STE WILLIAMS

Cyber dragnet: Five new HACKERS join FBI’s ‘most wanted’ list

Free Regcast : Managing Multi-Vendor Devices with System Centre 2012

The US Federal Bureau of Investigation has added five new names to its “Cyber’s Most Wanted” list, bringing the total number of fugitives urgently wanted in relation to computer and data-related crimes to 17.

“The FBI leads the national effort to investigate high-tech crimes, including cyber-based terrorism, espionage, computer intrusions, and major cyber fraud,” bureau spokesman Richard McFeely said in a statement. “The expansion of the Cyber’s Most Wanted list is a reflection of the FBI’s increased efforts in this area.”


One of the new inductees is Andrey Nabilevich Taame, a Russian national wanted for his alleged involvement with DNSChanger, a malware scam that infected some four million PCs between 2007 and 2011. Six other men were arrested in the FBI’s 2011 DNSChanger sting – dubbed “Operation Ghost Click” – and at least one pleaded guilty earlier this year, but so far, Taame has avoided capture.

Two others added to the most-wanted list are Farhan Arshad and Noor Aziz Uddin, both Pakistani nationals who are wanted for allegedly hacking business telephone systems to make unauthorized calls, resulting in some $50m in losses to the affected companies. They’re believed to be part of an international criminal conspiracy that included people not just in Pakistan, but in Italy, Malaysia, the Philippines, Saudi Arabia, Singapore, Spain, Switzerland, and elsewhere.

FBI's Cyber Most Wanted: Latest entries

Have you seen any of these men, in person or online?

There’s also Carlos Enrique Perez-Melara, an El Salvadoran who allegedly ran a spyware-for-hire scheme out of an apartment in San Diego, California in 2003, but later fled to his home country.

The FBI is offering up to $50,000 for information leading to any of the above. (Perhaps you’ve seen them on Google+ – or Chatroulette?)

And then there’s Alexsey Belan, another Russian. He’s wanted for allegedly “remotely accessing the computer networks of three U.S.-based companies in 2012 and 2013 and stealing sensitive data as well as employees’ identities.” The FBI hasn’t named the companies in question, but they’re said to be based in Nevada and California.

Wanted since 2012, Belan is apparently a wily sort. He’s known to use aliases, wear disguises, and hop around between Greece, Latvia, the Maldives, Russia, and Thailand. Maybe for that reason – or maybe for the seriousness of his alleged crimes – the FBI will pay up to $100,000 for information on his whereabouts.

The five join an illustrious list of fugitives, including among others Artem Semenov, wanted for his alleged involvement in the Zeus Trojan scam; Peteris Sahurovs, who was briefly arrested in a scareware sting in 2011 but apparently escaped; Bjorn Daniel Sundin and Shaileshkumar P. Jain, both sought for their alleged involvement with another scareware scam; and Alexandr Bobnev, wanted in connection with an online banking fraud scheme.

“Throughout its history, the FBI has depended on the public’s help and support to bring criminals to justice. That was true in the gangster era, and it’s just as true in the cyber era,” McFeely said. “We need the public’s help to catch these individuals who have made it their mission to spy on and steal from our nation and our citizens.”

People with knowledge of the whereabouts of anyone on the FBI’s list are asked to contact their local FBI branch office or submit a tip online. ®

Free Regcast : Microsoft Cloud OS

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/11/06/fbi_cyber_most_wanted/

Google preps Chrome password-blab bug fix

Free Regcast : Managing Multi-Vendor Devices with System Centre 2012

A few months after the bug was discovered, Google’s decided it should experiment with a fix for its Chrome password exposure bug feature.

As El Reg noted back in August:


“If the victim, shall we say, is using Chrome, surf over to chrome://settings/passwords, click on a starred-out saved website password and click on “Show”; rinse and repeat down the list. Voila, you can see his or her passwords in plain text.”

