Category Archives: Internet Security
How to Build a Satellite-Powered, Raspberry Pi Security Camera for Off-the-Grid Locations – Tom’s Hardware
A friend of mine recently had a break in at his cabin up north. He wanted to know if I had any recommendations on technology that could let him keep an eye on things from far away. The only challenge is his cabin is relatively remote, and cell service or internet isnt available in the area. With that in mind, I wanted to design a solution that would keep an eye on things using a Raspberry Pi, a bit of edge computing, and a satellite connection.
For this project Im using the Swarm satellite constellation; its a low cost solution for providing satellite connectivity for internet-of-things devices in remote locations. Where one solution would be to livestream images from a camera using a high-bandwidth connection for off-site processing, this project does on-site processing (edge computing) instead sending only the results, letting us keep this project running for a long time at the low cost of $5 a month. Heres how to build a remote cabin monitoring and alerting system with a Raspberry Pi, a camera, and the Swarm Eval Kit.
Before you get started, get your Raspberry Pi set up. If you havent done this before, see our article on how to set up a Raspberry Pi for the first time or how to do a headless Raspberry Pi install (without the keyboard and screen). For this project, we recommend a headless Raspberry Pi install.
1. Install git. Well need it to download the code from GitHub.
2. Clone the repository to your home directory. This will download all the necessary source code for person detection and communicating with the Swarm tile.
3. Run the make install command to install all project dependencies. This script will take care of installing lower level dependencies, as well as the Python libraries you need for the project to run. The machine learning library were using to detect people is packaged within one of the Python libraries, so it may take a few minutes to install.
4. Connect your Raspberry Pi Camera to the Raspberry Pi and mount it in the desired location.
5. Test your Raspberry Pi Camera by taking a snapshot with the following command.
6. Assemble and register your Swarm Eval Kit using the instructions in the quickstart guide. This will get it connected to the network for transmitting data.
7. Turn on your Swarm Eval Kit system with the button on the side.
8. Set your Raspberry Pi Wi-Fi to the Swarm Evaluation Kit SSID. This will need to be done directly on the pi with an external monitor and keyboard. Any SSH connections to the pi will be dropped when the pi switches to the Swarm SSID.
The easiest way to do this is by using raspi-config (sudo raspi-config), navigating to System Options->WIreless LAN and then entering the Swarm Eval Kits SSID (youll have to find this on another device where it will be swarm-xxxx) and entering a default password of 12345678.
9. Run the application to test it. If the Raspberry Pi is connected to the Swarm Kit successfully, it will send a startup email over the network. Depending on your satellite availability it can take some time to arrive in your inbox; use this pass checker to determine when a satellite will be overhead.
10. Configure the application to run on boot by adding a line to the /etc/rc.local file.
11. Place the Swarm Eval Kit in view of the sky, and mount the Raspberry Pi and camera in your desired location.
When running, the Raspberry Pi will continuously pull images from the camera and check them for the presence of a person. If a person is detected, the Pi will send a message to the Swarm Eval Kit, which will then communicate with a constellation of satellites via VHF. The satellites will relay the message to a downlink, and youll then receive an email indicating a person has been detected. The Pi will also send an email every 24 hours that no people have been detected in order to let you know its still working.
This type of system can also be modified to send more than just person-detection data. Leak detection, fire detection, and any kind of sensor that can communicate with a Raspberry Pi are all possible to send over the network.
Read more here:
How to Build a Satellite-Powered, Raspberry Pi Security Camera for Off-the-Grid Locations - Tom's Hardware
When Political Relationship Between Two Countries Turns Confrontational, It Is Impossible To Keep Other Spheres Intact Embassy of the People’s…
On September 22, 2021, Ambassador Qin Gang was invited to attend an online conversation jointly held by The Carter Center and The George H.W. Bush Foundation for US-China Relations and delivered a speech. The Ambassador also answered questions from the participants. The Q&A is as follows:
Q1: How to interpret and handle public mutual criticisms and blaming from China and the US?
A: A very important thing between China and the US is mutual respect. China is open and inclusive. We welcome and readily accept various suggestions or criticisms, as long as they are objective, truthful, well-intentioned and constructive, and we will make improvements according to them. As Chinese Ambassador to the US, a very important job of mine is to communicate and listen. However, we do not accept baseless slander and disinformation. We do not accept condescending lecturing. And we do not accept words or deeds that undermine China's sovereignty, unity and territorial integrity. Citizens must abide by the law. Likewise, countries must abide by the basic norms governing international relations. US law prohibits secession and racial hatred, but why do some Americans want to treat China in this way?
Q2: What is China's reaction to the cooperation between Australia, the UK and the US about nuclear submarines?
