11/30/2012

Syrian Internet Is Off The Air –and UPDATE

By James Cowie on November 29, 2012 8:31 AM |
Click for latest update: 01:00 GMT Friday.
Starting at 10:26 UTC on Thursday, 29 November (12:26pm in Damascus), Syria's international Internet connectivity shut down. In the global routing table, all 84 of Syria's IP address blocks have become unreachable, effectively removing the country from the Internet.
We are investigating the dynamics of the outage and will post updates as they become available.
Update (15:45 UTC)
last_5_Syrian_outages-thumb-300x257-807 Looking closely at the continuing Internet blackout in Syria, we can see that traceroutes into Syria are failing, exactly as one would expect for a major outage. The primary autonomous system for Syria is the Syrian Telecommunications Establishment; all of their customer networks are currently unreachable.
Now, there are a few Syrian networks that are still connected to the Internet, still reachable by traceroutes, and indeed still hosting Syrian content. These are five networks that use Syrian-registered IP space, but the originator of the routes is actually Tata Communications. These are potentially offshore, rather than domestic, and perhaps not subject to whatever killswitch was thrown today within Syria.

11/27/2012

ISIS Europe Publications – November 2012

European Union
European Union (Photo credit: Wikipedia)
Posted on 26/11/2012
ESR no 62 – The impact of climate change on international security: prospect for an environmental dimension in CSDP missions
Climate change has until now only received limited attention from national governments, EU policymakers and analysts in the framework of international security. A European Parliament report entitled “The Role of the CSDP in case of climate driven crises and natural disasters” was adopted on 23 October 2012. This is a timely moment to provide some clarification and insight on how climate change can impact international security and to describe the position of the international community, especially the European Union (EU).The present Security Review focuses on the definition of a new challenge for international and regional cooperation, military and civilian, in order to target the main problems and thus, to find adequate political, strategic and institutional responses. The impact of climate change is not a problem the international community has to tackle in the future but today.

Iran dismisses severity of Narilam malware

The Search Results that showed every page had ...
The Search Results that showed every page had malware (Photo credit: mary hodder)
Summary: Government officials say Symantec's report on the recently discovered Narilam malware, targeting Iran, shows "some misunderstanding" and play down significance and severity of the worm.
By Ellyne Phneah | November 27, 2012 -- 08:55 GMT (00:55 PST)
Iraninan authorities have played down the severity of the Narilam malware for which Symantec issued a warning last week. 
A blog post by the U.S. security giant warned organizations of potential "chaos" posed by the W32.Narilam malware, and posted a map identifying Iran as the main victim of the threat. The malware reportedly copies itself on infected machines, adds registry keys and spreads through removable drives and network shares. It has been likened to previous high profile virus, Stuxnet, which hit several networks in the Middle East, particularly, Iran.

Putting Cyber Warfare Into Perspective

A Venn diagram illustrating one of the weaknes...
A Venn diagram illustrating one of the weaknesses of the Turing test. (Photo credit: Wikipedia)
By Oliver Rochford on November 19, 2012
The Greatest Problem With the Perception of Cyberwar is That it is a Separate Thing to Conventional Warfare. That is Just the Novelty Factor.
As we celebrated what would have been Alan Turings one hundredth Birthday this year, much focus was placed on his contributions to computing. Google’s homage on June 23 cites his work on the Turing Machine and the Turing Test in particular. Yet the impact of his work at Bletchley Park during World War II was summarized with “His work deciphering secret codes drastically shortened World War II”.
This pattern was repeated in many of the blogs, articles and obituaries that were published in honor of Turing. There seemed to be a definite bias in the industry and community on the technical details of his mathematical and computing work, as opposed to their actual impact at the time. I am not sure if many of his compatriots that lived through and fought in the war would have agreed with this value judgement. His efforts not only saved countless lives – but may have actually contributed to the allies winning the war. It is difficult to assess how history would have played out without him, and although such speculation is beyond the scope of this article, it is worth mentioning as it highlights a bias in the information security community regarding war and warfare. Most of us are not war nerds; we are techies at heart.