While it only works if someone can access someone else’s machine, it’s easy enough to imagine that your average workplace probably has a sufficient combination of naively-trustful users and occasionally malicious workmates to make it a serious issue (not to mention kids seeking Dad’s online shopping password stash).

François Beaufort of Google France has now posted this code for review.

Right now, the code for the experimental flag has only been added to the latest Mac build of the Chrome browser, but the idea is straightforward:

“Once you’ve enabled the chrome://flags/#enable-password-manager-reauthentication flag, the user who’s trying to reveal a plain text password in chrome://settings/passwords will be prompted to reauthenticate with the User Mac OS password.”

Google password bug fix screenshot

The authentication window is open for one minute.

Presumably if the fix is welcomed and successful, it will be implemented in other versions of Chrome. ®

Free Regcast : Microsoft Cloud OS

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/11/06/google_preps_chrome_passwordblab_bug_fix/

CryptoLocker ransomware crooks offer “late payment penalty” option

The crooks behind the CryptoLocker malware seem to have introduced a second chance option.

Victims, it seems, can now change their minds about not paying up.

Assume you were a victim of this devious malware, and decided, “No! I will not pay!”

Imagine that you’ve done a full cleanup; removed the malware from memory, hard disk and Windows registry; and gone to see what you can recover from your backup disks.

Now imagine that you are having malware cleaner’s remorse.

Perhaps paying $300 would have been the pragmatic approach?

→ As we’ve been saying, our recommendation is not to pay up, but we also have to admit that it’s easy for people who haven’t had their favourite files scrambled to take that attitude.

Perhaps you had the malware for longer than you realised, and the backups you thought would help are scrambled?

Perhaps your infected computer had access to documents on a server at the office, and ruined other people’s files, too?

In short, perhaps you’d like a chance to change your mind?

Enter the CryptoLocker Decryption Service:

This service allow you to purchase private key and decrypter for files encrypted by CryptoLocker.

If you already purchased private key using CryptoLocker, then you can download private key and decrypter for FREE.

Select any encrypted file and click “Upload” button.

The first 1024 bytes of the file will be uploaded to the server for search the associated private key. The search can take up to 24 hours.

IMMEDIATELY AFTER UPLOADING FILE TO THE SERVER, YOU RECEIVE YOUR ORDER NUMBER. YOU CAN USE THIS NUMBER TO CHECK STATUS OF ORDER.

OR if you already know your order number, you may enter it into the form below.

Apparently the crooks will now let you buy back your key even if you didn’t follow their original instructions.

Word on the street, however, is that the crooks want five times as much as they were charging originally to decrypt your data after you change your mind

The cost of is now 10 Bitcoins instead of the 2 Bitcoins they were after at the start – a sort of late payment penalty, like the taxation office imposes.

According to this latest website, you send them the first 1024 bytes of any encrypted file in order to determine your eligibilty for the new “service,” and then wait up to 24 hours.

We’re guessing that the delay is because the crooks have to run a brute force attack against themselves.

Without your public key to help them match up your keypair in their database, it sounds as though they have to try to decrypting your data with every stored private key until they hit one that produces a plausible result.

They’re not actually saying whether this new service works even if the 72 hour deadline imposed at the start has expired.

The implication, however, is that it will – not least because the 24-hour delay needed to process your “order” would otherwise reduce that deadline to 48 hours, cutting down their window for extortion substantially.

Furthermore, those 48 hours would have to include the time for you to clean up, find that you couldn’t recover by more palatable means than the initial threat, change your mind, and contact the “second chance” website.

If so, the crooks’ original claim was bogus all along:

The single copy of the private key, which will allow you to decrypt the files, located on a secret server on the Internet; the server will destroy the key after a time specified in this window. After that, nobody and never will be able to restore files.

Nobody and never, eh?

We’re still saying, “Don’t buy,” but we’re feeling your pain enough to know how tempting it will be for some people to pay the crooks, even though the blackmail charges have now ballooned to more than $2000.

In the meantime, if you’ve decided not to pay – or have escaped the depredations of these crooks so far – we urge you to check out our advice:

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/y0n4xuMFj6g/

Monday review – the hot 25 stories of the week

It’s weekly roundup time!