A: China has expressed concerns to the US side. Foreign Ministry spokesperson has made it clear. In fact, not only China, but also many other regional countries have stated their concerns and even opposition. The nuclear submarine cooperation between the US, the UK and Australia will intensify arms race, undermine regional peace and stability, and sabotage international nuclear non-proliferation efforts. It is extremely irresponsible. We urge these countries to discard Cold-War zero-sum mentality and narrow-minded geopolitical perception, and not to gang up. Security affairs of the Asia-Pacific should be jointly decided by people in the region, and not be dominated by the Anglo-Saxons. China will closely monitor the developments of the situation.
Q3: What is the role China will play in Asia-Pacific regional economic integration?
A: First, as the world's second biggest economy and the number one trading partner of over 120 countries, especially Asian countries, China has maintained stable economic growth. This is in itself a powerhouse and a source of confidence for the growth of Asian and world economy and trade. China is a strong link in the global supply chain.
Second, China is striving towards common prosperity. It is committed to high-level opening-up. This means it will provide a broader market and greater development opportunities for Asian countries.
Third, China is committed to economic globalization and regional economic integration. We have joined the RCEP (Regional Comprehensive Economic Partnership), and are applying to join the CPTPP (Comprehensive and Progressive Agreement for Trans-Pacific Partnership). We will also upgrade FTA arrangements with the Republic of Korea and Singapore, and speed up negotiations of a China-Japan-ROK FTA. These initiatives will inject strong impetus into regional economic integration of the Asia-Pacific, advance integrated development of regional industrial chain, supply chain and value chain, boost trade and investment, and promote development and prosperity of the Asia-Pacific.
Q4: What are the concrete measures that can be taken by the US and China to promote mutual confidence, especially on the resumption of effective cooperation in educational, scientific and technological fields?
A: China-US relations were seriously damaged during the previous US administration. Our educational, technological and people-to-people exchanges also suffered. Some Americans say Chinese students are spies, and Confucius Institutes are engaging in cultural infiltration. Many Chinese students and scholars have been repatriated, denied visas, interrogated, and harassed for no reason. Scientific and technological exchanges between the two sides have almost been cut off. Educational, technological and cultural exchanges serve the interests of both countries. They are critical for our mutual understanding and trust. Since I assumed office, over 10 American universities and educational institutions have written to me, expressing their hope for continued US-China educational exchanges and cooperation. We hope that the Biden administration will turn this around as soon as possible. I noticed that the US side has recently issued visas to 85,000 Chinese students, but still some Chinese students' applications got rejected. We hope that the US side will do more things to lift the iron curtain between our people, and allow our students, scholars, scientists and artists to talk and work together without fear and obstacles. For example, our scientists could cooperate on major infectious diseases and on climate change. China also welcomes American students to study in China.
Not long ago, President Xi Jinping spoke with President Joe Biden on the phone. They had candid, in-depth and strategic communication and exchanges, sending out positive signals. They have agreed to maintain frequent contact by multiple means and instructed officials at the working level to conduct extensive dialogue, tap the potential of cooperation, effectively manage differences so as to avoid conflict and create conditions for the further development of China-US relations. President Xi stressed that the two sides should advance coordination and cooperation on the basis of respecting each other's core concerns and properly managing differences. To be frank, what I worry about is that the US uses competition to define China-US relations, while competition on the US side often takes the form of confrontation, especially on major issues concerning China's core interests. If this does not change, it will undermine China's efforts to promote our mutual trust and cooperation. There isn't any example in the history of international relations where the political relationship between two countries is in competition or even confrontation but other spheres remain safe and sound.
Q5: At present, non-Chinese citizens need to wait several weeks or even months to get their visas to travel to China for emergent humanitarian reasons. Will the embassy re-consider expediting the processing of such visa at the shortest timeline possible in days? Have the US and China begun discussion on reopening the Consulates in Chengdu and Houston?
A: Due to the pandemic, in-person visa application has been replaced by a mail-in process. This has caused inconveniences to the applicants and affected the processing speed. In July last year, the US suddenly and unilaterally demanded China shut down the Consulate General in Houston. This is against the China-US Consular Convention, international law and basic norms governing international relations. It has seriously damaged China-US relations. Visa applications which used to be processed by Chinese Consulate General in Houston have been transferred to the Embassy, so there has been a sharp increase of workload for us, which makes the processing time somehow longer. Our staff at the Embassy will do their best to speed up. We also hope that visa applicants will provide complete and accurate information as required to avoid hiccups and delays.
Facing the abrupt closure of the Consulate General in Houston, the Chinese side had no choice but to reciprocate and close the US Consulate General in Chengdu. Let the person who tied the bell on the tiger take it off. This is something unilaterally started by the US side, and the US side must act first to resolve it.
Q6: Over the next decades, global issues where the United States and China must work together (global warming, nuclear proliferation, limits on cyber-warfare, and new technologies) will likely become more salient and their solutions more complex. What should be done to ensure that the next generation of US and Chinese diplomats are well equipped to handle these issues?
