skip navigation

More signal. Less noise.

Daily briefing.

Here's something out of the ordinary: an American patriotic hacktivist promises a cyber riot against Wikileaks' Julian Assange and PRISM-leaker Edward Snowden. US authorities probably won't welcome the support.

Other hacktivism comes from Turkey (directed against China in retaliation for Uyghur repression) and (apparently) Jordan (directed against Egyptian government sites in support of the deposed President Morsi).

Several Android vulnerabilities and exploits appeared late last week. Pinterest continues to draw unwelcome attention from cyber criminals. AppRiver notes a trend in spam—"spam blizzards" used as distractions to conceal more serious cyber campaigns.

BAE complains of Chinese cyber espionage. China itself seems to be suffering a rise in cyber attacks.

Facebook plugs an Android leak. Apple updates QuickTime, and Cryptocat fixes a vulnerability in its group chat. Tomorrow is of course Patch Tuesday, and a critical update to Internet Explorer is expected.

Analysts see big data as a very difficult-to-resist temptation to intelligence services. Indeed, in what's either evidence of a successful US tu quoque defense of PRISM or (more likely) a global spasm of defining deviance down, several countries announce electronic surveillance program expansion (in the UK, Russia, and India) while others suffer their own unwelcome revelations (in France and Germany).

US authorities work toward consensus on electronic collection policy as existing practices continue to draw fire from the political right and left.

Three countries—Venezuela, Nicaragua, and Bolivia—offer Snowden asylum. He's also received a Tweeted marriage proposal from celebrity Russian spy Anna Chapman (of Moscow, formerly of Montclair).

Notes.

Today's issue includes events affecting Australia, Brazil, China, Egypt, European Union, France, Germany, India, Indonesia, Ireland, Israel, Japan, Jordan, Republic of Korea, Nigeria, Russia, Turkey, United Arab Emirates, United Kingdom, United States..

Results of some notable cyber competitions are in. Congratulations to Jim Kozlowski, Rafael Mation, Ross Kaye, Lloyd Jones and William Deitrick, collectively the winning team at the Cyber Challenge Eastern Regional Summer Cyber Camp. Congratulations also to the winners of Kaspersky Lab's global youth cyber competition: Firman Azhari (Bandung Institute of Technology, Indonesia) took first, Dusan Repel (Plymouth University, UK) placed second, and Iwan Gulenko (Technical University of Munich, Germany) came in third. And Embry-Riddle's alumni team Bytecasters (Michael Kouremetis and Maxwell DeWeesg) wins NIKSUN's Cyber Security Tournament.

Cyber Attacks, Threats, and Vulnerabilities

Snowden and Assange Targeted by Pro-US Hacker "The Jester" (Hack Read) A self-proclaimed patriot and shadowy hacker has recently launched several cyber-attacks against Ecuador and has also made the statement that such attacks will be conducted against any nation whosoever seeks of granting asylum to Edward Snowden who is the former contractor of National Security Agency. th3J35t3r" (the Jester) is what the hacker calls himself and has also identified himself as being a former solider. He has also gone on to target Julian Assange. The founder of Wikileaks is helping Snowden out in finding a secure heaven

8 Egyptian Ministry Websites Hacked by Anonymous Jordan (Hack Read) An Anonymous hacker going with the handle of Anonymous Jordan has hacked and defaced eight (8) Egyptian Ministry websites against the taking down of Muslim Brotherhood's government few days ago. The targeted websites belong to different high profile government ministries and departments, such as the website of Ministry of Electricity & Energy

Irishman Hacks Nigeria Govt Website, Gives FG 72 Hours To Renounce Anti-Gay Bill (Africzone.com) Exasperated by the way Nigeria handles the homosexuality matter, an Irish hacker — who goes by the monicker Paddyhack – has conducted a cyber attack on the official government of Nigeria's website. The 'assault' is apparently aimed at making President Jonathan to veto the bill according to which all homosexuals in Nigeria are subject to imprisonment. The website was attacked on Thursday night; though things were later restored, it remains unknown if it were the officials that took matters in their hands, or the attackers stepped back

Aggressive Android adware masquerading as Wi-Fi password cracking app (Help Net Security) Statistics say that Android malware and aggressive adware is on the rise, so the fact that researchers occasionally find some of it on legitimate online app markets should not come as a surprise to anyone

Android bug allows app code change without breaking signatures (Help Net Security) Researchers from Bluebox Security have discovered a critical Android flaw that allows attackers to modify the code of any app without breaking its cryptographic signature, and thusly allows them to

Fake Pinterest "Password changed" email leads to malware (Help Net Security) Pinterest users beware: an email purportedly coming from the popular pinboard-style photo-sharing website and notifying you of a successful password reset is fake: If you click on the offered but