11/15/2012

Bullets, Pirates and Risk Management

November 14, 2012
Piracy off the coast of Somalia has dropped off dramatically in 2012. Successful hijackings of American and other ships has decreased from 31 in 2011 (and 49 in 2010) to only four so far in 2012. clip_image002
Unsuccessful attacks have also decreased, falling from 199 reported attacks in the first nine months of 2011 to 70 attacks over the same span in 2012 — a 65 percent drop.
However, diminished activity has not resulted in a decrease in the cost of sailing around the Horn of Africa.
Pressure continues to mount on International trade partners to increase the security of their vessels passing through these once heavily pirated trade routes. The risks of shipping goods through these waters increased to a point where excessive defensive means were necessary, both politically and militarily.
But risk avoidance has come at a high cost.
Many factors have contributed to the decrease in pirate hijackings in 2012. One factor is that shipping companies have begun equipping their ships with countermeasures, namely armed guards.

11/10/2012

Turn Big Data into Meaningful Data to Prevent Cyber Attacks

English: A candidate icon for Portal:Computer ...
English: A candidate icon for Portal:Computer security (Photo credit: Wikipedia)
Posted by Bill Gerneglia Contributed By GlobalDataGuard.com 
Advanced Behavioral Analysis and Correlation can deliver risk-based, prioritized, actionable insight to handle Advanced Persistent Threats
Using big data analytics for network security requires monitoring and analyzing massive amounts of data to discover hard-to-detect, suspicious network activity to deter increasingly complex Advanced Persistent Threats (APTs).  These APTs are carried out patiently over time by professional cyber-thieves who maneuver around traditional defenses, such as firewalls, intrusion prevention and anti-virus software, to steal valuable or sensitive data.
However, using big data – the mountain of info on the order of petabytes typically captured from computer network log files, flow data, and IP traffic – is only a means to an end.  The goal is to turn that mass of information into risk-based, prioritized, actionable insight that can be used to improve network security now and into the future.  This includes meeting the challenges of new and evolving intrusion techniques.

Workshop on Cyber Risk Management, including The Impact of the Recent SEC Advisory on Material Cyber Risk

English: The Risk Management Process for IT Sy...
English: The Risk Management Process for IT Systems according to ENISA, following ISO 27005 (Photo credit: Wikipedia)
Saturday, 10 November 2012
Workshop on Cyber Risk Management, including
The Impact of the Recent SEC Advisory on Material Cyber Risk
Announcing a workshop in NY focused on discussing the
Cyber Risk Management Best Practices of Financial Services – Brought to you by:
Internet Security Alliance, Aerospace Industries Association, National Association of Manufacturers,
Union of Concerned Cybersecurity Leaders, & the Financial Services Information Sharing and Analysis Center
Abstract: It is well known that corporate assets and systems are increasingly being subjected to cyber attacks based on a multitude of motives, ranging from profit, competitive advantage, revenge, punishment, and even conflict advantage.

Symantec: Madware, Ransomware Threats to Watch in 2013

English: The diagram of DuQu from Symantec.
English: The diagram of DuQu from Symantec. (Photo credit: Wikipedia)
Web and mobile security services vendor Symantec released its predictions for security trends in 2013. Find out below what the company has to say on madware, "the new scareware," the looming threat to social networks, and more.
1. Cyber conflict becomes the norm.
In 2013 and beyond, conflicts between nations, organizations, and individuals will play a key role in the cyber world.
Espionage can be successful and also easily deniable when conducted online. Any nation state not understanding this has been given many examples in the last two years. Nations or organized groups of individuals will continue to use cyber tactics in an attempt to damage or destroy the secure information or funds of its targets. In 2013, we will see the cyber equivalent of saber rattling, where nation states, organizations, and even groups of individuals use cyber attacks to show their strength and "send a message."
Additionally, we expect more attacks on individuals and non-government organizations, such as supporters of political issues and members of minority groups in conflict.

