites of Automobile Giants Fiat and Dodge Australia Hacked by Dr.SHA6H (Hack Read) A well known hacker going with the handle of Dr.SHA6H has hacked and defaced 3 official websites of automobile and motor companies including Dodge, formally the Dodge Division of Chrysler Group, FIAT motors Australia and FIAT New Zealand. The sites were hacked today and left with a deface page and a message in support of people of Syria and against the role of US, UN, Arab countries and governments around

Websites of United Nations Development Programme and UN Volunteers Philippines Hacked by Over-X (Hack Read) The well known Algerian hacker going with the handle of Over-X is back, this time by hacking and defacing 2 official websites of United nations (UN) designated for the Republic of the Philippines. One site belongs to United Nations Development Programme (UNDP) and second site belongs to United Nations Volunteers (UNV), left with a deface page along with a simple note

Website of High Commission of India in Islamabad Hacked and Defaced by Spider64 (Hack Read) An Indian hacker going with the handle of Spider64 has hacked and defaced the official websites of Indian High Commission in Pakistan. The site was hacked today, left with a deface page along with a message but reason for targeting Indian High Commission site was not mentioned anywhere. The message on the deface page was expressed in following words: We have no rules, hacked by Spider64 Link of targeted

Scans for Open File Uploads into CKEditor (Internet Storm Center) We are seeing a lot of scans for the CKEditor file upload script. CKEditor (aka "FCKEditor") is a commonly used gui editor allowing users to edit HTML as part of a web application. Many web applications like wikis and bulletin boards use it. It provides the ability to upload files to web servers. The scans I have observed so far apper to focus on the file upload function, but many scans will just scan for the presence of the editor / file upload function and it is hard to tell what the attacker would do if the editor is found

Gone in 30 seconds: New attack plucks secrets from HTTPS-protected pages (Ars Techica) Exploit called BREACH bypasses the SSL crypto scheme protecting millions of sites. The HTTPS cryptographic scheme, which protects millions of websites, is susceptible to a new attack that allows hackers to pluck e-mail addresses and certain types of security credentials out of encrypted pages, often in as little as 30 seconds

'Malware–infected hosts as stepping stones' service offers access to hundreds of compromised U.S based hosts (Webroot Threat Blog) Malware-infected hosts with clean IP reputation have always been a desirable underground market item. On the majority of occasions, they will either be abused as distribution/infection vector, used as cash cows, or as 'stepping stones', risk-forwarding the responsibility, and distorting the attribution process, as well as adding an additional OPSEC (Operational Security) layer to the campaign of the malicious attacker

Javascript and Timing Attacks Used to Steal Browser Data (Threatpost) Security researchers have been warning about the weaknesses and issues with JavaScript and iframes for years now, but the problem goes far deeper than even many of them thought. A researcher in the U.K. has developed a new technique that uses a combination of JavaScript-based timing attacks and other tactics to read any information he wants from a targeted user's browser and sites the victim is logged into. The attack works on all of the major browsers and researchers say there's no simple fix to prevent it

Hot Knives Through Butter: Bypassing File-based Sandboxes (FireEye) Diamonds are a girl's best friend. Prime numbers are a mathematician's best friend. And file-based sandboxes are an IT security researcher's best friend. Unfortunately, malware authors know this. Aware that researchers are using sandboxes to monitor file behavior, attackers are building sandbox-evading techniques into new advanced persistent threat (APT) attacks — and even using these tricks to resurrect notorious malware classics

Java Back Door Acts as Bot (McAfee) The current threat landscape is often driven by web-based malware and exploit kits that are regularly updated with newly found vulnerabilities. Recently, we received an interesting malware binary-a JAR package that opens a back door for an attacker to execute commands and acts as a bot after infection

More Creative Backdoors – Using Filename Typos (Sucuri) When a site gets compromised, one thing we know for sure is that the attackers will leave some piece of malware in there to allow them access back to the site. We call this type of control capability a backdoor. Backdoors are very hard to find because they don't have to be linked anywhere in the site, they can be very small, and can be easily confused with "normal" code. Some of them have passwords, some are heavily encrypted/encoded and can be anywhere in your site

Bitcoin Miners Use AutoIt-Complied Programs With Antianalysis Code (McAfee) Last year, my colleague Itai Liba blogged about the association between malware and AutoIt, a very convenient environment for malware and tools development. AutoIt allows both easy interface creation for rapid development and full Windows API access for whatever is not directly supported. We have seen an increase in the use of AutoIt scripts by malware authors and other bad guys to achieve their malicious ends