Here’s all the great stuff we’ve written in the past seven days.

Watch the top news in 60 seconds, and then check out the individual links to read in more detail.

Monday 28 October 2013

Tuesday 29 October 2013

Wednesday 30 October 2013

Thursday 31 October 2013

Friday 1 November 2013

Saturday 2 November 2013

Sunday 3 November 2013

Would you like to keep up with all the stories we write? Why not sign up for our daily newsletter to make sure you don’t miss anything. You can easily unsubscribe if you decide you no longer want it.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/pHMxi_Kij8w/

Lightbeam shines a light on which websites you’re really visiting

LightbeamDo you really know where your browser goes when you type a URI into its address bar? Do you realise that your browser not only accesses the site you intended but may also have visited 3rd party websites running connected services?

For many of us this revelation is nothing new but to a lot of surfers this type of activity is news – for the simple reason that it happens behind the scenes.

Sometimes, but by no means always, you can see the end results of this behind the scenes traffic on the website you’re visiting; it’s essential for delivering features like Google AdSense, Facebook Likes or Pinterest ‘Pin it’ buttons for example.

What’s happening is that when you type a URL into your browser it fetches the web page you asked for and then it fetches anything else that web page says it needs.

Typically a page will contain instructions to fetch things like stylesheets that control the layout of the page, graphics and photographs to illustrate it and scripts to create functionality.

Those things might come from the same website as the page you asked for but they don’t have to, the web page can also ask for things from 3rd party websites.

To both the web browser and the 3rd party websites involved these unseen secondary requests are indistinguishable from a user just typing a URL into the address bar.

This is an extremely useful feature, one that is essential to the operation of a lot of web services, but it allows the 3rd parties involved to do things you might not expect such as track your ‘visit’ or set cookies on your browser.

This isn’t a secret but it isn’t obvious either. Web browsers have ways of showing you this traffic if you want to see it but it’s not visible in a form that would make sense to a non-technical user.

Recently, Mozilla released a new add-on for Firefox called Lightbeam. The primary purpose of Lightbeam is to help people better understand how the web works and to shine a light on the realities of data tracking.

Released at this year’s MozFest, Lightbeam builds on existing technology called Collusion to give users more control over their surfing activities and how they are being monitored on the web.

In a blog post announcing Lightbeam, Mozilla’s Alex Fowler stated, “we believe that everyone should be in control of their user data and privacy”.

I thought this sounded like a great tool for those of us who seek more transparency in the way our online activities are tracked so I gave Lightbeam a quick test drive.

I picked a handful of social media and news sites (including Naked Security) to see how connected they all were and to see if I could learn about some of the 3rd party connections that I hadn’t known existed.

In all, I visited 12 sites which connected me with 127 3rd party sites.

For example, a visit to Naked Security yielded 21 3rd party connections. Some of these connections are to services like Facebook, LinkedIn, Reddit and Twitter which we use to make it easier for our readers to share content.

Some are to services that provide additional content, like Sophos videos on YouTube, and some are analytics services which help us understand which articles are popular.

Lightbeam allows you to filter by visited and 3rd party sites. Visited sites are the sites that you either typed the URI in the browser yourself or explicitly clicked on a link to access the content.

3rd party sites are sites that are connected to the sites you visited that might collect information about you without any explicit interaction.

Lightbeam also gives you the ability to drill down into these site interactions and optionally block or watch certain sites of your choosing.

To be clear 3rd party services and 3rd party cookies are not intrinsically bad and can be employed for many useful purposes that don’t involve tracking.

Even those 3rd parties that are involved in tracking might be putting their data to uses that at least some of their users will agree with and benefit from.

For example Twitter monitors the websites its users visit with its tweet buttons and then uses the data to personalise its Trends.

Some Twitter users will feel this improves the site, others will be ambivalent and some will see it as unwelcome and invasive (if you’re one of those people you can disable the feature by enabling Do Not Track in your browser or through your Twitter security settings).