Trojanized Android app collects info, comments on NSA surveillance (Help Net Security) An unusual Android Trojan has been recently unearthed by McAfee's researchers, embedded in a pirated version of a legitimate music app. The app in question is Jay Z Magna Carta, which has been recently

"Blizzard Entertainment IP Restrictions" phishing email doing rounds (Help Net Security) Blizzard Entertainment has acknowledged that the notification email that has been hitting users' inboxes and has been purportedly sent by the company is, in fact, a phishing attempt. The email goes

System Doctor 2014: A fake AV for the upcoming year (Help Net Security) In an effort to keep one step ahead of security solutions and attentive users, peddlers of fake AV solutions often change the name of the malware they are trying to sell. Researchers from Microsoft

Serious vulnerabilities in OpenX ad platform expose millions to risk (Help Net Security) High-Tech Bridge Security Research Lab discovered multiple vulnerabilities in OpenX, which can be exploited to execute arbitrary PHP code, perform Cross-Site Scripting (XSS) attacks and compromise

Phony Adobe Flash Player Tricks Twitter, Facebook Users (InformationWeek) Malicious links spreading on Facebook and Twitter redirect users to a website that goads users into installing a phony version of Adobe Flash Player

Large Pony botnet controller discovered (Help Net Security) Every once in a while we get to peek into the lion's den, this time we'll be checking out a fairly large instance of the Pony botnet controller, containing a large amount of stolen credentials and

Spam blizzards used to hide malicious activities (CSO) Distributed Spam Distraction attacks may last up to 24 hours, and inundate an inbox with as many as 60,000 messages, AppRiver report notes

FAA registry of pilots' data at risk of data breach (FierceGovIT) Personally identifiable information kept within the Federal Aviation Administration's Civil Aviation Registry is at risk for breach, says the Transportation Department office of inspector general

2.5 million Californians had personal info compromised (Help Net Security) Attorney General Kamala D. Harris released the first report detailing the 131 data breaches reported to her office in 2012, showing that 2.5 million Californians had personal information put at risk

British defence giant blames Chinese hackers for wave of cyber attacks (This is Money) Martin Sutherland, managing director of BAE's cyber security arm, Detica, said BAE computer systems were being hit by 92,000 'significant security events' a year, though most could be fended off by firewalls. BAE Systems believes that Chinese hackers

The 'cyber-attack' threat to London's Olympic ceremony (BBC News) Fears that the 2012 London Olympics opening ceremony might have come under cyber-attack have been detailed by officials for the first time. The concern was that the lights could have been turned off during the ceremony. The threat did not materialise

Security Patches, Mitigations, and Software Updates

Internet Explorer pegged for critical fix on Tuesday (CSO) Microsoft's monthly patch release for July covers six remote-code execution vulnerabilities. Microsoft's monthly patch release for July will cover seven security issues, six of which could be remotely exploited by an attacker. The company publishes an advisory in advance of its patch date, which is the second Tuesday of the month, so administrators knows what products will be affected. It does not describe the vulnerabilities, however, until the security fixes are released

Anatomy of a buffer overflow - learning from Apple's latest security update (Naked Security) Apple has released its latest Security Update for OS X. Update 2013-003 fixes a trifecta of buffer overflow vulnerabilities in QuickTime. Paul Ducklin sees what we can learn from the bugs

Apple Updates QuickTime for OS X Security (InternetNews.com) Apple is pushing out its Security Update 2013-003 to users, fixing a trio of vulnerabilities that affect Apple's QuickTime media player. What's even more surprising is that the vulnerabilities were all reported to Apple via HP's Zero Day Initiative

Critical Cryptocat group chat bug fixed (Help Net Security) A critical security vulnerability in Cryptocat versions older than 2.0.42 has been patched and developers are urging users to update to the latest available version of the encrypted online chatting

Android Phone Numbers Leaked By Facebook App (InformationWeek) Symantec spots privacy leak and Facebook issues patch, saying it was an inadvertent coding error and phone numbers did not go public

Cyber Trends

China sees increase in Trojan and botnet attacks from other countries (CSO) Mobile malware in the country is also surging. China saw an increase in Trojan and botnet attacks coming from other countries in 2012, as the amount of mobile malware in the country also surged, according to a local security group

Cyber strikes (The News International) The fact remains, though, that in the event of a sustained cyber attack on business, security forces and agencies, the armed forces or the various arms of governance all of which rely heavily on the internet, they would be almost defenceless

An Addendum from Nathan Myhrvold on Cyber (Lawfare) In the days since Ben posted my paper, I've been asked a fair bit why my treatment of strategic terrorism does not mention cyber terrorism, or other forms of cyber-attack. It's a fair question, to which there are several answers: First, the world seems

Big Data turning US into Big Brother? (Stuff.co.nz) The revelations that the National Security Agency is perusing millions of US customer phone records at Verizon Communications and snooping on the digital communications stored by nine major internet services illustrate how aggressively personal data is