Malicious Bitcoin Miners target Czech Republic (Avast) Today we are going to talk to those of you who use Bitcoin digital currency to pay for a variety of goods and services – along with a warning about yet another source of Bitcoin miners – the sharing services. You may think that if you avoid cracks and keygens while browsing the web you will be safe. Well, we would recommend that you reconsider that position. Recently we found that on the file sharing service someone uploaded a lot of fake files containing Bitcoin miners

Security breach at Opscode as attackers download databases (The Register) Attack blocked in five minutes flat. Updated Opscode, the commercial side of the open source Chef configuration management tool beloved by Google, Facebook, and IBM, has warned customers that a flaw in an unnamed third-party application has left its wiki and ticketing system pwned

Ubuntu puts forums back online, reveals autopsy of a brag hacker (The Register) Canonical hardens security, shows Sputn1k_ only wolfed down useless salted hash. Ubuntu Forums are back to normal following a serious hack attack that exposed the usernames, email addresses and hashed passwords of 1.8 million open source users

SIG Australia Hacked (eSecurity Planet) Several user names and clear text passwords were published online

Harbor Freight latest target of cyber attack on credit accounts (WFIE 14News Evansville) An Evansville man learned that he was a victim of credit card fraud after shopping at a local hardware store. Harbor Freight tools is issuing a warning to customers that they have been the victim of a cyber attack, and your credit card information could be in the hands of thieves

SCADA Experts Simulate 'Catastrophic' Attack (Dark Reading) SCADA experts here today demonstrated just how easy it is to commandeer the antiquated networking protocols used in an oil well pumping station and other SCADA environments, causing a simulated oil tank to nearly overflow using spoofed commands to the programmable logic controller (PLC)

Industrial control systems targeted by malicious attackers, research shows (CSO) A researcher uses a network of simulated water pump systems to monitor how frequently industrial control systems are attacked. Attackers are actively targeting Internet-connected industrial control systems (ICS) in an effort to compromise their operation, according to data collected from a global network of honeypot systems that simulate water pumps

Can you spot phishing? Probably not! (CTO Vision) North Carolina State just conducted a study that showed only 7.5% ( yes, that is less than 10%) of the participants were able to identify fake emails. The study also showed that more than 50% of the group missed half of the fake emails and still deleted at least one authentic email. Yet, prior to taking the test, 89% of the participants stated they were "confident" in their ability to differentiate between a legitimate email and one sent by a scam artist

Using Google Image Search to Find Linkedin Invitation Scams (TripWire) I've been getting a lot of fake LinkedIn invitations to connect lately, so I thought I'd share this simple method of separating the real from the fake. Of course, if your gut says it's fake, it probably is. That person you don't recognize who hasn't really filled in much of their profile probably isn't a connection you want or need

New ransomware uses webcam and Homeland Security threat to scare victims (WeLiveSecurity) A new ransomware infection scares its victims by invoking the name of the Department of Homeland Security, and the National Cyber Security Division - and frightens users further by posting a webcam picture of themselves in a pop-up window as it demands money

Is the person sitting next to you a malicious insider? (FierceITSecurity) Insider threats carried out by employees within an organization can cost companies millions of dollars, Patrick Reidy, chief information security officer at the Federal Bureau of Investigation, warned an audience here at the Black Hat security conference

Tracking down a DDoS attacker (FierceITSecurity) A major customer of a Canadian ISP was subjected to a gigabit-plus size distributed denial of service attack that "took down everything," related Robert Masse, security consultant and partner at Swift Identity, at the Black Hat security conference

iOS users can enjoy a 'slick' experience and be spied on as well, says Lacoon researcher (FierceITSecurity) Despite Apple's (NASDAQ: AAPL) reputation for strong iOS security, researchers from Lacoon Mobile Security found that close to half of devices infected with spyphone malware were iOS devices, according to a study revealed here at the BlackHat security conference

Hackers could exploit security hole to launch next BP oil spill (FierceITSecurity) Hackers could exploit a vulnerability in devices controlling oil platforms and intentionally cause an environmental disaster, warned security researchers from Cimation here at the Black Hat security conference

NSA Surveillance Can Penetrate VPNs (Dark Reading) The National Security Agency has a system that allows it to collect pretty much everything a user does on the Internet, according to a report published by The Guardian on Wednesday, apparently even when those activities are done under the presumed protection of a virtual private network (VPN)

