Search This Blog

Friday, March 18, 2011

Security Management Weekly - March 18, 2011

header

  Learn more! ->   sm professional  

March 18, 2011
 
 
Corporate Security
Sponsored By:
  1. "Renault's Swiss Connection" Industrial Espionage Case at French Automaker
  2. "Chinese Writers Accuse Baidu of Stealing" Copyright Infringement by Chinese Search Engine
  3. "Feds Raid Alleged Pirated Software Dealer's Everett Apartment" Washington State
  4. "Anonymous' Perplexing Leak of Bank of America Documents"
  5. "White House Wants New Copyright Law Crackdown "

Homeland Security
  1. "Europe Seeks Transparency From U.S. on Anti-Terrorism Program"
  2. "Upheaval in Mideast Sets Back Terror War"
  3. "Report: Boost Airport Screening With 'Trusted Traveler' Lanes, Free Checked Bag"
  4. "National Guard Troops to Leave Border in June "
  5. "Mounties Obtain Warrants for Missing Winnipeg Boys in Anti-Terrorism Probe"

Cyber Security
  1. "Spam Network Shut Down"
  2. "Twitter Adds Option to Always Use HTTPS"
  3. "Get SMART in Cyberspace: Protect Your Data" New Data Security System
  4. "'We Need to See Ahead'" Science and Technology Research and National Security
  5. "Open-Source Vulnerabilities Paint a Target on Android"

   

 
 
 

 


Renault's Swiss Connection
Wall Street Journal (03/17/11) Moffett, Sebastian

A lawyer for Dominique Gevrey, the Renault security agent who is being investigated for his role in the recent industrial-espionage case at the French automaker, said Wednesday that his client had put money from the company into a Swiss bank account in order to pay an informant. The attorney said that the money was not for Gevrey's personal use and was not the result of fraud. Prosecutors in France have said that the allegations of corporate espionage against the three Renault executives, who have been exonerated, may have been part of an attempt to defraud the company. Now that the three executives have been cleared of any wrongdoing, investigators are focusing on the money Renault spent during its internal investigation into the matter. Prosecutors said that Renault had paid out €300,000 to cover the expenses associated with the investigation, and had another €400,000 in bills that still need to be paid.


Chinese Writers Accuse Baidu of Stealing
AFP (03/16/2011)

The search engine giant Baidu has been accused of infringing upon the copyrights of dozens of popular Chinese writers. A letter was posted on the web site of China Written Works Copyright Society, branding the company as a "thief." The writers claim the site allows users to download works from its online library for free, stealing their works, rights and property. While readers can purchase books from Baidu's online library, it also allows them to read, share and download the works for free. As of November the search engine had more than 10 million files, which accounted for more than 70 percent of China's file sharing market. The search engine "attaches great importance to intellectual property rights protection" and has deleted "tens of thousands of infringing items" that were uploaded by web users, said Baidu spokesman Kaiser Kuo. Kuo said that if authors report a case of infringement, the search engine will remove the file within 48 hours. The site has a disclaimer stating that users who upload material have the responsibility for copyright disputes or compensation. The writers do not agree, claiming the company takes advantage of uploads to "enhance its own influence, boost its stock price and increase its profits." In February, the U.S. Trade Representative's Office said Baidu was the world's largest online marketplaces for pirated goods and uses "deep linking" searches to enable illegal sharing.


Feds Raid Alleged Pirated Software Dealer's Everett Apartment
Seattle Post-Intelligencer (WA) (03/16/11) Pulkkinen, Levi

Acting on a tip from Microsoft, Federal investigators with a Homeland Security Department task force raided the home of an Everett, Wash., man thought to be selling counterfeit Microsoft software on March 8. The man allegedly sold counterfeit copies of different Microsoft programs on Craigslist after importing the pirated copies from China, according to investigators. Microsoft corporate security alerted authorities in October that the man was selling the fake software, claiming they purchased several items from the man before determining they were illegal copies. An Immigration and Customs Enforcement (ICE) special agent stated that customs officers seized a package for the man on October 18. This prompted Microsoft to send the man a letter, warning him to cease distribution of the software. The ICE agent claims to have purchased two of the copies from the man, which proved to be fake. The raid produced 75 copies of Microsoft software and different electronics. The man is currently not in jail and has not been officially charged.