Fowler makes a good point when he says:

When we’re unable to understand the value these companies provide and make informed choices about their data collection practices, the result is a steady erosion of trust for all stakeholders.

For most privacy advocates this translates to transparency. If we know who is tracking us and what they’re doing with our data we can decide what level of trust and risk we’re willing to undertake.

Tools like Lightbeam give us greater visibility and control over which websites we are really visiting and allow us to make better decisions about who we transact with. A more open web means a better experience for everyone involved.

Chrome users can still download the Collusion add-on from the Chrome Web Store which will provide similar information and functionality.

If you’d like to know more about the 3rd party connections we use on Naked Security then take a look at our Cookies and Scripts page. You’ll find a list of cookies, their domains and who sets them as well as links to privacy policies and vendor opt-outs.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/fEsDx35yAz0/

Anatomy of a password disaster – Adobe’s giant-sized cryptographic blunder

One month ago today, we wrote about Adobe’s giant data breach.

As far as anyone knew, including Adobe, it affected about 3,000,000 customer records, which made it sound pretty bad right from the start.

But worse was to come, as recent updates to the story bumped the number of affected customers to a whopping 38,000,000.

We took Adobe to task for a lack of clarity in its breach notification.

Our complaint

One of our complaints was that Adobe said that it had lost encrypted passwords, when we thought the company ought to have said that it had lost hashed and salted passwords.

As we explained at the time:

[T]he passwords probably weren’t encrypted, which would imply that Adobe could decrypt them and thus learn what password you had chosen.

Today’s norms for password storage use a one-way mathematical function called a hash that […] uniquely depends on the password. […] This means that you never actually store the password at all, encrypted or not.

[…And] you also usually add some salt: a random string that you store with the user’s ID and mix into the password when you compute the hash. Even if two users choose the same password, their salts will be different, so they’ll end up with different hashes, which makes things much harder for an attacker.

It seems we got it all wrong, in more than one way.

Here’s how, and why.

The breach data

A huge dump of the offending customer database was recently published online, weighing in at 4GB compressed, or just a shade under 10GB uncompressed, listing not just 38,000,000 breached records, but 150,000,000 of them.

As breaches go, you may very well see this one in the book of Guinness World Records next year, which would make it astonishing enough on its own.

But there’s more.

We used a sample of 1,000,000 items from the published dump to help you understand just how much more.

→ Our sample wasn’t selected strictly randomly. We took every tenth record from the first 300MB of the comressed dump until we reached 1,000,000 records. We think this provided a representative sample without requiring us to fetch all 150 million records.

The dump looks like this:

By inspection, the fields are as follows:

Fewer than one in 10,000 of the entries have a username – those that do are almost exclusively limited to accounts at adobe.com and stream.com (a web analytics company).

The user IDs, the email addresses and the usernames were unnecessary for our purpose, so we ignored them, simplifying the data as shown below.

We kept the password hints, because they were very handy indeed, and converted the password data from base64 encoding to straight hexadecimal, making the length of each entry more obvious, like this:

Encryption versus hashing

The first question is, “Was Adobe telling the truth, after all, calling the passwords encrypted and not hashed?”

Remember that hashes produce a fixed amount of output, regardless of how long the input is, so a table of the password data lengths strongly suggests that they aren’t hashed:

The password data certainly looks pseudorandom, as though it has been scrambled in some way, and since Adobe officially said it was encrypted, not hashed, we shall now take that claim at face value.

The encryption algorithm

The next question is, “What encryption algorithm?”

We can rule out a stream cipher such as RC4 or Salsa-20, where encrypted strings are the same length as the plaintext.

Stream ciphers are commonly used in network protocols so you can encrypt one byte at a time, without having to keep padding your input length to a multiple of a fixed number of bytes.

With all data lengths a multiple of eight, we’re almost certainly looking at a block cipher that works eight bytes (64 bits) at a time.