US spy agencies eavesdrop on Kiwi (Stuff) The New Zealand military received help from US spy agencies to monitor the phone calls of Kiwi journalist Jon Stephenson and his associates while he was in Afghanistan reporting on the war

The phantom of the boot sector. (Eugene Kaspersky-Nota Bene) In the ongoing battle between malware and anti-malware technologies, there's an interesting game that keeps getting played over and over - king of the castle

Black Hat: Android Master Key Vulnerability Makes Us Safer (eSecurity Planet) When is an Android security flaw a good thing? When it makes us safer, says researcher during his Black Hat presentation. Jeff Forristal, aka Rain Forest Puppy, made headlines around the globe earlier this month when he revealed a new Android master key vulnerability that could potentially put all Android devices at risk of exploitation

The top 10 new reasons to be afraid of hackers (The Verge) The scariest new tricks at this year's twin computer crime conferences, Black Hat and Def Con

Security Patches, Mitigations, and Software Updates

Apple to Fix 'Fake USB Charger' Flaw in iOS 7 (Threatpost) Apple claims it will fix a previous disclosed flaw in its mobile operating system that can allow hackers complete access to an iPhone or iPad via a fake USB charger

Carriers hack into their own SIM cards to fix security issue (CNN) CNN reports that the security researcher who detailed a SIM card security flaw that might have put 750 million phones at risk says several carriers have fixed the issue. The hack, revealed last month by Karsten Nohl, the founder of German firm Security Research Labs, exploited a flaw in cards using DES (Data Encryption Standard) to secure data, and allowed the researcher to intercept text messages, make carrier payments, and impersonate the phone's owner

New WordPress and Joomla Updates Available (Sucuri) If you are a WordPress or Joomla user, you better start updating your sites now

Cyber Trends

Understanding the Global Risk of Cybercrime (SCL) Stewart James seeks to widen awareness of cybercrime issues and counsels the need to consider the real threat cybercrime poses when advising business clients

Is the risk of cyber-warfare overrated? (The Economist) The argument so far has been chiefly semantic, about the definition of warfare. Thomas Rid is not disputing that cyber-attacks are nasty. He is just saying that none so far meet all the (his) criteria for "warfare" which is violent, not metaphorical. The internet is a vector for sabotage, espionage and subversion, but these are less, not more violent when done by computer. Talk of "cyber-warfare" militarises the discussion and distracts from the truly hard questions, about defending society while constraining the intelligence agencies and preserving liberty. Richard Bejtlich attacks that head-on

'Security? We've heard of it': Cloud contracts hazy on security, says Gartner (Computing) Security provisions of commercial cloud services - especially software-as-a-service (SaaS) - are frequently inadequate, with contracts containing "ambiguous terms regarding the maintenance of data confidentiality, data integrity and recovery after a data loss incident", according to analyst group Gartner

Rising cyber-attacks leave firms with huge losses (Standard Digital) Cyber-attacks and security threats to businesses have risen sharply in the recent past, resulting in huge financial losses to firms in Kenya. A report released by the Telecommunications Service Provider of Kenya ( TESPOK) yesterday indicated that most businesses were suffering from recurrent disruptions

Cyber Attacks Endanger Securities Exchange Market (Midsize Insider) Fifty-three percent of the surveyed exchanges said they experienced a cyber attack last year. These attacks may include various methods, but most commonly

Five Points About Cyber Risks that CEOs Must Consider (IT Business Edge) Online threats and cyber crimes increase with intensity and complexity almost daily. Couple this with the fact that nearly all business functions rely on the Internet and IT in some way, and you have big reasons to fear a failure in your company's online defenses


Finding Maryland's next cyber security darling (Baltimore Business Journal) Industry leaders consider the sale validation of their efforts to promote cyber here. "It's a real affirmation not only of Sourcefire and the good work they were doing

Cyber Command Seeks To Close Gaps in Offensive, Defensive Skills ( The Defense Department wants cyber experts who understand both offensive and defensive cyber operations. The barrage of malicious attacks from insider

There is no 'I know what I am doing' trump card in security (Virus Bulletin) NSA activities could make millions avoid US-based services. We have all been there. To continue the product you're working on, you need to get some extra permission: a port needs to be opened, or perhaps some files need to be uploaded onto a protected system. You ask the IT department for this permission and, much to your frustration, they won't give it to you until you've explained in full detail why you need it, and even then they will have to check with their management. "But I know what I'm doing. And my manager says it is fine."