Creating Cyber Warfare Warriors

Headquarters of the NSA at Fort Meade, Marylan...
Headquarters of the NSA at Fort Meade, Maryland. Español: Instalaciones generales de la NSA en Fort Meade, Maryland. Русский: Штаб-квартира АНБ, Форт-Мид, Мэриленд, США (Photo credit: Wikipedia)
By Shawn Neisteadt
Published: November 9, 2012, 10:00 PM  MADISON, SD -
Cyber warfare isn't just a Hollywood plot line. It's real. The United States is ramping up protection against a growing number of attacks on federal defense and security networks. If successful, foreign attackers could severely cripple those networks, leaving the nation vulnerable.
A quiet basement computer lab on the campus of Dakota State University in Madison doesn't look all that exciting.  But those who use this room affectionately call it the "hacker lab" and they don't mind being called hackers.

11/09/2012

Blackout Bottlenecks

Where the Internet is stored
Where the Internet is stored (Photo credit: debs)
November 8, 2012: The recent four day blackout in lower Manhattan (New York City) brought to light a little known Internet bottleneck. The eleven fiber optic cables from Europe to the United States all pass through two facilities in the blackout area. One facility is at 16th Street and 8th Avenue and the other is three kilometers (two miles) to the south on Hudson Street. These places also contain servers for many major Internet sites. Both facilities had backup generators and fuel supplies to keep them going until the power was turned back on. If both facilities were knocked off line, most Internet users in the United States would notice momentary difficultly in reaching web sites in Europe and, until those two sites were back in operation, everyone would find that it took longer (seconds or more) to reach web sites outside the United States.

11/07/2012

Future of war: bioweapons, cyber-warfare, mind-control and more

English: This was the most up-to-date DARPA lo...
English: This was the most up-to-date DARPA logo as of January 2009. It is obsolete now. (Photo credit: Wikipedia)

Dick Pelletier  Ethical Technology

In The American Way of War, historian Russell Weigley describes a grinding strategy of destruction employed by the U.S. military over the last 150 years. To end the Civil War, Grant felt he had to destroy lee’s soldiers; in World War I, Pershing relentlessly bombarded and wore down Germany’s proud fighting machine; and the Army Air Corps pulverized major German and Japanese cities to win World War II.
These wars were not won by tactical or strategic brilliance but by the sheer weight of numbers; the awesome destructive power only a fully mobilized and highly industrialized democracy can bring to bear. In these conflicts, U.S. armies suffered and inflicted massive casualties. Our ability to both inflict and endure such casualties more effectively than could our adversaries ultimately resulted in victory.

9/30/2012

Dissecting 'Operation Ababil' - an OSINT Analysis

Friday, September 28, 2012
Provoked by a questionable online video posted on YouTube, Muslims from the around the world united in an apparent opt-in botnet crowdsourcing campaign aiming to launch a DDoS (denial of service attack) against YouTube for keeping the video online, and against several major U.S banks and financial institutions.
Dubbed "Operation Ababil", and operated by the Izz ad-Din al-Qassam a.k.a Qassam Cyber Fighters , the campaign appear to have had a limited, but highly visible impact on the targeted web sites. Just like in every other crowdsourced opt-in botnet campaign such as the "Coordinated Russia vs Georgia cyber attack in progress", the "Iranian opposition launches organized cyber attack against pro-Ahmadinejad sites", the "Electronic Jihad v3.0 - What Cyber Jihad Isn't" campaign, and the "The DDoS Attack Against CNN.com" campaign, political sentiments over the attribution element seem to have orbited around the notion that it was nation-sponsored by the Iranian government.
What's so special about this attack? Did the individuals behind it poses sophisticated hacking or coding abilities? Was the work of hacktivists crowdsourcing bandwidth, or was it actually sponsored by the Iranian government? Can we even talk about attack attribution given that the group claiming responsibility for the attacks doesn't have a strong digital fingerprint?
In this post, I'll perform an OSINT (open source intelligence) analysis aiming to expose one of the individuals part of the group that organized the campaign, spread their propaganda message to as many Muslim Facebook groups as possible, and actually claim responsibility for the attacks once they took place.
The campaign originally began with a message left on Pastebin.com by the Qassam Cyber Fighters group announcing "Operation Ababil":
clip_image002
The original message left is as follows:
"Operation Ababil, The second weekIn the previous announcements we stated that we will not tolerate insulting exalted character of the prophet of mercy and kindness.