That, in turn, suggests that we’re looking at DES, or its more resilient modern derivative, Triple DES, usually abbreviated to 3DES.

→ Other 64-bit block ciphers, such as IDEA, were once common, and the ineptitude we are about to reveal certainly doesn’t rule out a home-made cipher of Adobe’s own devising. But DES or 3DES are the most likely suspects.

The use of a symmetric cipher here, assuming we’re right, is an astonishing blunder, not least because it is both unnecessary and dangerous.

Anyone who computes, guesses or acquires the decryption key immediately gets access to all the passwords in the database.

On the other hand, a cryptographic hash would protect each password individually, with no “one size fits all” master key that could unscramble every password in one go – which is why UNIX systems have been storing passwords that way for about 40 years already.

The encryption mode

Now we need to ask ourselves, “What cipher mode was used?”

There are two modes we’re interested in: the fundamental ‘raw block cipher mode’ known as Electronic Code Book (ECB), where patterns in the plaintext are revealed in the ciphertext; and all the others, which mask input patterns even when the same input data is encrypted by the same key.

The reason that ECB is never used other than as the basis for the more complex encryption modes is that the same input block encrypted with the same key always gives the same output.

Even repetitions that aren’t aligned with the blocksize retain astonishingly recognisable patterns, as the following images show.

We took an RGB image of the Sophos logo, where each pixel (most of which are some sort of white or some sort of blue) takes three bytes, divided it into 8-byte blocks, and encrypted each one using DES in ECB mode.

Treating the resulting output file as another RGB image delivers almost no disguise:

Cipher modes that disguise plaintext patterns require more than just a key to get them started – they need a unique initialisation vector, or nonce (number used once), for each encrypted item.

The nonce is combined with the key and the plaintext in some way, so that that the same input leads to a different output every time.

If the shortest password data length above had been, say, 16 bytes, a good guess would have been that each password data item contained an 8-byte nonce and then at least one block’s worth – another eight bytes – of encrypted data.

Since the shortest password data blob is exactly one block length, leaving no room for a nonce, that clearly isn’t how it works.

Perhaps the encryption used the User ID of each entry, which we can assume is unique, as a counter-type nonce?

But we can quickly tell that Adobe didn’t do that by looking for plaintext patterns that are repeated in the encrypted blobs.

Because there are 264 – close to 20 million million million – possible 64-bit values for each cipertext block, we should expect no repeated blocks anywhere in the 1,000,000 records of our sample set.

That’s not what we find, as the following repetition counts reveal:

Remember that if ECB mode were not used, each block would be expected to appear just once every 264 times, for a minuscule prevalence of about 5 x 10-18%.

Password recovery

Now let’s work out, “What is the password that encrypts as 110edf2294fb8bf4 and the other common repeats?”

If the past, all other things being equal, is the best indicator of the present, we might as well start with some statistics from a previous breach.

When Gawker Media got hacked three years ago, for example, the top passwords that were extracted from the stolen hashes came out like this:

(The word lifehack is a special case here – Lifehacker being one of Gawker’s brands – but the others are easily-typed and commonly chosen, if very poor, passwords.)

This previous data combined with the password hints leaked by Adobe makes building a crib sheet pretty easy:

Note that the 8-character passwords 12345678 and password are actually encrypted into 16 bytes, denoting that the plaintext was at least 9 bytes long.

It should come as no surprise to discover that this is because the input text consisted of: the password, followed by a zero byte (ASCII NUL), used to denote the end of a string in C; followed by seven NUL bytes to pad the input out to a multiple of 8 bytes to match the encryption’s block size.

In other words, we now know that e2a311ba09ab4707 is the ciphertext that signals an input block of eight zero bytes.

That data shows up in the second ciphertext block in a whopping 27% of all passwords, which leaks to us immediately that all those 27% are exactly eight characters long.

The scale of the blunder

With very little effort, we have already recovered an awful lot of information about the breached passwords, including: identifying the top five passwords precisely, plus the 2.75% of users who chose them; and determining the exact password length of nearly one third of the database.