Port of Baltimore is vulnerable to cyber attack, Brookings study says (Baltimore Sun) U.S. commerce "would grind to a halt in a matter of days" in the aftermath of a crippling cyberattack that the nation's ports — including Baltimore — are ill-prepared for, according to a new Brookings Institution report. But port officials here and

GCC prone to cyber attack, say IT experts (Arab News) Over 65 percent of technology experts in the Gulf Cooperation Council states believe that the region is a fertile land for cyber attack. A recent survey, conducted by a computer giant, has revealed that 35 percent of the cyber crimes occur because of

Loss of intellectual property is causing headaches for UK government (SC Magazine UK) James Quinault CBE, director of the Office of Cyber Security and Information Assurance at the Cabinet Office, thanked the National Security conference in London for "giving time to cyber" after the UK government ranked it as a tier one threat. However

"Critical entities not prepared for cyber war" (Globes) Scores of water companies, hundreds of food and basic goods factories, pharmaceuticals manufacturers and distributors, and important financial institutions must take major steps to protect their computer systems against cyber attacks, Institute for National Security Studies (INSS) cyber warfare program director Dr. Gabi Siboni told "Globes"

Facing up to the cyber-espionage battle ahead (Public Service Europe) Cyber-attacks are now viewed as the number one threat to our security and we are only just beginning to realise how vulnerable we are in this digitalised world. This week, Britain's intelligence agencies - MI5 and Government Communication Headquarters - warned that the country is under daily cyber-espionage attack, with approximately 70 sophisticated operations identified every month. Often backed by foreign intelligence services, these attacks are reported by Sir Iain Lobban - director of GCHQ - as happening on an 'industrial scale' and focused on the theft of intellectual property from organisations; for the financial benefit and competitive advantage of state-owned organisations

Preparing for cyberwarfare (Japan Times) The realm of conflict between states that could lead to war has expanded in recent years. The United States and other major military powers are gearing up to defend themselves from attack in cyberspace, just as they have done in the past from land, sea, air and outer space attack. The U.S. has identified, but not yet named, more than 20 nations that now have military units dedicated to employing cyber technology in war. The roll call certainly includes China and Russia, as well as the U.S. itself

Report: Cyber Attack At LA, Long Beach Ports Could Cost $1B Per Day (CBS Local) Officials at ports in Los Angeles and Long Beach will look to better prepare for the threat of cyber attacks after a new report found the nation's largest port system could be vulnerable, officials said Wednesday

Cyber espionage moves out of the shadows (Help Net Security) During the first half of 2013, AppRiver screened more than 15 billion messages, nearly 13 billion of which were spam and another 171 million that carried viruses. Once again, the United States was the

Economic espionage threat to security (Pacific Daily News) Further, the report concluded from Mandiant the breaches can be linked to the People's Liberation Army's Unit 61398. The accusations and supporting evidence increased pressure on the United States to take more action against the Chinese for what

Bitcoin trust inspires a funny look at ETFs (FierceFinance) For the Winklevoss twins, the rise of Mark Zuckerberg has been a blessing and curse. On the one hand, the twins blame him for stealing the idea that went on to become Facebook. On the other hand, they have rocketed to fame and fortune thanks to the success of their nemesis. The Social Network made them icons

Marketplace

Is Privacy the Next Big IT Industry? (Slashdot) Following revelations about NSA surveillance, will people rush to download security and privacy software

NSA recruitment drive goes horribly wrong (The Guardian) Staff from the National Security Agency got more than they bargained for when they attempted to recruit students to their organisation earlier this week

Hacking competitions seek cybersecurity superstars (BBC News) Private contractors and government agencies like the Federal Bureau of Investigation and Department of Homeland Security use the cyber camp to scout for that talent. A student with the right skills can pretty much pick and choose a career. "Personally

Top defence and telecom firms join UK cyber security war (Telegraph.co.uk) BAE Systems, Rolls-Royce, BT Group, Lockheed Martin and Hewlett Packard are among companies that will team up with government to share information on tackling cyber threats, the Ministry of Defence said on Friday. Britain made cyber security one of its

BT, Verizon call for shared cyber threat intelligence (Total Telecom) BT and Verizon on Wednesday called on telcos and enterprises to be more forthcoming with information about the cyber attacks they have suffered, as security threats become more frequent and high profile. Speaking at Total Telecom's Network Management

Booming cyber security firms are filling up suburban Baltimore offices (Baltimore Business Journal) "Fort Meade is currently the largest employer in Maryland with more than 56,000 employees, and is home to the U.S. Cyber Command, the Defense Information Systems Agency and the National Security Agency," Cassidy Turley said in the report. "These

German security chief: Stop using Google if you fear U.S. spying (VentureBeat) If you're one of the many Internet users worried about how American tech companies are helping the U.S government collect information, Germany's security chief has some advice for you: Stay away from those American tech companies