SpiderOak Takes Novel Approach To Data Privacy (InformationWeek) Prism episode has increased interest for cloud services like SpiderOak, which does not keep copies of user encryption keys -- and thus can't provide access to user files. Ethan Oberman has a problem with cloud computing. "A person should be able to use cloud technologies without relinquishing his or her privacy," explained Oberman, CEO of cloud storage service SpiderOak, in a phone interview

Carl Icahn Sues Dell To Keep Buyout Vote On Track (CRN) Investor Carl Icahn sued Dell (NSDQ:Dell) Thursday to prevent the board from further delaying a buyout vote scheduled for Friday at 9 a.m. CST

Dell, buyout group close to new deal ahead of vote (MarketWatch) Dell Inc. DELL +5.06% and the buyout group looking to take the computer maker private are nearing a deal that would raise the price being offered to shareholders in exchange for a change in voting rules so that abstentions aren't counted as no votes

CACI's Recent Intelligence Contracts Worth $425M (Executive Biz) CACI International Inc. revealed that recently awarded contracts with intelligence community customers totaled more than $425 million amid the company's efforts to expand and help bolster national security

SAIC completes $85 million sale of Tysons campus (Washington Business Journal) SAIC recently closed on the $85 million sale of its three-building Tysons Corner headquarters to The Meridian Group, setting the stage for a multimillion-dollar redevelopment of the 18-acre campus in the years ahead

Booz Allen CEO: Snowden 'was not a Booz Allen person' (Washington Post) McLean-based Booz Allen Hamilton reported a more than 13 percent jump in quarterly profit Wednesday and said its government customers have been supportive since the company's former employee Edward Snowden acknowledged leaking government secrets. Booz Allen's chief executive, Ralph W. Shrader, rebuked Snowden's actions on Wednesday in his first public remarks on the topic.Shrader said during a conference call that he has met with Booz Allen employees on the matter

Former NSA analysts start company to research zero-day vulnerabilities in websites (NetworkWorld) Idea behind Synack is making bug-bounty experts from around the globe -- and the NSA -- available for hire. Two former National Security Agency (NSA) computer network operations analysts have set up a company called Synack that is offering to match bug-bounty security experts from around the world -- including from within the NSA on a freelance basis -- to discover zero-day vulnerabilities in websites

Hundreds of UK CSC staff face chop, told to train Indian replacements (The Register) IT giant wants to suck brains amid 750 layoffs. Computer Science Corporation (CSC) workers heading for the chopping block in Britain have been asked to train their replacements in India and the Czech Republic

SAIC President Deborah Lee James Nominated AF Secretary (GovConWire) Deborah Lee James Deborah Lee James, president of Science Applications International Corp.'s (NYSE: SAI) technology and engineering sector, has been nominated by President Barack Obama to serve as Air Force secretary, Defense News reported Thursday

Products, Services, and Solutions

Protegrity expands enterprise big data protection capabilities (Help Net Security) Protegrity released the Protegrity Data Security Platform 6.5, which expands the Protegrity Big Data Protector capabilities to include support and certification on many Apache Hadoop distributions

NSS Labs unveils Threat Modeling and Threat Forecasting (Help Net Security) NSS Labs announced availability of two new advisory services - Threat Modeling and Threat Forecasting - helping clients to better understand their risk and distill actionable threat intelligence

Free first aid kit for computer viruses (Help Net Security) Avira launched the Avira Rescue System, a software first aid kit for scanning and repairing PC computers that are already infected with malware. It can be downloaded for free onto any CD or USB stick

JT to launch new Cyber-attack prevention service (Channelonline) JT along with the global RAD Group has developed world-class software to prevent Cyber-attacks. In recent years, online security is of worldwide concern

VERIS: A New Database for Sharing Security Incident Information (Infosecurity Magazine) A new community database has been launched by Verizon to help bridge the uncertainty gap in data breach information: what we know and what we need to know. Based on VERIS, it is designed to facilitate the secure sharing of incident information for the good of all

YC Startup True Link Financial Is Out To Help The Elderly Avoid Scammers With Pre-Paid Visa Cards (TechCrunch) It's a heartbreaking and, unfortunately, common story: an elderly man receives a phone call from someone claiming to be his granddaughter asking for him to wire money to get her out of a sticky situation. A late night infomercial offers a deep discount on dishware without mentioning the hundreds of dollars in nonrefundable shipping fees