So, now we’ve showed you how to get started in a case like this, you can probably imagine how much more is waiting to be squeezed out of “the greatest crossword puzzle in the history of the world,” as satirical IT cartoon site XKCD dubbed it.

Bear in mind that salted hashes – the recommended programmatic approach here – wouldn’t have yielded up any such information – and you appreciate the magnitude of Adobe’s blunder.

There’s more to concern youself with.

Adobe also decribed the customer credit card data and other PII (Personally Identifiable Information) that was stolen in the same attack as “encrypted.”

And, as fellow Naked Security writer Mark Stockley asked, “Was that data encrypted with similar care and expertise, do you think?

If you were on Adobe’s breach list (and the silver lining is that all passwords have now been reset, forcing you to pick a new one), why not get in touch and ask for clarification?

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/NeH2ZTkK7dk/

NSA whistleblower Edward Snowden says he’s a hero; do you agree? [POLL]

Edward Snowden“To tell the truth is not a crime”, Edward Snowden asserted in a piece titled “A Manifesto for the Truth” published by Der Spiegel on Sunday – the same day that the White House and elected officials scoffed at the NSA whistleblower’s request for clemency.

The US government strenuously believes that telling the truth is a crime, at least in this case, wherein former National Security Agency contractor Snowden has repeatedly disclosed classified government documents about surveillance practices.

The chairwoman of the Senate Intelligence Committee, Dianne Feinstein, Democrat of California, and her House counterpart, Mike Rogers, Republican of Michigan, have both flatly rejected the notion that Snowden has made a case for clemency.

Feinstein said on the TV program ‘Face the Nation‘ that instead of releasing documents to the Guardian and other newspapers, Snowden could have followed more orthodox methods of whistleblowing:

He was trusted; he stripped our system; he had an opportunity – if what he was, was a whistle-blower – to pick up the phone and call the House Intelligence Committee, the Senate Intelligence Committee, and say I have some information. … [But] that didn’t happen.

Snowden’s official request for clemency was released Friday when he gave a one-page typed letter to a German politician that was also reportedly sent to Der Spiegel over an encrypted channel.

In his appeal, Snowden says that his actions have been justified by the useful debate they’ve sparked over surveillance programs that are “not only a threat to privacy” but a threat to “freedom of speech and open societies.”

He said:

Society can only understand and control these problems through an open, respectful and informed debate.

In fact, he said, the debate that governments wanted to prevent “will now take place in countries around the world.”

Rather than doing harm, the benefits from a newly aware public is already bearing fruit, he said, in the form of proposed reforms that entail increased oversight and new legislation.

Indeed, Feinstein herself is among those who’ve questioned whether the NSA has overreached its mandate and whether reform might be in order, particularly in light of reports that the agency had long monitored the cellphone of German Chancellor Angela Merkel.

Feinstein said on Sunday that she’s all for a White House review of intelligence operations and would like her committee to be the one to conduct it.

Tapping the private phones of close allies, she said, can be more of a political liability than a source of good intelligence, so “We ought to look at it carefully. I believe the president is doing that.”

Federal prosecutors have charged Snowden – who’s still in temporary asylum in Russia – with theft and with two violations of the Espionage Act of 1917.

In his manifesto, Snowden said he didn’t believe that telling the truth should be considered a criminal offense:

Citizens have to fight suppression of information on matters of vital public importance. To tell the truth is not a crime.

What do you think? Is Snowden a whiner? Should he leave Russia and face the music?

Or do you think he should be lauded for shining a light into the dark corners of a spy agency that’s been blinded by the power of its technology toys?

Let us know your thoughts:

Take Our Poll

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/HJtY3F_VChg/

Playtime’s over: Next NSA boss may be torn away from US cyber-war effort

5 ways to prepare your advertising infrastructure for disaster

The job of running both the NSA and the US Cyber Command – which tasked with defending Uncle Sam’s military computer networks – may be split after their boss General Keith Alexander retires.