A: During the telephone conversation between President Xi Jinping and President Biden, President Xi emphasized that with the international community facing many common challenges, China and the US need to show broad vision and shoulder great responsibilities. On the basis of respecting each other's core concerns and properly managing differences, the two countries need to continue their engagement and dialogue to advance coordination and cooperation on major international and regional issues.
On climate change, China and the US must first do their own things well. Both sides have announced their NDC goals, so we must honor our words with real actions. The international community has misgivings about whether the US can fulfill its promises and whether it will flip again.
Both China and the US should practice multilateralism, and safeguard the international system with the UN as the core and the international order based on international law. For example, on nuclear non-proliferation, the US cooperation with Australia on nuclear submarines give people reasons to question their sincerity and ability to honor international responsibilities and obligations, including non-proliferation commitments. If a country likes to talk about safeguarding a rules-based international order, but does not follow the rules set by itself, or only follows them selectively, or keeps flip-flopping, how can you expect other countries to trust this country?
The Internet and other new technologies have enabled progress, but also brought about risks and challenges. The international community must have new norms and standards to regulate them, so as to maximize their pros and minimize their cons. China and the US can negotiate and coordinate in this field. For example, China has put forward a Global Digital Security Initiative. We welcome the response from the US side, so that we can jointly maintain global digital and cyber security.
Q7: The US-China relationship is inching toward the danger of a conflict. What can China unilaterally do to deescalate the tensions in this relationship, so as to avoid conflict and confrontation between the two countries?
A: China has great sincerity in starting up a dialogue with the United States to deescalate the tensions in bilateral relationship. We will continue to work with the US side, as long as there are opportunities for cooperation. However, the cooperation between the two countries must be conducted in the principle of mutual respect. And the United States should not expect China's cooperation in areas where only the US has demand and interests, while neglecting or even undermining China's interests at the same time, in particular on these core issues concerning China's sovereignty and territorial integrity.
Here is the original post:
When Political Relationship Between Two Countries Turns Confrontational, It Is Impossible To Keep Other Spheres Intact Embassy of the People's...
How to keep your personal information from getting stolen – Wink News
FORT MYERS
Stolen identity can happen to anyone at any time.
In fact, a new report finds two-thirds of people will experience life-changing digital abuse.
There are a few simple things you can do to keep your personal information safe.
From widespread cyber attacks to fraudulent emails and texts, the web has many ways to grab what it needs from you. About 79% of internet users feel they have completely lost control of their personal data.
As we evolve in technology it has become more and more of an issue, said Regine Bonneau, CEO of RB Advisory and cyber security consultant.
How can you protect yourself?
First, download an identity protection system. Identity Guard, Identity Force and ID Shield rank in the top three, according to U.S. News and World Report.
Next, check your apps.
They can be used to bombard you with spam.
Some popular ones have come under fire for sharing your information.
Beware of opening weird emails to avoid phishing scams.
Finally, a simple step to keep you safe online is to update your devices regularly.
For more information:
Report identity theft and get a recovery plan Federal Trade Commission
USA.gov on identity theft
Federal Trade Commission Consumer Information
Link:
How to keep your personal information from getting stolen - Wink News
Apple says it has fixed newly discovered iPhone vulnerability – Silicon Valley
By Christopher Bing | Reuters
A cyber surveillance company based in Israel has developed a tool that can break into Apple iPhones with a never-before-seen technique used at least since February, internet security watchdog group Citizen Lab said on Monday.
The discovery is important because of the critical nature of the vulnerability, which affects all versions of Apples iOS, OSX, and watchOS, except for those updated on Monday.
The vulnerability exploited by the Israeli firm, named NSO Group, defeats security systems designed by Apple in recent years.
Apple said it fixed the vulnerability in Mondays software update, confirming Citizen Labs finding. However, an Apple spokesperson declined to comment regarding whether the hacking technique came from NSO Group.
Citizen Lab said it found the malware on the phone of an unnamed Saudi activist, which had been infected with spyware in February. It is unknown how many other users may have been infected.
The vulnerability comes from a flaw in how iMessage automatically renders images. IMessage has been repeatedly targeted by NSO, as well as other cyber arms dealers, prompting Apple to update its architecture. But that upgrade has not fully protected the system.
The security of devices is increasingly challenged by attackers, said Citizen Lab researcher Bill Marczak.
The U.S. Cybersecurity and Infrastructure Security Agency had no immediate comment.
Original post:
Apple says it has fixed newly discovered iPhone vulnerability - Silicon Valley
How Internet of Things Security Is Impacting Retailers – Loss Prevention Magazine
Internet of Things (IoT) security is a growing concern for retailers. IoT is one of the biggest trends in the market today, said Itzik Feiglevitch, product manager for Check Point Software Technologies at the RSA Conference in May 2021. Huge numbers of devices are expected to be added in the coming years to company networks.