Anonymous' Perplexing Leak of Bank of America Documents
Wall Street Journal (03/15/11) Koons, Cynthia; Fitzpatrick, Dan

Although Bank of America Corp. has been preparing for a release of internal documents by Wikileaks, it was another whistleblower group called "Anonymous" that targeted the company and posted its own set of documents. Anonymous has posted a series of e-mails between employees of Balboa Insurance, a division that Bank of America recently sold to QBE Insurance. Members of Anonymous have claimed that these e-mails represent "fraud" because the bank hid foreclosure errors from "federal auditors," but from the e-mails it is unclear what the alleged wrongdoing is. A former employee claims that these e-mails, dated from November 2010, are related to an error about whether certain homes that required flood insurance were located in a flood zone. Several former employees said that the bank removed files so that auditors would not be alerted to the mistake. While the bank did not deny the existence of the e-mails, it did deny any wrongdoing.


White House Wants New Copyright Law Crackdown
CNet (03/15/11) McCullagh, Declan

The Obama administration on Tuesday released a 20-page white paper that outlined several proposed changes to the nation's copyright laws. Among the proposals in the paper, which was prepared by Intellectual Property Enforcement Coordinator Victoria Espinel, is for illegal streaming of content online to be made a felony in some circumstances. In addition, the paper calls for copyright and trademark infringement to be added to the list of crimes that law enforcement can investigate with wiretaps. The paper also calls for the Department of Homeland Security to inform copyright holders if it seizes hardware or software that can be used to bypass copy protection technology, and to provide samples of these devices and assist copyright holders in bringing civil lawsuits. The U.S. Chamber of Commerce has said that it supports the proposals.




Europe Seeks Transparency From U.S. on Anti-Terrorism Program
New York Times (03/18/11) Kanter, James

The European Commission on Thursday released a review of a U.S. counterterrorism program that aims to track the finances of terrorism suspects. Under the program, U.S. agencies can obtain access to European banking data held by the Society for Worldwide Interbank Financial Telecommunication (Swift), a cooperative that routes trillions of dollars in transactions between a variety of financial institutions, brokerage houses, and stock exchanges. In its review, the Commission called on the U.S. to make the benefits of the program more transparent so that it would be supported by the public. In addition, the Commission said in its review that the U.S. should make other relevant aspects of the program known, such as how much data it will access through Swift. The Commission went on to call for the U.S. to provide more information about its justifications for requesting information from Swift and for those requests to be made in writing when possible so that European officials can evaluate them. Finally, the Commission recommended that the U.S. post more information on the Treasury Department's Web site about what types of information in Swift's database can be corrected, erased, or blocked. The U.S. has said that it will consider the Commission's recommendations.


Upheaval in Mideast Sets Back Terror War
Wall Street Journal (03/17/11) Barnes, Julian E.; Entous, Adam

U.S. officials are expressing concern that the unrest that has swept the Middle East and North Africa over the last several months is hurting the nation's counterterrorism efforts. According to officials in both the U.S. and Europe, former Guantanamo detainees that have been sent back to Yemen have been subjected to little or no government surveillance since the unrest began in that country. Congressional aides say that is because Yemen's embattled president is so distracted by the protests that are taking place in his country that he has stopped using all of his counterterrorism forces against al-Qaida. In Libya, which a senior U.S. official said has been a vital partner in counterterrorism efforts, officials have lost track of two Guantanamo detainees who were sent to the country in 2006. Meanwhile, U.S. officials are worried that cooperation from security services in Egypt--which some say has been the country's most important counterterrorism partner over the past 10 years--will decline as the country's new leaders attempt to distance themselves from abuses committed by security forces in the past. Although the unrest in Egypt, Libya, and Yemen have had an impact on the intelligence partnerships those countries have with the U.S., the U.S. continues to receive regular intelligence updates from Saudi Arabia about al-Qaida militants operating in Yemen.


Report: Boost Airport Screening With 'Trusted Traveler' Lanes, Free Checked Bag
Seattle Post-Intelligencer (WA) (03/16/11) Cohen, Aubrey

A report commissioned by the U.S. Travel Association recommends that the federal government enhance trusted traveler programs and require airlines to allow passengers to check one bag for free. According to recent research, travelers avoid between two and three trips per year because of security hassles. In order to reduce these figures, the report says a trusted traveler program should use biometrics to confirm identity, and allow them to avoid removing personal items, coats, and shoes. As for free baggage check, report authors say it will reduce the number of carry-on bags, which lead to longer wait times in passenger screening lines due to baggage congestion and increased alarms caused by passengers intentionally or unintentionally packing prohibited items in their carry-on bags. Other panel recommendations included transferring responsibility from airports to the Transportation Security Administration (TSA) for entire checkpoint areas, including security lines; using places travelers are likely to see when booking or preparing for a trip to improve awareness of security rules and regulations; and converting the TSA administrator post to a five-year position that would extend across presidential administrations. The panel added that the position should be filled by a non-partisan official with knowledge in both security and facilitation.