ManTech to Run DOJ IT Services Desk (GovConWire) ManTech International (NASDAQ: MANT) has won a potential $16 million contract to operate an information technology services desk and provide IT services for the Justice Department

Digital Management snags $16M Pentagon MDM contract (FierceMobileIT) Digital Management will provide a mobile device management system and mobile application store for the Pentagon, under a contract awarded by the Defense Information Systems Agency that is worth up to $16 million over three years

ISS backs Dell founder's offer (USA TODAY) A top proxy advisory firm is recommending that Dell shareholders vote in favor of a deal that would allow the company's founder and an investment firm to buy the computer maker and take it private

Dell battle turns on proxy advisor recommendation (FierceFinance) There has been a lot of talk as of late about how the main proxy advisory services have lost their clout, a victim of conflicts of interests in at least one case. But when it comes to the Dell leveraged buyout drama, Institutional Shareholders Services (ISS), the most controversial of the proxy advisors, has moved center stage

Mark Gerencser to Chair CyberSpa Board after Retiring From Booz Allen (GovConWire) Mark Gerencser, an executive vice president at Booz Allen Hamilton (NYSE: BAH), has retired from Booz Allen after a 31-year career with the Tysons Corner, Va.-based contractor and joined PC services company CyberSpa as chairman of the board of directors

Products, Services, and Solutions

See your metadata the way the NSA does (Boston Globe) Wondering what kind of information the National Security Agency can glean from your metadata? Try it on yourself: A new project from MIT's Media Lab maps out your social networks by tapping into your e-mail metadata — similar to what the NSA does

Ultra Electronics to launch EnergyGuard in Mideast (Trade Arabia) London-based Ultra Electronics is set to launch its new generation Scada protection solution, EnergyGuard at a cyber security forum to take place in Abu Dhabi in October. "EnergyGuard is designed to protect…Developed by Ultra's 3eTI business, the

Iran Domestic Email Service Online (Cyberwarzone) Iran Information and Communication Technology Minister Mohammad Hasan Nami said in an interview with state TV that Iran has opened its own domestically made national email service

Bitdefender's Wildly Different Antivirus Tools Both Shine (PC Magazine) Security products tend toward a certain sameness in their user interface. The background may be slate grey, white, blue, black, green, yellow, or polka-dot, sure. But whatever the color, the main window will probably display a green, yellow, or red

Security-Enhanced Android: NSA Edition (Businessweek) Tech giants listed as part of the National Security Agency's Prism spying program have gone to some lengths to convince the world they aren't in bed with the U.S. government. Google (GOOG) has filed a request with the U.S. Foreign Intelligence

NETGEAR introduces R6100 WiFi router (Help Net Security) NETGEAR is expanding its family of 802.11ac wireless products with the R6100 WiFi Router. The R6100 is a dual band router that supports combined WiFi speeds up to 1200 Mbps with Fast Ethernet wired

Technologies, Techniques, and Standards

Doing More Than Paying Risk Management Lip Service (Dark Reading) How well does your organization execute on its 'commitment' to guiding security practices through risk management

Is Metadata the Magic in Modern Network Security? (Internet Storm Center) Today's security tools used to analyze or detect suspicious activity, collect metadata which is usually refers to data about data to describe the how, when, where and who was involved. Metadata is a way of organizing, gluing together and discovering information that otherwise would be very difficult to manage, analyze and produce insightful reports

Virtualisation Security Needs More Than A Fortress Mentality (Lifehacker) Virtualisation produces impressive results, but it also requires a fundamental shift in mindset. The 'fortress' approach that works with older IT environments needs to shift once you're dealing with virtualised systems

Branch office security in the spotlight (Naked Security) The ideal solution for branch offices is some kind of VPN, or virtual private network. But setting up a VPN in the first place creates something of a paradox: how do you securely set up a branch office connection without a secure connection over which to set it up

Geeks have a solution to digital surveillance in India: Cryptography (DNA) While you were thinking of what to post on Twitter, the government has stealthily put an ambitious surveillance programme in place that tracks your every move in the digital world — through voice calls, SMS, MMS, GPRS, fax communications on landlines, video calls and emails. The programme, conceived in 2011, has now been brought under one umbrella referred to as the centralised monitoring system (CMS)

How to cloud compute securely (WhaTech) Much of the advice available on cloud security comes from the Cloud Security Alliance (CSA), a not-for-profit organisation with a mission to promote the use of best practices for providing security assurance within cloud computing. It also aims to

Combat cyber crime with least privilege methodology (Boston.com) This was the case with South Carolina's Department of Revenue, where an employee unknowingly clicked an email link and opened the government agency to a large-scale cyber-attack, costing the state $14 million and compromised the personal and

Can agencies team up in responding to cyber attacks? (GCN) The National Institute of Standards and Technology is planning guidance on how agencies can better cooperate and respond to cybersecurity incidents. "Unfortunately, modern computing systems frequently are exposed to various forms of cyber attack," NIST