And while Feiglevitch said theyre greatthey increase operational efficiency and move companies into the digital worlda retailer also needs to take into consideration that all of those IoT devices are now part of our networks, and they bring with them lots of security risks.
According to Check Points research, a typical enterprise of 5,000 employees could have as many as 20,000 IoT devices. I know it seems like a huge number, but think of all the IP TVs, printers, surveillance cameras, or the sensors inside the buildings, the smart elevators, smart lightingeverything is connected to the enterprise network.
IoT sensors are increasingly being used in retail to enhance the customer experience, such as with smart mirrors and digital signage; for insight into customer preferences and behavior; and for loyalty and promotionusing sensors to identify the time and place of the customer to better target assistance or incentives. Connected sensors are being used for managing energy and detecting equipment problems, especially in grocery, and in warehouses and stores to optimize supply and fulfillment, as with RFID and smart shelves.
The global internet of things in retail was valued at $31.99 billion in 2020 and is expected to expand at a compound annual growth rate of 26 percent from 2021 to 2028, according to market analysis by Grand View Research. IoT is expected to revamp the retail industry, transforming traditional brick and mortar shops into advanced digital stores, according to the report.
The surge in the number of interconnected devices in retail outlets and the decreasing prices of IoT sensors are expected to propel the growth. Retailers commitment to IoT innovation is contributing to the growth of connected devices, including both RFID tags and beacons and the proliferation of smartphones and the use of mobile applications are driving the retail software segment growth.
Problematically, many IoT devices are unmanaged. They are connected to our network, but we dont have any way to control those devices, to view them, and define what those devices can and cannot do inside our network, said Feiglevitch. If we go and search for those devices inside our security management system, we will not find those devices.
Most company-connected IoT devices are, in turn, connected to the wider internetto allow vendors to deliver updates, for example. Attackers, using standard scanning tools, can find those devices. They know what to look for, said Feiglevitch, noting that there are even search tools to help thema Google for IoT hackers, he said. A casual Shodan search will turn up nearly 300,000 surveillance cameras connected to the internet.
Once found, connecting to those devices, and hacking into them, tends to be quite easy, Feiglevitch warned. They often have no built-in Internet of Things security, run on legacy operating systems, have weak default passwords, and are difficult to patch. Many dont have basic security capabilities, he said. When many of those devices were developed, no one thought about that.
By accessing a device, hackers can manipulate itto view a camera, for exampleor use it, for crypto mining or as a bot for a botnet attack. It also can provide hackers a backdoor into the network because of an insecure connection. Users may not have the right knowledge about how to connect those devices, said Feiglevitch. Theyre using the wrong protocols and insecure applications, so through those devices, hackers can get into the network.
In exploitation tests, researchers have found it possible to create untold havoc, from taking over entire smart building systems to tricking medical devices to deliver incorrect doses of medicine, and while vendors typically issue patches, Feiglevitch says those often dont get implemented. Legacy, insecure devices are ubiquitous, he warned.
There are four pillars to address the risks that IoT devices pose to an organizations network, according to Justin Sowder, a security architect for Check Point.
In terms of solution design, Sowder advised that it should consist of three things: an IoT discovery engine; a solution that extracts information and ties it to security protocols; and a security gateway that enforces the security policies.
This flow should be completely automated: from a new device being connected or an existing device being discovered, to this Internet of Things security management that will extrapolate relevant data and tags to your security policies, and then down to an enforcement point, he said. It should be invisible to users, but discovery, protection, and enforcement in the security realm should nonetheless be happening, he said.
An automated solution is preferable, he believes, to a slower, more heavy-handed cyber security approach in which all new devices are assigned a ticket and vetted and managed. That only encourages shadow IT, he warned.
The need for retailers to have a robust process for gaining control over IoT devices is only growing, as IoT devices proliferate and there is increasing reliance on field devices that communicate back to network data centers. That the infrastructure used to enable IoT devices is beyond the control of both the user and the IT department underscores that risk.
Research indicates that some organizations fail to define exactly who are the leaders in charge of assessing and mitigating risk. Experts suggests that retail organizations may want to consider appointing a Chief IoT Officer since many projects lie outside of the domain of a CIO and IT department.
IoT isnt an IT project. Its a business project that uses IT, noted one panelist at an IoT session at a LiveWorx tech conference. Another agreed, saying that IT security professionals should be prepared to share Internet of Things security responsibility with other divisions across the enterprise, including physical security teams.