9/27/2012

What 371 metric tons of uranium hexafluoride could mean to Iranians

Iranian newspaper clip from 1968 reads: "...
Iranian newspaper clip from 1968 reads: "A quarter of Iran's Nuclear Energy scientists are women." The picture shows some female Iranian PhDs posing in front of Tehran's research reactor. (Photo credit: Wikipedia)



Why it might matter that Shirley Tilghman is leaving Princeton, Pete Mansoor’s vexing book vetting problem, and more.
SEPTEMBER 27, 2012
Welcome to Thursday's edition of FP's Situation Report, where replacement refs are never an option. Follow me @glubold or hit me anytime at gordon.lubold@foreignpolicy.com.
Lost in the debate on Iran is the human cost of a strike against the country's nuclear sites, according to a new report published by an Iranian-American with a background in industrial nuclear waste and chemicals. Khosrow Semnani argues in "The Ayatollah's Nuclear Gamble," that striking Iran's nuclear facilities, where the IAEA has verified an inventory of 371 metric tons of uranium hexafluoride, could have devastating effects on tens of thousands, and possibly hundreds of thousands of Iranians, who would be exposed to highly toxic chemical plumes and even radioactive fallout.

9/14/2012

Business intelligence, Mobile and Cloud top technology priority list for Asian CIO’s: survey

English: Diagram showing three main types of c...
English: Diagram showing three main types of cloud computing (public/external, hybrid, private/internal) (Photo credit: Wikipedia)


Mobility News  CBR Staff Writer Published 14 September 2012
Asian CIO's business and technology priorities are aligned with their global counterparts
Business intelligence and analytics, mobile technologies and cloud computing top the technology priority list for Asian chief information offiers (CIO) this year, according to the 2012 Gartner Executive Programs (EXP) CIO Agenda survey.
Gartner EXP group vice president for Asia Pacific Linda Price said that the priorities of CIOs in Asia were becoming more closely aligned with those of their global counterparts.
"This is the first time that we've seen such a tight alignment and I think it shows that Asia and the rest of the world are becoming one," Price said.
"Globalization is really having a huge impact on the global CIOs' view of business."
Asian CIO's business and technology priorities are aligned with their global counterparts, with a few differences.

An Army Introduction to Open Source Intelligence

United States Department of Defense
United States Department of Defense (Photo credit: Wikipedia)


September 13th, 2012 by Steven Aftergood

A new U.S. Army publication provides an introduction to open source intelligence, as understood and practiced by the Army.
“Open-source intelligence is the intelligence discipline that pertains to intelligence produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence and information requirement,” the document says.
“The world is being reinvented by open sources. Publicly available information can be used by a variety of individuals to [achieve] a broad spectrum of objectives. The significance and relevance of open-source intelligence (OSINT) serve as an economy of force, provide an additional leverage capability, and cue technical or classified assets to refine and validate both information and intelligence.”
See “Open-Source Intelligence,” Army Techniques Publication (ATP) 2-22.9, July 2012.
The new manual is evidently intended for soldiers in the field rather than professional analysts, and it takes nothing for granted.  At some points, the guidance that it offers is remedial rather than state of the art.

7/24/2012

Cyber Warfare: Iran's Nuclear Computer 'Forced to Play AC/DC' by Computer Malware