Flash FPGAs Incorporate Differential Power Analysis Countermeasures (Electronic Design) DPA support was licensed from Cryptography Research, a division of Rambus. DPA support applies to the chip as a whole, not just a memory or cryptography/security subsystem. This means a powered chip will always be radiating power in a random fashion

Design and Innovation

Software Is Still King. Hardware Is Just Along for the Ride (Wired) "This is kind of the next step in software eating the world. Software has come to revolutionize the hardware industry, and it so happens that hardware is coming along for the ride"

The UK Needs An Acquisition Culture If It's To Have a Sustainable Startup Culture (TechCrunch) In 2006, the majority of London's tech startup scene could fit into a "Internet Peeps" dinner and the closest thing we had to Campus London was Adam Street library. Nine years later though things have changed completely. Little seedlings like Huddle and

Research and Development

Quantum Enigma Machine Proposed by Seth Lloyd for Secure Cryptography (Next Big Future) Tweet Enigma machines are devices that perform cryptography using pseudo-random numbers. The original enigma machine code was broken by detecting hidden patterns in these pseudo-random numbers. This paper proposes a model for a quantum

Quantum information: Killer apps (New Scientist) In October 2007, a quantum cryptography system developed by Nicolas Gisin and his colleagues at the University of Geneva in Switzerland was used to transmit votes securely between the city's central polling station and the counting office during the

Academia

Have you ever wondered how cyber crimes are plotted? (Hack Read) Derby University of mathematics and computing is helping the world to fight from cyber crime in most unusual way. Have you ever wondered how cyber crimes are plotted? Well, you might think of it in a simple way of how a robbery is conducted i.e. on some paper or by discussion with some more robbers. But, it's not true most of the cyber crimes are plotted through games

Embry-Riddle Team Wins NIKSUN Cybersecurity Competition (Newsday) The tournament tasked two-person teams with using the IT skills they learned in college to solve four real-world cybersecurity challenges as quickly as possible by analyzing recorded Internet traffic. A team of two recent graduates from Embry-Riddle Aeronautical University's Daytona Beach Campus, called Team ByteCasters, recently won the first-ever NIKSUN Cybersecurity Tournament

Winners of Kaspersky's global cybersecurity competition announced (Infosecurity Magazine) The finals of Kaspersky Lab's global youth competition, Cyber Security for the Next Generation (CSNG) 2013, were held at Royal Holloway, University of London last week – and the winners have been announced. Overall winner was Firman Azhari from the Bandung Institute of Technology, Indonesia. Second was Dusan Repel from the of Plymouth University, UK. And third was Iwan Gulenko from the Technical University of Munich, Germany

U.S. Cyber Challenge and Virginia Tech Hosted Successful Cyber Security Competition (PRNewswire) Virginia Tech, in partnership with U.S. Cyber Challenge, hosted the U.S. Cyber Challenge Eastern Regional Summer Cyber Camp in Roanoke, Virginia. The Summer Cyber Camp was conducted June 24-28, 2013, and included four days of instruction by SANS instructors, a career fair, an Executive Roundtable and a cyber competition. The team consisting of Jim Kozlowski, Rafael Mation, Ross Kaye, Lloyd Jones and William Deitrick emerged as the winner of the competition

Legislation, Policy, and Regulation

Information era causing problems for US intelligence agencies (NorthJersey.com) Nowadays, an intelligence analyst works directly for Booz Allen Hamilton, not for the government. Snowdon's case is an example of the laxity of the vetting process. Now the intelligence community is faced with the overwhelming job of damage control

Pentagon 'Psy-Ops' Missions Hit Home (Washington Post) Given the global nature of online communications, the Pentagon's information operations are perhaps inevitably becoming entangled on the home front. At a time of intense focus on the targeting of Americans' communications by the National Security Agency, Warsame's case also illustrates how other parts of the U.S. government monitor the material that some Americans post online

Without Borders: U.S. could have boosted security while being up front with public (Philly.com) In light of Edward Snowden's recent National Security Agency tell-all, pundits and politicians have been debating one question: Which should carry more weight: Individual privacy or collective security? Unfortunately, that hypothetical question can't

National view: We can handle the truth on NSA spying (Budgeteer) I don't believe government officials when they say the National Security Agency's surveillance programs do not invade our privacy. The record suggests that you shouldn't believe them, either. It pains me to sound like some Rand Paul acolyte

Tools For Treason (TechCrunch) If we are to start again on the Internet with knowledge of prying eyes that turn the law to their own purposes, our founding principle cannot be the establishment of trust, but rather the impossibility of trust. The trick is to treat every communication as a potential act of terrorism. After all, isn't that how the NSA does it? Tools for treason are the only tools that will suffice from now on