Alexander became a four-star general after he took the combined roles of leading both the NSA and US Cyber Command following the creation of the latter in 2009. Senior military officials are reportedly considering splitting up the two roles when the general steps down next spring, although this remains undecided.


The possible split is an indirect consequence of the Snowden revelations or, more specifically, the growing perception that the position has too much power and not enough oversight as a result of the whistleblower’s leaks.

The next NSA director – a position traditional assigned to a senior military officer – may even be a civilian. The Pentagon has already drawn up a list of possible candidates, a former high-ranking administration official has claimed. A separate armed-forces officer would head up US Cyber Command, which is a team of military-trained hackers tasked with protecting US government computer systems and preparing offensive cyber-attacks.

Alternatively, the Obama administration may eventually decide to assign two military officers to head the two agencies.

“The fact that the administration is considering whether to split the commands isn’t a direct response to the revelations about the NSA’s surveillance operations, but it does reflect growing concern over the power of the NSA director and a shortage of oversight of the position,” political blog The Hill reports, adding that congressional committees are also reviewing whether one official should lead both the NSA and Cyber Command.

‘US Cyber Command depends on NSA’

General Alexander is reportedly lobbying policy makers against splitting up his post. “If you try to break them up [NSA and US Cyber Command], what you have is two teams not working together. Our nation can’t afford, especially in this budget environment, to have one team try to rebuild what the other team does,” Alexander said during a discussion on cyber-security hosted by Politico last month.

Splitting the two organizations would result in fights over resources and command decisions, according to Gen Alexander. Jim Lewis, a senior fellow at the Center for Strategic and International Studies, expressed concern that Cyber Command is too immature to operate on its own.

“It’s still small; it’s still growing. There’s a real shortage of bodies in the US government,” Lewis told The Hill. “Cyber Command depends on NSA.”

However, Jason Healey, director of the cyber statecraft initiative at the Atlantic Council, welcomed the move. In a guest editorial, Healey argued that uniting the two outfits concentrates too much power in the hands of one general, and tends to lead to bad policy decisions. Healey reckons today’s structure is responsible for pushing the NSA towards aggressive and global dragnet-style surveillance as well as vigorously assaulting computer networks.

“The official and public US policies on cyberspace emphasize peace and security, but the cyber ‘deep state’ led by NSA and Cyber Command have essentially overridden that policy by changing the facts on the ground, in the network, through aggressive collection and covert actions,” Healey wrote.

“NSA must be split from US Cyber Command to create separate leadership with physically distinct headquarters. This will of course create tensions and increased costs, but cyberspace is too important to grant one person have a near-monopoly on threat intelligence while simultaneously conducting active espionage, directing military force, and advising on policy.”

Other security experts also welcomed possible moves to split the NSA and US Cyber Command, but they wanted to go even further. “I think it’s great they’re separating NSA and Cyber Command. Even better: don’t make the same agency perform offensive and defensive roles,” Matthew Green, a cryptographer and research professor at Johns Hopkins University, said in a Twitter update. ®

Bootnote

Green’s point references an idea we first heard back in April, from Bob Ayers, a former US intelligence officer in the US Army and the Defense Intelligence Agency with 30 years of experience. Ayers, commercial director at UK-based security firm Glasswall Solutions, explained that in an intelligence organization with both offensive and defensive roles that attack will always take precedence over defense.

Free Regcast : Managing Multi-Vendor Devices with System Centre 2012

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/11/05/nsa_cyber_command_split_analysis/

Microsoft in a TIFF over Windows, Office bug that runs code hidden in pics

Free Regcast : Managing Multi-Vendor Devices with System Centre 2012

Microsoft has alerted users and system administrators following the discovery of targeted attacks on a security bug present in Windows, Office and Lync.

The software giant said the flaw allows attackers to remotely execute code and install malware on a vulnerable system by sending an email or instant message or convincing a user to open a specially crafted webpage.