By Gianluca Mezzofiore July 24, 2012 10:50 AM GMT
clip_image002
AC/DC's Johnson and Young perform in London (Reuters)
A computer malware has allegedly attacked computer systems in Iran forcing them to play AC/DC's Thunderstruck at full volume in the middle of the night, according to a computer security researcher.
Mikko Hypponen, lead researcher at the Finnish computer security firm F-Secure, reported in his blog that a scientist working at the Atomic Energy Organisation of Iran (AEOI) sent him an e-mail about his systems getting hit by a cyber-attack.
"I am writing you to inform you that our nuclear program has once again been compromised and attacked by a new worm with exploits which have shut down our automation network at Natanz and another facility Fordo near Qom," reads the email.
"According to the email our cyber experts sent to our teams, they believe a hacker tool Metasploit was used," it continued.
Metasploit, an open-source project used to find vulnerabilities in software, is reportedly very easy and cheap to develop.
"There was also some music playing randomly on several of the workstations during the middle of the night with the volume maxed out," the e-mail reads. "I believe it was playing 'Thunderstruck' by AC/DC." <1--more-->
Hypponen said he has verified the e-mail was sent from Iran's AEOI. It is not the first time the well-known computer virus hunter receives e-mails form Iranian authorities. During the Flame spyware case, he reported in Wired about how an Iranian computer security analyst had contacted him to notify him about the virus.
Speaking to IBTimes UK at F-Secure's security lab in Helskinki, Hypponen maintained that a covert US government intelligence agency was behind Flame.
Flame was discovered in June having gone undiscovered for at least two years, thanks to the sophistication of the software involved.
It has been described as one of the most complex pieces of malware ever discovered. Flame infected computers in the Middle East, in countries such as Iran, Israel and Sudan, with the majority of infected computers, according to Kaspersky's data, being in Iran.
Calling it the James Bond of the malware world, Hypponen admitted his company's was impotent against Flame. It allowed those who created it to search for and upload documents and files on a remote computer, watch and listen to what's taking place around the infected PC by turning on the camera or microphone, and even copy the address book from mobile phone within range of the computer.
Unlike Metasploit, Flame cost $10m to develop.
Read more:
http://www.ibtimes.co.uk/articles/366158/20120724/ac-dc-iran-malware-flame-metasploit-hypponen.htm
Enhanced by Zemanta

SOUTH ASIA INTELLIGENCE REVIEW--Volume 11, No. 3, July 23, 2012

Weekly Assessments & Briefings

Volume 11, No. 3, July 23, 2012

clip_image002clip_image003
clip_image002[1]
Data and assessments from SAIR can be freely published in any form with credit to the South Asia Intelligence Review of the
South Asia Terrorism Portal
ASSESSMENT
· INDIA: Maharashtra: Red Subversion in Gadchiroli - Ajit Kumar Singh & Deepak Kumar Nayak
· NEPAL: Uncertain Calm - Fakir Mohan Pradhan
clip_image004
INDIA
Maharashtra: Red Subversion in Gadchiroli
Ajit Kumar Singh
Research Fellow, Institute for Conflict Management
Deepak Kumar Nayak
Research Assistant, Institute for Conflict Management
Located in the north-eastern part of the State, and bordering the most troubled areas of neighbouring Chhattisgarh, Gadchiroli has, for long, been reeling under Communist Party of India-Maoist (CPI-Maoist) violence. Abruptly, however, it appears to have been brought under an intensive and complete siege by the rebels. Mass resignations of elected representatives in recent months have paralyzed local governance, the third tier of the administrative setup which takes administration to the grassroots.  Out of 467 gram panchayats (GPs, village level local self government institutions,) in the District, nearly 200 are reportedly under the Maoists influence. More than 400 posts in the GPs are now lying vacant. Security officials are now describing the mass resignations as “the biggest unarmed sabotage by the Maoists to weaken the Government”.
According to media reports, at least 355 local body representatives in the District have resigned since May 1, 2012, after the Maoists issued a diktat in April 2012 demanding their resignations by this date, also commemorated as ‘Maharashtra Day’. The local body representatives include members of the Zilla Parishad (ZP, District Council), Municipal Corporation, Panchayat Samitis (PS, Block Committees) and GPs. Gadchiroli ZP Chief Executive Officer (CEO) Sumant Bhange, on July 16, 2012, confirmed the distressing trend, disclosing that his office had received 218 resignations from the Korchi taluka (administrative division) alone, and the number of resignations received from other parts of Gadchiroli stood at 137. Nandkishor Vairagade, Secretary to the Sarpanch (head of panchayat) Union of Korchi, stated on the same day, “The list includes 27 Sarpanchs, 27 deputy Sarpanchs, 31 Police patils [volunteers working as Police representatives in villages] and 133 gram panchayat members (from Korchi).”
In a face-saving exercise, the administration has sought to argue that these resignations have not been made under Maoist pressure, but are the result of some unfulfilled demands of these members.