Technologies, Techniques, and Standards

Security Intelligence and Threat Intelligence are not the same thing (HP) Enigo Montoya said it best in "The Princess Bride" - You keep using that word. I do not think it means what you think it means. The last two months have been interesting. I've found myself in conversations where the phrases "threat intelligence" and "security intelligence" have been used virtually interchangeably without thinking anything of it. Don't get me wrong, I wouldn't dare disparage this behavior too harshly. Some of the people who have done it are at the heads of their respective organizations. Before I really got wrapped into this on a daily basis I was prone to the same mistakes and misspoken phrases

Real-time data analysis increases DDoS defenses (Help Net Security) Real-time analytics are a powerful tool for identifying denial of service attacks and other cyber threats, risks and events

How to monitor the security and compliance of your cloud providers (Smart Business Network) In addition, the Cloud Security Alliance (CSA), a leading organization that evaluates cloud providers, has developed the Cloud Control Matrix (CCM) as part of

Keep your laptop safe while using Wi-Fi hotspots (Help Net Security) The relaxing atmosphere of surfing at the beach makes it easy to forget about the sharks. Connecting to an unsecured network poses serious risks to your laptop and data. In a recent study, Bitdefender

The rise of BYOD: What are the key security risks and how can SMEs overcome them? (ITProPortal) It's no secret that the momentum of the BYOD (bring your own device) trend has surged like a tidal wave across organisations of all sizes and industries recently. In this Q&A we talk with Don Smith, technology director at Dell Secureworks, to discuss the major concerns around BYOD and examine how businesses can overcome these challenges

Layering data? Better check your data supply chain for junk data (FierceBigData) One of the most effective ways to arrive at solid answers and accurate interpretations in big data projects is to layer data from multiple sources. That is unless the data you are importing is inaccurate or even purposefully manipulated

McAfee exec on Mandiant, cyberspies and costs (DeepDiveIntel) The Internet security firm McAfee takes a traditional view on the question of whether private companies should name names when it comes to responsibility for cyber attacks and espionage. Its answer is no. McAfee describes events in dry, geographic terms, without references to governments. It's a quaint approach compared to that of Mandiant, the U.S. cyber forensics company that earlier this year accused a Chinese "cyber espionage unit" of stealing American intellectual property and blamed China for hacking the New York Times. In an interview with Deep Dive, McAfee's Tom Gann explains his company's approach to attribution; its support for a public-private partnership with the U.S. government; and its decision to underwrite a cybercrime and espionage cost study by the Center for Strategic and International Studies, a Washington, D.C., think tank

Design and Innovation

Enterprises warned against first true Google phone, Moto X (CSO) Ease-of-use in the Moto X, such as always-ready microphone for voice actions, likely to tickle consumers — but haunts security pros. The security nightmare corporations face with the bring-your-own-device (BYOD) trend just got worse with the release of Google's new Moto X. With the Android smartphone unveiled Thursday, Google is hoping to lure customers with a personal digital assistant that's easy to use and can guess what information or services people want by reading emails and schedules and tracking search queries. While all this data collection may make the device invaluable, it also should make corporations very nervous

Research and Development

Crypto experts issue a call to arms to avert the cryptopocalypse (Ars Technica) Nobody can crack important algorithms yet, but the world needs to prepare for that to happen. At the Black Hat security conference in Las Vegas, a quartet of researchers, Alex Stamos, Tom Ritter, Thomas Ptacek, and Javed Samuel, implored everyone involved in cryptography, from software developers to certificate authorities to companies buying SSL certificates, to switch to newer algorithms and protocols, lest they wake up one day to find that all of their crypto infrastructure is rendered useless and insecure by mathematical advances

Black Hat: Elliptical curve cryptography coming as smarter algorithms threaten RSA (NetworkWorld) Rapid advances in math techniques signal the eventual demise of the currently standard crypto systems. Within five years the math for cracking encryption algorithms could become so efficient that it may render today's commonly used RSA public key cryptography algorithm obsolete, Black Hat attendees were told. While it might take longer, the end of RSA as an effective tool is inevitable, says Alex Stamos, CTO of the Artemis division of NCC Group. "It almost certainly will happen before we retire," he told the group attending his briefing on the topic