See more here:
How Internet of Things Security Is Impacting Retailers - Loss Prevention Magazine
TiECON East’s Track-1 to Focus on Cyber Security, Internet of Things and AI With Respect to 5G – India New England
BOSTON TiE Boston, one of the regions largest and oldest organizations supporting the Massachusetts entrepreneurial ecosystem and connecting entrepreneurs, executives, and venture capitalists, unveiled names of speakers and topics for Track-1 of its annual TiECON East conference.
Track-1 will focus on Cyber Security, Internet of Things and AI With Respect to 5G. INDIA New England News will bring info on other three tracks during upcoming weeks. The annual TiECON East conference, which is organized by TiE Boston and scheduled for Oct. 1, 2021 at the Westin Hotel in Waltham, MA, is the largest conference of and for entrepreneurs and business executives in the Northeast.
Major sponsors of the conference are Amazon, Microsoft, Vertex Pharmaceuticals, Arent Fox, Converge, Sittercity, Innospark, Thread Research, Progress and Embark.
Details on Track-1:
IoT (Internet of Things)
In the past decade, there has been an explosion of connected devices forming the IoT, which has promised to transform entire industries via digital twins, preventative maintenance, and new data sets. And yet, the IoT isnt as ubiquitous as we may think. Significant barriers to adoption persist. Hear from panelists at the forefront of deploying IoT systems at scale. Learn how theyre handling the technical challenges and justifying the RoI to these deployments.
Cybersecurity
From cities going offline and gas lines shutting down to data leaks and health system breaches you have likely heard of the impact cyber has had across the public, private and social sectors. No industry has been immune to its effects, and it has only increased in importance over time. In fact, recent reports show that hackers attack a computer in the U.S. every 39 seconds. Given we are all dealing with new cyber-attacks every day from the dark web, our panel will focus on hearing from the experts on cyber who spend most of their waking hours (and nightmares) thinking about how to protect data, technology, processes and people from cyber risks. We will hear about how traditional cybersecurity models put sand in the gears of digital programs and enterprises.
ML in 5G
The intersection of AI and 5G is ripe with opportunity. As more data at higher volumes becomes accessible, entirely new AI use-cases, trends, and business models will emerge. In this session, well explore the topics of 5G and AI, and discuss potential use-cases and business impacts. In addition, the panelists will discuss the potential business and ethical risks of these new applications.
Here is the list the speakers and moderators of Track-1:
For more information about TiECON East, please click here.
To buy ticket for the day-long conference, please click here.
Wrapping Up What Does The Internet Know About Me? | Avast – Security Boulevard
I started this year with a deceptively simple question: What does the internet know about me? I wanted to do a deep dive into the privacy policies and data collection practices of the digital products that I use the most, in order to figure out what pieces of myself Ive been unwittingly giving away in the 25 years Ive been online. And, perhaps more importantly, I wanted to know if there was anything I could do about it.
What I found over these past eight months was both shocking and not. Shocking, because I think its important that we all keep being at least a little bit shocked at what companies get away with when it comes to privacy-violating data collection. Shocking, because its scary to realize that the internet essentially knows everything about me, from my heartbeat to my address to who walks up to my front door. Not shocking, because as my friend who sparked this idea for me said I kind of just assume everything I do online is tracked.
While most of what the internet knows about me feels fairly mild, there were some slightly salacious bits of info that I realized. For example, I use an Oura ring as a fitness tracker and because it tracks body temperature, it could theoretically know if I was pregnant, had Covid, or even had too much to drink one night. (Same goes for my Eight bed, which also tracks body temperature.)
Theres no guarantee that they do know those things, but there are cases of apps and services knowing about pregnancies and serving related ads, for example, before the person experiencing the pregnancy was ready to share. So its a fair bet that they could figure it out if they wanted to.
I also realized something kind of surprising about myself: Im willing to give up more personal information than I realized. As my conversations with my friend illustrated, theres a certain normalization around online data tracking and collection, at least in the US. Weve been trained to accept this model of the internet as inevitable and our general apathy toward data collection and protection reflects that.
But that doesnt mean Im wrapping up What Does the Internet Know About Me? by throwing my hands up in the air and releasing all of my personal information into the Dark Web myself. Because despite the negatives I came across, there were also a lot of positive signs that the tide is turning when it comes to online privacy.
For example, the vast majority of privacy policies that I read (and I read a lot), were surprisingly clear and comprehensive. They were written in plain English, had clear sections, and utilized a minimum of tricky legal language. I appreciate that a lot and also know that it hasnt always been the case.
I also saw firsthand how legislation can make a huge difference when it comes to how much or how little that were asked to give up in exchange for access to sites and services. I live in California but Avast is based in Europe, so I made a point to look at companies policies for the California Consumer Privacy Act (CCPA), General Protection Regulation (GDPR) in Europe and everyone else.
I found that many sites and companies have multiple sets of rules, based on where you live. That means I have more rights than my colleagues who live in North Carolina, for example, and my colleagues in the EU and the UK have even more than I do. So while the internet has no borders, the laws we enact for it certainly do.