NSA leaks unite left and right on privacy protection (Salt Lake Tribune) Disclosures about the National Security Agency's operations of late have helped forge new bonds on Capitol Hill, proving that while Congress is deeply divided along partisan lines, there are those issues that can bridge the gap. Take Rep. Jason Chaffetz

Gibson criticizes National Security Agency, gives warning about Syria (The Register Star) Rep. Chris Gibson, R-19, said last month he was disturbed by reports that the National Security Agency (NSA) was collecting the phone records of all Americans, while also gathering information on emails and Internet activity. He signed a letter, along

Here's who spent their Fourth of July protesting the NSA (Washington Post) Hundreds of protesters gathered in Washington's McPherson Square Thursday, the Fourth of July, for a rally against the National Security Agency's secretive domestic surveillance programs. The event was part of a nationwide "Restore the Fourth" campaign

I Spy an Excuse (Wall Street Journal) If recent press claims are true, the National Security Agency (NSA) has found the number—and is listening very carefully. Reactions from Europe's national governments to alleged U.S. spying have so far been stern, yet cautious: French President

American espionage and Europe (The Economist) Material leaked to Germany's Der Spiegel and Britain's Guardian by Edward Snowden, a former contractor at the National Security Agency, says its programmes "can and often do target the signals" of around 30 "third-party" states, with which America has

European Parliament condemned US intelligence activities (ArmenPress) The European Parliament called on Thursday for the scrapping of two agreements granting the United States access to European financial and travel data unless Washington reveals the extent of its electronic spying operations in Europe

EU Parliament to launch inquiry into US surveillance programs (Help Net Security) European Parliament's Civil Liberties Committee will conduct an "in-depth inquiry" into the US surveillance programs, including the bugging of EU premises and other spying allegations, and present its

Merkel says EU must not forget U.S. spying in push for free trade (The Star) Germany's Angela Merkel said on Saturday that Europe should push ahead with free-trade negotiations with the United States next week while making sure that concerns about America's secret surveillance of its EU allies are not swept under the carpet

Spying allegations could delay U.S.-E.U. trade talks (Washington Post) The economic fallout over accusations of U.S. spying on European diplomats widened on Wednesday, with France's government saying it wanted to delay the start of major U.S.-E.U. trade talks and a German minister suggesting that citizens there stop patronizing American Internet companies such as Google and Facebook if they are concerned about their privacy

'German government sells the privacy of German citizens to the US' (Russia Today) The recent NSA spying scandal showed the German government behaves towards US like a puppet regime, involving all major political parties just before the September elections, German journalist Manuel Ochsenreiter told RT

Snowden's revelations highlight the moral decline of America (Financial Times) It is widely believed that the revelations by Edward Snowden, the former National Security Agency contractor, have dented US moral hegemony. America will no longer be able to criticise states that subordinate civil liberties to reasons of state

Surprise: France Spies on Its Citizens, Too (Slate) The NSA's once-secret surveillance program unsurprisingly has company in Europe. French newspaper Le Monde reported yesterday that France has a secret electronic surveillance apparatus that relies on many of the same tactics as the American programs

Révélations sur le Big Brother français (Le Monde) Si les révélations sur le programme d'espionnage américain Prism ont provoqué un concert d'indignation en Europe, la France, elle, n'a que faiblement protesté. Pour deux excellentes raisons : Paris était déjà au courant. Et fait la même chose

Snowden reveals Australia's links to US spy web (Sydney Morning Herald) Classified US National Security Agency maps leaked by Mr Snowden and published by US journalist Glenn Greenwald in the Brazilian O Globo newspaper reveal the locations of dozens of US and allied signals intelligence collection sites that contribute to

Brazil Target Of US Spying, Globo Newspaper Reports (Huffington Post) The U.S. National Security Agency monitored the telephone and email activity of Brazilian companies and individuals in the past decade as part of U.S. espionage activities, the Globo newspaper reported on Sunday

Snowden says Western states 'in bed with' US national security agency (Straits Times) Fugitive intelligence leaker Edward Snowden said the US National Security Agency operates broad secret spying partnerships with other Western governments now complaining about its programmes, in an interview published on Sunday

Snowden, surveillance and snooping in India: FAQs (Business Standard) An internal code-name for a top-secret surveillance programme run by the US National Security Agency, with real-time access to user data (from Google, Facebook and seven others) instead of requiring ad-hoc wiretap requests or court orders for

Russian Army to create Cyber Command (Pravda) Before the end of 2013, a separate branch of service is to be created in the Russian army. The new department will deal with the struggle against cyber threats, sources at Russia's Defense Ministry said. The plans to create the Cyber Command were

China, US To Discuss Cyber Security At Forum (Yahoo.com) China's government says it is ready to discuss strengthening cybersecurity at a high-level forum with U.S. officials next week and wants Washington to help settle territorial disputes in East Asia