National Guard Troops to Leave Border in June
Arizona Republic (03/16/11) Kelly, Erin; Wagner, Dennis

In his testimony before the House Homeland Security Committee on Tuesday, Maj. Gen. Hugo Salazar, the adjutant general of the Arizona National Guard, said that the National Guard troops that were deployed along the U.S.-Mexico border last year will be withdrawn in mid-June as scheduled. The 1,200 Guard troops were deployed by President Obama as part of an effort to improve security along the border. According to Salazar, the mission has been a success because the troops have helped the Department of Homeland Security monitor the border and gather intelligence on international crime cartels that smuggle weapons and other contraband into the U.S. Homeland Security Department spokesman Matt Chandler agreed that the mission has been successful, saying that the presence of the National Guard troops has allowed more enforcement manpower and technology to be deployed to the border. But not everyone is ready to see the troops leave. Among them is Arizona Gov. Jan Brewer and Pinal County, Ariz., Sheriff Paul Babeu, both of whom said that the withdrawal of the troops is a sign that the Obama administration is not willing to take the necessary steps to secure the border.


Mounties Obtain Warrants for Missing Winnipeg Boys in Anti-Terrorism Probe
Globe and Mail (CAN) (03/15/11) Freeze, Colin; McArthur, Greg

The Royal Canadian Mounted Police on Monday obtained warrants for two men from Winnipeg who are wanted on terrorism charges. Among the terrorist suspects that the RCMP is looking for is Ferid Imam, a University of Manitoba student who is believed to have trained Najibullah Zazi and the other alleged al-Qaida terrorists who are thought to have been behind the 2009 plot to attack the New York City subway system. Counterterrorism authorities have been looking for Imam, who is thought to be hiding in the mountains of northwestern Pakistan, for several years now, though RCMP has made the manhunt official by obtaining warrants from a Winnipeg court. RCMP also obtained a warrant for Miawand Yar, who could face as much as 10 years in prison if he is convicted on charges of participating in a terrorist conspiracy. Authorities are also looking for another missing University of Manitoba student named Muhannad al-Farekh, though no charges have been brought against him. The suspects are not believed to have devised any terrorist plots to attack civilians, and are not thought to have had a direct role in the New York subway bombing plot. The case against Imam and Yar represents a test of Canada's Anti-Terrorism Act, which allows authorities to charge terrorism suspects who are believed to have committed acts of terrorism outside of Canada. This is the first time that the RCMP has charged someone with crimes that took place in an entirely different country besides Canada.




Spam Network Shut Down
Wall Street Journal (03/18/11) Wingfield, Nick

Microsoft on March 16 took action to shut down the Rustock botnet, which was responsible for sending nearly half of the world's spam at the end of last year, according to the security firm Symantec. As part of its effort to shutdown Rustock, employees of Microsoft's digital crimes unit and U.S. marshals used a federal court order to seize computers within a number of Internet hosting facilities across the country that were being used by the botnet's operators to send instructions to more than 1 million infected computers. In addition, Microsoft worked with the companies that provide Internet access to the Internet hosing facilities that were raided in order to prevent communications with the Internet protocol addresses that were allegedly being used by Rustock. The efforts appeared to be successful, as Rustock was found to be no longer sending spam shortly after Microsoft's actions began.


Twitter Adds Option to Always Use HTTPS
CNet (03/16/11) Whitney, Lance

Twitter has modified its security settings to offer an option to always enable Hypertext Transfer Protocol Secure, or HTTPS. Although the more secure setting has always been available, before Twitter users had to specifically visit https://twitter.com to utilize it. Now, the tighter security is a new option located on the Twitter settings page. The capability to use HTTPS is already the default option for Twitter's mobile iPhone app, according to a Twitter blog post, but not for Twitter's mobile site. To activate the tighter security when browsing the mobile version, users will still have to specify the address as https://mobile.twitter.com. Twitter also says that individuals who use a third-party mobile Twitter app will need to make sure it allows for HTTPS. Twitter says it intends in the future to set up HTTPS as the default option on its Web site so that users will not need to manually activate it.