UCLA researcher's breakthrough in encryption by "software obfuscation" (ThinkDigit) A team of computer scientists led by Prof Amit Sahai at UCLA have developed "mathematical jigsaw puzzles" to help encrypt software, protect IP, and prevent reverse-engineering of commercial programs


Universities are putting private financial data at risk (Help Net Security) HALOCK found that over 50% of the colleges and universities investigated allow for the transmission of sensitive information over unencrypted (and therefore unprotected) email as an option without

Big data degrees? Oh puh–lease (FierceBigData) Given that the majority of job openings are in tech related fields in the midst of the slowest economic recovery ever, and also given that big data is the big kahuna in tech, it's natural for job hungry people to lunge for a degree in big data. And wherever there is a hungry lunge, equally hungry universities will be there to net the lungers

Legislation, Policy, and Regulation

FBI said to be taking a hacker approach to spying (C/NET) Using tools to remotely record conversations on Android devices and laptops, the FBI is allegedly taking a cyber tack on surveillance

President Obama's national security team acknowledges for first time that it reads and stores phone records of millions of Americans (New York Daily News) Since it was revealed recently that the National Security Agency puts the phone records of every American into a database, the Obama administration has assured the nation that such records are rarely searched and, when they are, officials target only suspected international terrorists. President Barack Obama's national security team acknowledged for the first time Wednesday that, when investigating one suspected terrorist, it can read and store the phone records of millions of Americans

Senators propose changes on secret intelligence court (Sacramento Bee) Key Democratic leaders in the body have defended the collection of so-called metadata on people's email and phone calls, echoing Obama administration

Dianne Feinstein floats cutting NSA telephone metadata retention down from 5 years (FierceGovIT) The chair of the Senate Intelligence Committee, Sen. Dianne Feinstein (D-Calif.), said July 31 she may seek to reduce the National Security Agency's retention of telephone metadata collected under Section 215 of the Patriot Act down to 2 or 3 years from the current 5 years

The Real Bradley Manning Problem (National Journal) The leaker gets sentenced--and the government still doesn't know how to share intelligence. Now that a military judge has acquitted Pfc. Bradley Manning of aiding the enemy and convicted him of violating the Espionage Act, civil libertarians are breathing a small sigh of relief. But the Obama administration still has a big problem: how to control the flow of information between government agencies so you don't have a system that allows a private stationed in Iraq--or a contractor dating an acrobat in Hawaii--from downloading and distributing secret documents

NSA In The Cross Hairs (USA Today) In a clear signal of slipping political support for the surveillance strategy, President Obama called a meeting Thursday with a group of lawmakers representing both sides of the increasingly divisive debate. They included the NSA's most prominent critics -- Rep. Ron Wyden, D-Ore.; Rep. James Sensenbrenner, R-Wis.; and Sen. Mark Udall, D-Colo.-- and it fiercest supporters -- Sen. Dianne Feinstein, D-Calif., and Rep. Mike Rogers, R-Mich., the respective chairs of the Senate and House intelligence committees

NSA secrets kill our trust (CNN) In July 2012, responding to allegations that the video-chat service Skype -- owned by Microsoft -- was changing its protocols to make it possible for the government to eavesdrop on users, Corporate Vice President Mark Gillett took to the company's blog to deny it. Turns out that wasn't quite true

Snowden Asylum Could Blow Up Nuke Talks (Foreign Policy) It's one of the signature issues of President Obama's second term, and Edward Snowden may have caused it to crack. On Thursday, nuclear arms control advocates shuddered as Washington erupted in rage over Russia's decision to grant temporary asylum to the former NSA contractor. With Republicans in Congress demanding retaliation and White House officials openly casting doubt on a planned Moscow summit, the worry is that Obama's ambitious goal of reducing deployed strategic nuclear weapons by one-third may have just flown out the window

White House 'extremely disappointed' Russia granted Snowden temporary asylum, rethinks summit… (Washington Post) A highly anticipated fall summit between President Barack Obama and Russian President Vladimir Putin could become a casualty of Moscow's defiant decision to grant temporary asylum to National Security Agency leaker Edward Snowden, the White House signaled Thursday after weeks of pressuring and pleading for his return to face prosecutio

Putin Shows Global Mojo to Russians as U.S. Fumes Over Snowden (Bloomberg) Russian President Vladimir Putin is showing his gamesmanship on a global stage by giving his voters what they want with the asylum granted to ex-U.S. contractor Edward Snowden, while leaving the White House flustered