DoD looks to quarantine employees from leaked documents (FierceGovIT) Classified information, even if it's already in the public domain, remains classified until it's been declassified by a government authority, said the Defense Department's Director of Security Timothy Davis, in a June 7 memo to DoD security directors

EU adopts stricter penalties for cyber criminals (Help Net Security) Cyber criminals will face tougher penalties in the EU, under new rules adopted by Parliament on Thursday. The draft directive, already informally agreed with member states, also aims to facilitate

Gov't to reinforce cyber security manpower (Global Post) The government said Thursday that it plans to train 5,000 experts by 2017 and boost cooperation among related government agencies to better cope with rising cyber security concerns

The Future of US Cyber Command (The National Interest Online) For months it has been an entertaining parlor game in the nation's capital: guessing what will happen next with U.S. Cyber Command, the military organization designed to defend the country's networks and attack its adversaries. The topic will

Litigation, Investigation, and Law Enforcement

Turkish Police Labels RedHack Hackavists as "Cyber Terrorist Organization" (Hack Read) In a report submitted by the Turkish police in Istanbul Prosecutor's Office, the famous online hackavist group RedHack has been labed as "cyber terrorist organization" for encouraging public to commit crimes against the state via twitter during Gezi Resistance

Dempsey: Spy Has Harmed Relations (Philadelphia Inquirer) The Joint Chiefs of Staff chairman says NSA leaker Edward Snowden's disclosures about U.S. surveillance programs have undermined U.S. relationships with other countries and affected what he calls "the importance of trust."

Snowden made the right call when he fled the U.S. (Washington Post) Many people compare Edward Snowden to me unfavorably for leaving the country and seeking asylum, rather than facing trial as I did. I don't agree. The country I stayed in was a different America, a long time ago

Privacy Group to Ask Supreme Court to Stop N.S.A.'s Phone Spying Program (New York Times) A privacy rights group plans to file an emergency petition with the Supreme Court on Monday asking it to stop the National Security Agency's domestic surveillance program that collects the telephone records of millions of Americans. The group, the Electronic Privacy Information Center, says it is taking the extraordinary legal step of going directly to the Supreme Court because the sweeping collection of the phone records of American citizens has created "exceptional circumstances" that only the nation's highest court can address

Venezuela, Bolivia offer asylum to Edward Snowden (CSO) Nicaragua has also indicated that it may offer asylum. The presidents of Venezuela and Bolivia have offered to give asylum to Edward Snowden, the former contractor of the National Security Agency who leaked documents about the agency's surveillance programs

Why Won't Anyone Take Edward Snowden? (Slate) Because he is a terrible candidate for asylum. Poor Edward Snowden! He's willing to live nearly anywhere, but no country is willing to accept him. Not Ecuador. Not China, Russia, Norway, or Spain. Why not? Because he is a terrible candidate for asylum

NSA leaks raise concerns on background checks (Ocala) Before Edward Snowden began leaking national security secrets, he twice cleared the hurdle of the federal government's background check system. The first was at the CIA, and the second was as a contract technician at the National Security Agency

Resume Shows Snowden Honed Hacking Skills (New York Times) In 2010, while working for a National Security Agency contractor, Edward J. Snowden learned to be a hacker

Deals with foreign cable owners, secret court rulings broaden NSA spying potential (Ars Technica) Leaked documents and other sources show some of the structure behind surveillance. New information this weekend gave a glimpse into the efforts made by the US to establish a broad network of surveillance around the world. Some of the efforts involve using a proxy telecommunications company to manage the information gathered by local telecom companies in foreign countries, creating internal corporate cells with access to foreign-owned fiber optic cables, and using unchallenged rulings from Foreign Intelligence Surveillance Courts (FISC) to broaden the NSA's power

In Secret, Court Vastly Broadens Powers of NSA (New York Times) Last month, a former National Security Agency contractor, Edward J. Snowden, leaked a classified order from the FISA court, which authorized the collection of all phone-tracing data from Verizon business customers. But the court's still-secret

Oliver Stone calls National Security Agency secret-leaker Edward Snowden 'a hero' (Daily News) 'It's a disgrace that (President) Obama is more concerned with hunting down Snowden than reforming these George Bush-style eavesdropping techniques,' the outspoken director said Thursday at a Czech film festival. Snowden is reportedly holed up in a Moscow airport waiting for a country to grant him asylum

Ex-Russian spy Anna Chapman tweets marriage proposal to Edward Snowden (New York Daily News) Knockout Russian secret agent Anna Chapman has the hots for Edward Snowden, the man behind the leaks of top-secret National Security Agency documents. "Snowden, will you marry me?" Chapman tweeted Wednesday from Russia, with love. "@nsa will

Wiretaps up 24 percent in 2012 (FierceGovIT) The number of federal- and state-court authorized wiretaps during calendar year 2012 increased by 24 percent from 2011, newly released court data shows. In an annual report from the Administrative Office of the U.S. Courts, federal, state and territorial jurisdictions report having authorized 3,395 wiretaps last year--87 percent of the time, in cases where illegal drugs was the most serious offense under investigation

Manning defense to present case (Independent Online) Court-martial prosecutors have spent the last five weeks in a courtroom at Fort Meade, Maryland - home of the ultra-secret National Security Agency - building their case that Manning committed espionage in leaking more than 700 000 classified files

For a complete running list of events, please visit the Event Tracker on the CyberWire website.