Get SMART in Cyberspace: Protect Your Data
Newcastle University (03/15/11)

Newcastle University researchers have developed SMART AM, a data security system that acts as an extra virtual gateway that other users must pass through if they want to use or share data relating to a specific individual. The system, developed by Newcastle researcher Maciej Machulak and professor Aad van Moorsel, was recently demonstrated as part of a national conference on threats and trust on the Internet. Machulak says that as more people store their data on the Web, it is important to provide a new way to secure their data while still allowing users to share it in a controlled manner. He says the next step will be to use SMART AM as a virtual gateway or barrier, protecting individuals’ data from unwanted viewing, such as global positioning system tracking via mobile phones. "With our system the user could control what types of services should 'see' them in cyberspace and which should not," Machulak says.


'We Need to See Ahead'
MIT News (03/15/11) Dizikes, Peter

U.S. Department of Homeland Security (DHS) secretary Janet Napolitano recently cited science and technology research as a crucial element of national security. She also laid out ways that the U.S. government would like to recruit skilled academic researchers for public service. "We need to see ahead, and we need scientists to help us do that," Napolitano said. She addressed a broad range of research areas where the government is planning additional investment, including materials science and information theory. Napolitano noted that the sheer volume of digital information that U.S. intelligence organizations must mine for meaning every day represents a big data problem. "We therefore can't overstate the need for software engineers and information systems engineers," she said. "We need communications and data-security experts. And we need that kind of talent working together to find new and faster ways to identify and separate relevant data from non-relevant data." Napolitano stressed that DHS and other federal agencies are renewing their efforts to support scholarly research that is pertinent to U.S. security objectives. DHS also is launching a cyberworkforce program that aims to hire 1,000 researchers and workers to manage its growing computer science and information technology requirements.


Open-Source Vulnerabilities Paint a Target on Android
Dark Reading (03/14/11) Lemos, Robert

An attack on smartphones such as the recent DroidDream attack, in which 58 infected apps were uploaded from the Android Marketplace and downloaded by nearly 260,000 users, will likely happen again at some point in the future. One reason why additional attacks are likely is the fact that the openness of the Linux-based Android operating system means that a large number of hackers can attempt to find security flaws in the system. Cybercriminals have an incentive to find these security vulnerabilities, since exploiting them can open up certain functionalities on infected phones, including the ability to switch wireless providers. Compounding the problem is the fact that wireless carriers and smartphone manufacturers are usually slow to patch their phones, since the process of developing a patch and distributing it to users is typically long. However, it remains unclear how successful attacks against smartphones will be, given the fact that the devices have significant security controls in place. Both the iPhone and Google's Android operating system benefit from Linux's security controls and the use of some type sandboxing. In addition, experts say that the best way to access data from a smartphone is to steal the device, not infect it with malware.


Abstracts Copyright © 2011 Information, Inc. Bethesda, MD


  ASIS also offers a daily and a non-sponsored, special-content Professional Edition of
Security Newsbriefs. Please click to see a sample or to contact us for more information.

Unsubscribe | Change E-mail | Advertising Opportunities | Security Management Online | ASIS Online

27 comments:

Anonymous said...

Link exchange is nothing else except it is just placing the
other person's blog link on your page at suitable place and other person will also do similar for you.

Feel free to surf to my web-site colon cleanse recipe

Anonymous said...

Hi i am kavin, its my first time to commenting anyplace, when i
read this paragraph i thought i could also create comment due
to this good piece of writing.

Feel free to surf to my blog post ... ヴィトンバッグ

Anonymous said...

each time i used to read smaller articles which as well clear their motive, and that
is also happening with this piece of writing which I am reading at this
place.

Feel free to visit my web-site :: cheap nike air max free shipping

Anonymous said...

Heya i'm for the primary time here. I found this board and I find It truly useful & it helped me out a lot. I hope to present one thing again and help others like you aided me.

Here is my page - cheap nike air max

Anonymous said...

We are a bunch of volunteers and starting a brand new scheme in
our community. Your website provided us with valuable info to work on.
You have performed a formidable activity and our whole community can be thankful to you.


Visit my homepage - nike air max on sale

Anonymous said...