That plus the fact that many of these companies have ways to easily delete your data (or limit their collection) gives me some hope. I think were in the midst of a massive shift away from this data-sucking model to which weve all become accustomed. I dont know where that shift will leave us but Im hopeful that its going to be somewhere better than where we are today.
See the original post:
Wrapping Up What Does The Internet Know About Me? | Avast - Security Boulevard
Former head of the U.S. Cyber Command and Director of the NSA Michael Rogers Joins NetAbstraction as Chairman of Advisory Board – Johnson City Press…
CHANTILLY, Va, Sept. 8, 2021 /PRNewswire/ --NetAbstraction, the security by obfuscation company, today announced that retired Admiral Michael Rogers, former head of the U.S. Cyber Command and director of the National Security Agency has been appointed Chairman of the company's Board of Advisors. Admiral Rogers will provide oversight to the company's advisors on matters of product, technology and corporate strategy.
"NetAbstraction has developed unique defensive technology that enables organizations to evade many forms of attack from both financially motivated criminals and more sophisticated adversaries," said retired Admiral Michael Rogers. "I look forward to working with the company's board of advisors and management team to help make their obfuscation products a mainstay for security conscious companies."
Michael S. Rogers, a former United States Navy admiral, served as the second commander of the United States Cyber Command(USCYBERCOM). He also served as directorof the National Security Agency (NSA) and as chief of the Central Security Service(CSS). Previously, Rogers was Commander of the Tenth Fleet and Commander of the United States Fleet Cyber Command. During his tenure, he helped transform and unify the U.S. Cyber Command, and bolster the DoD's cyberspace capabilities and expertise.
"Admiral Rogers has been one of the most influential figures in the history of the US Cyber Command and helped reshape the country's cyber defense capabilities," said Gordon Lawson, CEO of NetAbstraction. "It's a privilege and an honor to welcome him as Chairman of our Board of Advisors. His career experiences fighting the world's most sophisticated cyber adversaries will be invaluable as we drive adoption among businesses and government agencies for NetAbstraction's obfuscation technology."
About NetAbstraction
NetAbstraction enables organizations to protect the privacy and security of identities and systems by intelligently selecting and obscuring global network pathways on the Internet.The company's founders previously designed, created and implemented clandestine telecommunication networks for the NSA and CIA. NetAbstraction is used by Fortune 500 organizations globally to ensure their cyber operations remain secure, anonymous, and non-attributable. For more information visit https://netabstraction.com/, and follow us on LinkedInand Twitter.
View original content to download multimedia:https://www.prnewswire.com/news-releases/former-head-of-the-us-cyber-command-and-director-of-the-nsa-michael-rogers-joins-netabstraction-as-chairman-of-advisory-board-301370680.html
SOURCE NetAbstraction
Originally posted here:
Former head of the U.S. Cyber Command and Director of the NSA Michael Rogers Joins NetAbstraction as Chairman of Advisory Board - Johnson City Press...
Congress Is Warning That the Federal Government Remains Vulnerable to Cyberattacks – Lawfare
Over the past year, Russia and the Peoples Republic of China conducted successful cyber espionage campaigns against federal agencies, compromising some of the United States most sensitive information.
The American public may wonder why federal networks remain vulnerable to serious data breaches despite the government spending billions on cybersecurity programs. But new reports from key congressional committees reveal lawmakers apparent concerns that the Department of Homeland Securitys key cybersecurity technologies are insufficient to guard against nation-state attacks.
The House Appropriations Committee included alarming language in its report accompanying the fiscal year 2022 funding bill for the Department of Homeland Security, which passed the committee last month. The Committee is increasingly concerned with the ability of adversaries to circumvent and use existing cybersecurity solutions to gain access to critical systems and data, the report notes. The appropriators requested more information from Homeland Security about the departments main cybersecurity technology programs to understand if they are working as well as an examination of emerging technologies that could improve the governments data security and protection."
In August, the Senate Homeland Security and Governmental Affairs Committee, led by Sens. Gary Peters and Rob Portman, issued a bipartisan staff report reviewing the state of the federal governments cybersecurity. The news wasnt good. Across the federal government, the committee found that large agencies were earning a grade of C- and that agencies had made little progress since 2019. The Senate panel also detailed major weaknesses in the Department of Homeland Securitys technology programs. [The departments] flagship cybersecurity program for Federal agenciesthe National Cybersecurity Protection System (NCPS), operationally known as EINSTEINsuffers from significant limitations in detecting and preventing intrusions, committee staff warned.
These congressional committees and panels, which are responsible for funding and overseeing federal cybersecurity, are raising serious concerns that should be a wake-up call to the American public. The federal governments secrets and the publics data remain at risk. A closer look at the Department of Homeland Securitys cybersecurity technology projects shows that taxpayers have been spending billions on insufficient cybersecurity technologies despite long-standing concerns.