Upcoming Events

Digital Forensics and Incident Response Summit (Austin, Texas, USA, July 9 - 10, 2013) The 6th annual Forensics and Incident Response Summit will again be held in the live musical capital of the world, Austin, Texas. The Summit will focus on high quality and extremely relevant content as...

London Summer 2013 (London, England, UK, July 9 - 16, 2013) SANS London Summer takes place at the London Marriott Hotel Kensington and gives security professionals the opportunity to take one of four of SANS most popular 6-day courses and the 2-day "Securing The...

GovConnects Business Breakfast: "Secured Space." What It Is - Who Has It - Who Needs It (UMUC, Dorsey Station, Elkridge, July 10, 2013) With today's Cyber threats, all businesses, institutions and the general public are at risk as never before. Learn about the lastest technologies, measures and solutions being used today and into tomorrow...

3rd Cybersecurity Framework for Critical Infrastructure Workshop (San Diego, California, USA, July 10 - 12, 2013) NIST is inviting cybersecurity experts, industry and academia from across the nation to attend one of its regional workshops at UC San Diego to identify, refine and guide the many interrelated considerations,...

cybergamut Technical Tuesday: Remote Digital Forensics (Columbia, Maryland, USA, July 16, 2013) 'The remote control changed our lives. The remote control took over the timing of the world. Within three seconds, click, click, click. So can we do remote forensics?' Ken Zatyko of Assured Information...

Remote Digital Forensics (Columbia, Maryland, Sioux Falls, July 16, 2013) Incident response, packaging, and mailing is a lengthy process averaging many days to get media into a forensics examiner workstation in Maryland. The current process primarily uses stand alone workstations.

Mobility Solutions for the Federal Market (Falls Church, Virginia, USA, July 16, 2013) With the improvements in mobile technology, smart phones and tablets, DOD, DHS and Civilian agencies have an opportunity to improve their service delivery models and the programs that serve their constituents.

Cancellation: Cybergamut Tech Tuesday, July 16 (Columbia, Maryland, USA, July 16, 2013) Next week's Tech Tuesday has been cancelled due to unforeseen circumstances.

2013 World Comp (Las Vegas, Nevada, USA, July 22 - 23, 2013) 2200 leading researchers, academics, and executives from government, academia and industry will come together at this annual event which facilitates communication among researchers in different fields...

EAGB Summer Quarterly Webinar (Webinar, July 24, 2013) Join us Wednesday, July 24 from 10:00-11:00 AM as Patrick Dougherty discusses the EAGB's two newest reports: the Summer 2013 Quarterly Regional Economic Update and Cyber Security in Greater Baltimore:...

Black Hat 2013 (Las Vegas, Nevada, USA, July 27 - August 1, 2013) Black Hat USA is a major international security conference, featuring learning, networking, and skill-building. Sessions include training, briefings, technical presentations, and more.

SECRYPT 2013 (Reykjavik, Iceland, July 29 - 31, 2013) The 10th International Conference on Security and Cryptography (SECRYPT 2013) will take place from 29 to 31 July 2013 in Reykjavik, Iceland…The conference will focus on information systems and network...

Growing Maryland's cybersecurity industry: Technical.ly Baltimore Meetup (Baltimore, Maryland, USA, July 30, 2013) Join Technically Baltimore in at CyberPoint International on July 30 for a presentation about Maryland's rapidly expanding cybersecurity industry -- and how the Baltimore region's broad, general technology...

AFCEA Global Intelligence Forum (Washington, DC, USA, July 30 - 31, 2013) During this day and one half unclassified conference in the National Press Club in downtown Washington, D.C., leaders from across the government, military, and industry will explore the role that the Intelligence...

Grow your brand and reach new customers.

Grow your brand and increase your customer base by educating our audience about your products, services, and events by advertising on The CyberWire. We’ve built trust with an influential (and often hard to reach) audience of CISOs, CSOs, and other senior execs in the security space, across a wide array of industry verticals. Learn more.

Be a part of the CyberWire story.

People ask us (a lot) how they can support what we do. We have our sponsorships and services, of course, but those are not always within every supporter's financial reach, or it might just not be the right time for you to do those things. That's why we launched our new Patreon site, where we've created a wider variety of support levels, each with some new benefits. Our patrons are important to our future, and we hope you'll consider becoming one. We invite you to become part of the CyberWire story. Become a patron today.