Excellent way of describing, and nice piece of writing to get information on the topic of my presentation subject, which i am going
to deliver in university.

Feel free to visit my blog - cheap nike air max free shipping

Anonymous said...

Hello There. I found your blog using msn. This is an extremely well
written article. I'll be sure to bookmark it and return to read more of your useful info. Thanks for the post. I will certainly comeback.

Also visit my webpage: クリスチャンルブタン

Anonymous said...

Have you ever thought about adding a little bit more than just your articles?
I mean, what you say is valuable and all. But think of if you added some great pictures or videos to give your posts more, "pop"!
Your content is excellent but with pics and video clips, this
website could definitely be one of the most beneficial in
its field. Good blog!

My page メンズコーチ

Anonymous said...

I'm gone to say to my little brother, that he should also pay a quick visit this weblog on regular basis to get updated from most recent news.

Also visit my homepage cheap nike air max

Anonymous said...

Hi there! Do you use Twitter? I'd like to follow you if that would be okay. I'm absolutely enjoying your blog and look forward to new posts.


my web page - cheap nike air max shoes

Anonymous said...

Hello, Neat post. There's a problem along with your website in web explorer, may test this? IE nonetheless is the marketplace chief and a large component to other people will miss your great writing because of this problem.

Stop by my web site cheap nike air max free shipping

Anonymous said...

I'm truly enjoying the design and layout of your website. It's a very easy on the
eyes which makes it much more enjoyable for me to come here
and visit more often. Did you hire out a developer
to create your theme? Great work!

Here is my web blog - prada 財布

Anonymous said...

Hi! Do you use Twitter? I'd like to follow you if that would be ok. I'm absolutely enjoying your blog and
look forward to new posts.

Feel free to surf to my webpage :: cheap nike air max

Anonymous said...

Can you tell us more about this? I'd care to find out more details.

Also visit my website - cheap sunglasses

Anonymous said...

I was recommended this website by my cousin.
I'm not sure whether this post is written by him as nobody else know such detailed about my difficulty. You're incredible!
Thanks!

Also visit my homepage ... Nike Air Max 97 Hyperfuse

Anonymous said...

It's amazing to visit this site and reading the views of all friends on the topic of this post, while I am also keen of getting knowledge.

Check out my blog post :: Nike air max billig

Anonymous said...

Hello there! Would you mind if I share your blog with my zynga group?
There's a lot of people that I think would really enjoy your content. Please let me know. Thanks

Feel free to surf to my blog post air max billig

Anonymous said...

Link exchange is nothing else except it is just placing the other person's weblog link on your page at suitable place and other person will also do similar in favor of you.

My site - nike air max günstig

Anonymous said...

Hello, I enjoy reading all of your post. I like to write a little comment to support
you.

Feel free to surf to my web page - Discount rolex watches *replicarolexs68.mywapblog.com*

Anonymous said...

After checking out a handful of the blog posts on your web page,
I truly appreciate your way of blogging. I book marked it to my bookmark website list and will be checking back in the near future.
Please visit my website too and tell me what you think.

Feel free to surf to my blog nike air max billig

Anonymous said...

I wanted to thank you for this great read!! I definitely
loved every bit of it. I have got you book marked to
look at new things you post…

Here is my site: グッチ 財布

Anonymous said...

Asking questions are actually fastidious thing if you are not understanding something completely, but this piece of writing provides nice understanding even.



Here is my webpage Gucci 財布 (www.latestmodelsgutchi.com)

Anonymous said...

I do trust all of the concepts you have offered to your post.

They're really convincing and will certainly work. Still, the posts are very quick for beginners. May you please extend them a little from next time? Thank you for the post.

Feel free to visit my blog post Nike Air Max BW

Anonymous said...

Very nice write-up. I certainly love this site. Continue the good work!


Here is my web site; Replica Rolex watches

Anonymous said...

Hi there, i read your blog occasionally and i own a similar
one and i was just curious if you get a lot of spam remarks?
If so how do you reduce it, any plugin or anything you can advise?
I get so much lately it's driving me insane so any assistance is very much appreciated.

my web-site ... Rolex watches

Anonymous said...

It's very simple to find out any matter on web as compared to books, as I found this post at this web site.

Here is my web blog ... Replica Rolex watches

Anonymous said...

If only to worship The Lord and Making it very be trained at the bible school to know Jesus any more.
Your shoes say a lot about who are, or individual preference want to be.


my blog - christian louboutin outlet