A Closer Look at Homeland Securitys Cybersecurity Technology Programs
The Department of Homeland Security operates two main technology programs intended to help secure federal civilian agencies.
Launched in 2012, the Continuous Diagnostics and Mitigation (CDM) program is aimed to help federal civilian agencies and the administration improve cybersecurity by supplying tools that provide visibility across agency networks, reduce threat surfaces, and modernize compliance with federal information security rules and reporting to the Office of Management and Budget. Through the CDM program, the Department of Homeland Security helps agencies deploy these tools, including agency dashboards, by using shared services through federal contract opportunities coordinated by the General Services Administration. The Government Accountability Office (GAO) estimates that the program has cost more than $10 billion to date.
The Einstein program, which began in 2003, is an intrusion detection and prevention system intended to filter traffic entering federal civilian agency networks and block potential attacks. Homeland Security uses information about potential threat actors, including from classified sources, and partners with internet service providers to provide a basic perimeter defense for civilian agencies. Despite an estimated lifecycle cost of more than $6 billion, the Department of Homeland Security warns that the Einstein program is not a silver bullet and will never be able to block every cyber attack.
One reason why Einstein provides only a basic filter of perimeter defense is that it is currently designed to spot and block known threats. Just as the police would not have fingerprints to identify a burglar they had never seen before, [the Einstein program] generally cannot detect a hacker no one has seen before, the Senate committee warns. Even known hackers can take easy steps to disguise their fingerprintschanging their tactics, techniques, and procedures as easily as a burglar might don gloves.
Congress has been concerned about these weaknesses in the Einstein program for years. In 2015, Congress passed a law requiring the Department of Homeland Security to test and update the Einstein programs technologies to improve its detection capabilities. But as of 2018, the GAO found that the department was still years away from having the ability to assess agency network activity and identify any anomalies that may indicate a cybersecurity compromise as Congress required back in 2015.
The costly CDM program also has a mixed track record. A 2020 GAO audit of three agencies attempts to deploy CDM found that the agencies had only partly deployed the technology tool. As a result, the information on their agencies dashboards was incomplete. A recent Office of the Inspector General review of Homeland Securitys own implementation of CDM identified big problems, despite the department spending $180 million on the project and being in charge of managing the program for other civilian agencies. The watchdog found that Homeland Security components were not using CDM services effectively. Until these capabilities are complete, the inspector general warned, the Department cannot leverage intended benefits of the dashboard to manage, prioritize, and respond to cyber risks in real time.
Even the Department of Homeland Security has acknowledged these key cybersecurity technologies may need to be updated. A Cybersecurity and Infrastructure Security Agency (CISA) official recently testified that Einsteins technology, which was designed a decade ago has grown somewhat stale over time and does not provide the visibility that CISA needs.In January, Homeland Security Secretary Alejandro Mayorkas committed to reviewing both the CDM and Einstein programs to determine if they are the right technologies to protect against current threats.
Looking Forward and Lessons Learned
If there is any good news in these developments, its that theres growing bipartisan focus on updating the federal governments apparently outdated cybersecurity technologies.
The recent congressional reports provide clues about what technologies and strategies may be coming next. The House Appropriations Committees report directs the Department of Homeland Security to study emerging technologies such as data shielding and immutable logging of suspect activity, instant threat and anomaly detection, and user behavior analytics as options to improve federal data security. The Senate Homeland Security and Governmental Affairs Committee report recommends that the department present a plan to update the Einstein program and justify its costs, while also recommending that the department help federal agencies use commercial off-the-shelf products and services for endpoint detection and other cybersecurity needs.
But the federal governments long-standing challenges to acquire the necessary technology to improve its cybersecurity posture or to comply with basic federal information security laws highlights bigger, strategic questions for Congress.
For starters, is the federal governments current organizational approach to cybersecurity appropriate? Responsibilities for securing federal data are decentralized with no single agency or office in charge. CISA has been assigned growing operational responsibilities over the past decade. But the agency also has many competing responsibilities and remains a component within the Department of Homeland Security, where cybersecurity remains just one of several pressing national security missions. National Cyber Director Chris Inglis, who was recently confirmed to lead the newly formed office, is well positioned to set governmentwide strategy and policy. But his office currently has limited funding and staffing. Congress should consider whether his office needs greater authority and resources to lead.
Congress should also consider whether the federal governments laws and policies for managing major technology acquisitions programs allow agencies to appropriately adapt and keep pace with dynamic security challenges. At the same time, Congress and the administration must redouble ongoing efforts to attract the right talent and personnel into federal agencies and congressional offices to better inform policymakers about how to manage cyber risks and appropriately oversee these complicated issues.