According to Microsoft, the flaw lies in the handling of TIFF image files by a graphics processing component in Windows Vista, Server 2008, Office 2003 to 2010 and Microsoft Lync. When exploited, the attacker’s code hidden in the image file executes on the target system with the same privileges as the current user.

Researchers at McAfee said they tracked assaults on Windows XP systems, and warned that Windows 7 systems are also vulnerable if an affected version of Office is installed. Versions of Office and Lync for Mac OS X are not believed to be at risk.

It’s understood the TIFF attack works by tricking the OS into copying malicious code stashed in the file into memory and then hijacking the processor to execute it.

Microsoft has yet to post a patch to fix the bug, although the company has posted a workaround which edits the Windows registry to prevent the rendering of TIFF images, thus blocking off the attack vector on vulnerable systems.

Should a formal update for the flaw arrive, it would most likely hit the download servers next Tuesday when Microsoft issues its monthly Patch Tuesday security update. The regularly scheduled fix designates the release time for all but the most serious patches on Windows, Office and Internet Explorer. ®

Email delivery: Hate phishing emails? You’ll love DMARC

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/11/05/microsoft_in_a_tiff_over_security_flaw/

Lavabit bloke passes hat for open-source secure email master plan

Free Regcast : Managing Multi-Vendor Devices with System Centre 2012

Ladar Levison, the former operator of the Lavabit secure email service that was once used by NSA leaker Edward Snowden, has launched a Kickstarter project to raise funds to release the site’s code as an open source project.

Levison shut down Lavabit in August, and while court orders forbid him from discussing details of the situation, it is widely believed that the move was in response to a subpoena to turn over his users’ data.


At the time, Levison posted to the company’s homepage that he felt scuttling the service was his only option, or else he would “become complicit in crimes against the American people.”

Since then, he has teamed up with the team behind Silent Circle – which also briefly offered a secure email service, but similarly closed it down in August – to form the Dark Mail Alliance, a group dedicated to creating a new email system designed to be impossible to eavesdrop.

“The Summer of Snowden may have taken the Lavabit email service offline, but the lifeblood of the service is still alive and relevant to Dark Mail,” Levison writes on his new Kickstarter page. “The goal is to perfect and release its source code as a free and open-source software (F/OSS) project.”

To that end, Levison is seeking to raise $196,608*, of which $25,000 had already been pledged when The Reg hit the big, red publish button on this story.

Those funds will go toward paying programmers to clean up the code and get it into a form that can be released to the public so that it can be used to create new secure email systems like the one Levison used to operate.

“Since I’ve basically decided that I don’t think I can return as a service provider until my case is settled, I’ve decided that if there can’t be a Lavabit, the next best thing is a hundred Lavabit-like services,” Levison said in the video accompanying the Kickstarter project.

If the project is funded, Levison says he will be looking for engineers with experience in C, Javascript, HTML, SQL and JSON.

The software itself consists of “magma,” a mail daemon that transparently encrypts data before writing it to disk. The magma daemon supports access via SMTP, POP3, IMAP4, and HTTP, and part of the project will involve adding support for the new, end-to-end encrypted Dark Mail protocol being developed by the Alliance.

In addition, Levison plans to develop Dark Mail–compatible email clients for Windows, OS X, Linux, iOS, and Android, which will also be released as F/OSS projects.

Backers of the Kickstarter project will receive various perks, ranging from access to official binaries to early access to the source code, installation support, and a limited-edition polo shirt.

The funding period extends until 8:00PM Eastern time on Wednesday, November 27 – coincidentally, the day before the American Thanksgiving holiday. ®

Bootnote

* Levison’s funding amount is a curious one, and although El Reg has asked for clarification, we haven’t heard anything back. The decimal number 196,608 is equivalent to 110000000000 in binary or 300000 in hexadecimal, but those numbers don’t hold any special significance for us, either. If Reg readers have any ideas, we’d love to hear them.

Email delivery: Hate phishing emails? You’ll love DMARC

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/11/05/lavabit_kickstarter_project/