GCHQ plan to spy on "any phone, anywhere, any time" (Computing) British spy agency GCHQ is being paid £100m to spy on behalf of the US secret services, and is developing the capability to spy on "any phone, anywhere, any time". That is the claim arising from the latest set of documents to be released in The Guardian from the US National Security Agency (NSA) whistleblower Edward Snowden

UK Porn Filter Could Also Censor Other Content (Mashable) Last week, UK Prime Minister David Cameron announced that broadband subscribers will be required to declare if they want to maintain access to online pornography. Now, according to several Internet Service Providers (ISPs), the filters may censor even more. According to Open Rights Group, a digital rights organization that spoke with several ISPs scheduled to implement the UK's porn filter, filters can be enabled across a wide range of content, such as file-sharing websites, dating sites and more

The Bugging of South Africa (All Africa) Recent revelations by former National Security Agency (NSA) computer analyst Edwin Snowden that the NSA was undertaking unwarranted mass surveillance of Americans has thrown the communications surveillance activities of governments into sharp relief

CFAA violations key to 2012 Obama victory? (ZDNet) An important tactic of the Obama reelection campaign was likely a violation of Facebook's terms of service, and therefore a violation of federal law. This is yet more evidence that Justice Department interpretations of the Computer Fraud and Abuse Act are unreasonable and need to be curtailed

Litigation, Investigation, and Law Enforcement

In Defense of Leakers: Snowden and Manning (New Yorker) On the day that Edward Snowden finally left Moscow's airport in a taxi to take up Russia's offer of temporary asylum and the sentencing portion of Bradley Manning's trial continued, it is worth restating what should be obvious. Leaking classified information is a crime, and it can be damaging to the national interest; but, in some circumstances, it can also be a patriotic and useful act that helps bring about necessary reforms

The Government Has Made Its Point (New York Times) The first thing to be said about Bradley Manning's trial is that the entire exercise was unnecessary. There was no real factual dispute, since Manning admitted he had leaked the documents to WikiLeaks, and he offered guilty pleas that would have allowed a sentence of up to 20 years

Latvian foreign minister speaks out against giving up alleged Gozi writer to US (The Register) Latvia has set itself on a collision course with America after the tiny nation's foreign minister said he did not want the alleged creator of the notorious Gozi trojan extradited to face justice in the US

Russian Zuckerberg to Snowden: 'Come work for VKontakte' (The Register) NSA leaker gets job offer from top Slavic social site

Snowden Wins Asylum, WikiLeaks Declares Victory (Foreign Policy) And just like that, Edward Snowden's Moscow airport vacation is over. On Thursday, the NSA leaker's lawyer put him in a taxi and sent him off to a secret location, ending a 39-day stay in Sheremetyevo Airport's so-called "transit zone." Russian migration authorities granted Snowden a one-year temporary asylum, and Anatoly Kucherena, the Russian lawyer who has been assisting his asylum application, proudly displayed a copy of that document for reporters at the airport

Google Pressure Cookers and Backpacks, Get a Visit from the Feds (Atlantic Wire) Michele Catalano was looking for information online about pressure cookers. Her husband, in the same time frame, was Googling backpacks. Wednesday morning, six men from a joint terrorism task force showed up at their house to see if they were terrorists. Which prompts the question: How'd the government know what they were Googling

Google 'pressure cooker,' get a police visit? Maybe not. (Washington Post) The FBI denies a Long Island journalist's claims that a local Joint Terrorism Task Force visited her house after she searched the terms "backpack" and "pressure cooker" on Google. Now the question is: Who did? And, perhaps more importantly, did it actually have anything to do with Google

Employer Tipped Off Police To Pressure Cooker And Backpack Searches, Not Google (TechCrunch) In what might be Medium's first widespread Twitter moment, music writer Michele Catalano used the platform to blog details of an unexpected visit to her home yesterday, from six men she identifies as members of the "joint terrorism task force"

Equifax must pay $18.6 million after failing to fix Oregon woman's credit report (The Oregonian) A jury Friday awarded an Oregon woman $18.6 million after she spent two years unsuccessfully trying to get Equifax Information Services to fix major mistakes on her credit report

Hidden threat: Dirty data leads to damaging lawsuits (FierceBigData) It should be self-evident by now that dirty data, i.e. incorrect data, is harmful to organizations since it leads to bad business decisions and more than a few "terrible, horrible, no good, very bad" days. It should be self-evident but apparently not

BlackBerry reported to FBI over potential privacy and security issues (SC Magazine) German researcher Frank Rieger said in a post that email credentials entered into the BlackBerry 10 email Discovery Service would be sent to RIM Canada servers in clear text if forced SSL was not enabled in mail servers

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

International Conference on Cyber Security (New York, New York, USA, August 5 - 8, 2013) The Federal Bureau of Investigation and Fordham University will host the fourth International Conference on Cyber Security (ICCS 2013) on August 5 - 8, 2013 in New York City. ICCS, the White Hat Summit,...