Whats apparent from recent major data breaches and the federal governments ongoing challenges to defend its own networks is that the current approach isnt working. Addressing the immediate technological vulnerabilities should be the top priority. But lawmakers shouldnt delay answering the larger strategic questions about why the federal government has struggled with cybersecurity for so long.
The rest is here:
Congress Is Warning That the Federal Government Remains Vulnerable to Cyberattacks - Lawfare
What is DNS and how does it work? – TechRadar
The Domain Name System (DNS) is the index of the internet. When you browse to domain names like facebook.com or twitter.com, your device uses DNS to look up the IP addresses (e.g. 212.100.66.113) it needs to load those resources.
It's a simple idea, but one that has a huge effect on many areas of your internet life. In this article we'll talk more about how DNS works, and why it's important to your internet speeds, privacy, security and more.
Connect to the internet and your ISP normally assigns you at least two DNS servers (there's a spare in case the primary server fails). Every time you enter a new domain in your browser, your device sends a query to the primary DNS server, which translates it to the IP address you need.
Although this looks simple from your point of view, your ISP's DNS server (technically, a DNS recursor) must work with several other servers to make this happen.
The recursor first sends a request to a DNS root server. This looks at the extension of the domain (.com, .net, .org and so on) and returns the address of a Top Level Domain (TLD) nameserver which handles that domain type.
Your ISP's recursor then sends your query to the TLD nameserver, which passes back the authoritative nameserver for that domain.
Finally, the recursor sends your query to the authoritative nameserver, the one holding the actual record for this website.
This final DNS server returns the domain IP address to the recursor, which passes it back to your device. Finally, your browser can connect to it and begin accessing the site.
DNS queries are surprisingly fast, even though there's so much happening under the hood. Smart optimization and minimal bandwidth use means that a fast server close to you can return an IP in under 10 milliseconds.
Other DNS servers might take more than 100 milliseconds, though, and that's when DNS speed begins to make a noticeable difference. Especially as a single website might load resources from many domains.
If you access bigsite.com, for instance, it might load images from one server, scripts from another, adverts from several providers, social networking buttons for various platforms, and who knows what else. Every new domain requires another DNS query before you can access that resource... and they all add up.
Apps and devices reduce the impact of DNS queries by storing the IP addresses in a cache, and using them again for future connections.
On PCs, for example, DNS query results are stored by the browser and the operating system. You might wait a whole second for DNS queries on your first visit to bigsite.com, but visit another page on the site and your device uses the logged IP addresses for a near instant response.
DNS caches are normally lost when an app closes or your device restarts, so any DNS query delay will be back in your next session, just for the first visit to a site. But caching is still a worthwhile scheme which makes websites feel snappier and more responsive.
DNS servers are hugely powerful, as they have full control over the websites you can access. If a server doesn't want you to access a domain, it can filter out that request: return an error rather than an IP address, and you won't be able to browse the site.
DNS filtering is often a very good idea. It can block malicious or phishing websites, maybe restrict access to adult or other child-unfriendly sites (so great as part of a parental controls setup).
Other DNS filtering uses range from irritating to seriously scary. Your school Wi-Fi might block access to social media or streaming websites, for example, leaving you working out ways to unblock YouTube and others. And at the more worrying end of the scale, repressive governments can use DNS and other network trickery to keep their populations away from information they'd prefer to hide - it's no wonder guides to using WhatsApp in China are so well searched.
There are privacy and security concerns, too. If whoever runs the DNS server knows who you are (your ISP, say), it could log all the sites you visit to build a browsing history. A malicious hotspot operator might even detect users visiting a banking site, then redirect them to a fake site and steal their details.
Fortunately, there is a way to fight back. Connect to a VPN and your DNS queries are redirected through an encrypted tunnel to the VPN server, and handled there. With no way to see what you're doing, the network can't block you, and you're free to browse as normal.
Switching DNS servers isn't just for countries where you go to prison for registering thegovernmentsucks.com. Changing to another DNS provider can bring real benefits to everyone.
Some servers are optimized for speed. As we write, for instance, Benchmarking site DNSPerf lists 10 public DNS resolvers with average query times ranging from 14ms to almost 140ms. If your server is at the bottom end of that list, switching to something better could make a real difference.
As we've mentioned, other DNS servers can filter content to block ads, trackers, malicious, phishing or family-unfriendly sites, depending on your needs. This can be a really effective idea as it automatically protects all your apps, with no need to install any other software.
Switching DNS isn't a good idea for everyone. Some parental controls, antivirus and internet security apps already replace your DNS servers with their own, and switching to something else means you'll lose at least some of their protection.
If you're interested, though, some of the fastest DNS servers around are available for free. Check our best DNS server guide for more.
Read more:
Today's best overall VPNs in full:
See the original post:
What is DNS and how does it work? - TechRadar