Third Annual SINET™Innovation Summit (New York, New York, USA, August 6, 2013) SINET™, the premiere community builder and innovation catalyst for the Cybersecurity industry hosts their third annual Innovation Summit at Columbia University on August 6th. SINET programs are where the...

SINET Innovation Summit (New York, New York, USA, August 6, 2013) The purpose of the Innovation Summit is to reinvigorate public private partnership efforts and increase relationships between industry, government and academia that fosters sharing of information and collaboration...

3rd Annual Cyber Security Training Forum (Colorado Springs, Colorado, USA, August 6 - 7, 2013) The Information Systems Security Association (ISSA) - Colorado Springs Chapter and FBC, Inc. will once again host the 3rd Annual Cyber Security Training Forum (CSTF). Formerly known as the Cyber Security...

AFCEA Tinker AFB Information Technology & Cyber Security Expo (Oklahoma City, Oklahoma, USA, August 8, 2013) Commercial vendors are invited to Tinker Air Force Base on Thursday, August 8th to exchange information and provide products demonstrations to the military and civilian personnel on base. IT and Information...

AIAA Aviation 2013 (Los Angeles, California, USA, August 12 - 14, 2013) Leading cybersecurity experts will speak at AIAA AVIATION 2013, being held August 12-14 at the Hyatt Regency Century Plaza, Los Angeles, Calif. Hosted by the American Institute of Aeronautics and Astronautics,...

Security in Government (SIG) (Canberra, Australia, August 12 - 14, 2013) The 25th annual Security in Government (SIG) conference is to be held from 12-14 August 2013 at the National Convention Centre in Canberra. Assistant Director for the National Security Resilience Policy...

A Cloud Computing Introduction for Managers (Columbia, Maryland, Sioux Falls, August 13, 2013) Cloud computing is becoming popular. More and more Technical Managers and Project Managers will be interacting with cloud computing, either developing clouds, using clouds, or selecting among cloud and...

cybergamut Technical Tuesday: A Cloud Computing Introduction for Managers (Columbia, Maryland, Sioux Falls, August 13, 2013) Cloud computing is becoming popular. More and more Technical Managers and Project Managers will be interacting with cloud computing, either developing clouds, using clouds, or selecting among cloud and...

A Cloud Computing Introduction for Manager (Columbia, Maryland, Sioux Falls, August 13, 2013) Cloud computing is becoming popular. More and more Technical Managers and Project Managers will be interacting with cloud computing, either developing clouds, using clouds, or selecting among cloud and...

Resilience Week 2013 (San Francisco, California, USA, August 13 - 15, 2013) The 2013 Resilience Week brings together colleagues across government, academia and industry to facilitate an exchange of ideas dedicated to promising research in resilient systems that will protect cyber-physical...

Resilience Week 201 (San Francisco, California, USA, August 13 - 15, 2013) 2013 Resilience Week brings together colleagues across government, academia and industry to facilitate an exchange of ideas dedicated to promising research in resilient systems that will protect cyber-physical...

Kirtland AFB/Sandia/DOE Cyber Security Seminar & IT Expo (Albuquerque, New Mexico, USA, August 15, 2013) This expo is designed to stimulate exchanges of information between industry partners and Kirtland AFB Information Management Officers', Information Technology personnel, Contracting Officers' as well...

National SCADA Conference (Melbourne, Victoria, Australia, August 15 - 16, 2013) The 12th Annual National SCADA Conference, Australia's largest and longest running SCADA conference, will bring together many of the luminaries of the Australian and International SCADA community to evaluate...

First International Conference on Cyber-Physical Systems, Networks, and Applications (Taipei, Taiwan, August 19 - 20, 2013) CPSNA 2013 will focus on core challenges of cyber-physical systems. Given a tight integration of computation and the physical world, cyber-physical systems must compose robust systems, networks, and applications...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.