Data analytics won’t stop a madman

clip_image001
James Holmes, the suspected gunman in the Colorado theater shooting, made his first court appearance July 23. // RJ Sangosti/AP
By Aliya Sternstein July 23, 2012
The original story misidentified the Colorado theater that was the scene of Thursday's shooting. It has been corrected.
Government officials do not have the hardware or the authority to collect and analyze the artillery receipts, health records and other data that could have signaled a threat was headed toward a Cinemark movie theater in Aurora, Colo., last Thursday, former federal officials said. Nor do Americans have the stomach to grant the government such intrusive powers, they added.
For example, experts point to a review of the FBI’s handling of the 2009 Fort Hood, Texas, massacre that was released hours before the Colorado shooting. The report revealed the FBI did not have the technology to perform the kind of analytics that could have raised red flags about Army Maj. Nidal Malik Hasan, the psychiatrist charged with murdering 13 soldiers and civilians at the Army’s most populous military base in November 2009.
Both Hasan and the suspected theater shooter, James Holmes, a neuroscience graduate student, were trained to save lives, not take them. On the surface, they seemed unlikely criminals.
There were signs of abnormal behavior in Holmes before he allegedly murdered at least 12 moviegoers. CNN reported that Holmes bought online more than 6,000 rounds of ammunition, a Blackhawk urban assault vest, a Blackhawk Omega Elite triple pistol magazine, a Blackhawk Omega Elite M16 magazine pouch and a Blackhawk Be-Wharned silver knife.
A shooting range manager who reportedly found Holmes’ behavior odd apparently did not file a report alerting authorities to suspicious activity.

Week in review: Grum botnet shutdown, Android malware, and Madi Trojan targeting the Middle East

Posted on 23 July 2012.
Here's an overview of some of last week's most interesting news, articles and reviews:
Venetian mask
How to make smart grids
To prepare for a successful roll-out of smart grids, a new ENISA study proposes 10 security recommendations for the public and private sector out of almost 100 findings.
Yahoo! closes security hole that led to huge password breach
Yahoo! has patched the security hole that allowed hackers to access some 450,000 email addresses and passwords associated with Yahoo! Contributor Network and ultimately publish them.
Introducing Windows Server 2012
Windows Server 2012, currently available as a Release Candidate, brings forward hundreds of new features and enhancements including cloud computing, networking, storage, virtualization, and more. The aim of this book is to offer a foundation for working with this complex operating system.
IPv6 and click fraud
The good news: To accommodate the ever-increasing demand for IP Addresses around the world, every network will eventually transition to IPv6 from IPv4. The bad news: Spammers are already spoofing IPv6 addresses because it is easy for them to bypass mail spam filters and launch phishing attacks on a new protocol.
Scareware targets users infected with industrial espionage worm
ACAD/Medre.A's geographically limited eruption probably means that not a lot of people have heard or worried about it. Still, those who have and are searching for tools to remove it might be in for another nasty surprise, as ESET researchers have unearthed a website seemingly offering one such tool.
Android gets safer with full ASLR implementation
The release of Jelly Bean (v 4.1+), the latest version of Google's Android, was a big step for the company security-wise, as the hugely popular mobile operating system now sports properly implemented address space layout randomization.
Anonymous hacks oil giants, leaks employees' passwords
In support of Greenpeace's efforts to stop companies drilling for oil in the Arctic, Anonymous has leaked around 1,000 email addresses belonging to five of the biggest multinational oil companies and its corresponding passwords (both in clear text and hashed).

ASIS at 60

clip_image001
Director-General Nick Warner gave the first ever public speech about ASIS on 19 July 2012.
clip_image002Download PDF version
Conceived in secrecy, the Australian Secret Intelligence Service has, unsurprisingly, spent the past 60 years operating in carefully cultivated shadows.
Over that time no Director-General of ASIS has, until today, made a public address concerning the role or nature of the organisation.
Some of you will know the story of our beginning. On a cold Canberra evening in mid-May 1950, Prime Minister Menzies, having served martinis to a select group of ministers and senior officials, including a colourful former army officer, Alfred Brookes, penned a letter to his British counterpart, Clement Attlee. A framed copy of the letter hangs outside my office door.
Menzies told Atlee that he had
"…decided to establish a Secret Intelligence Service which, when organised in due course, will operate in South East Asia and the Pacific areas adjacent to Australia. Recent developments in Asia and our 'near north' make this both a prudent and an urgent measure".
Concerned that the idea might leak, Menzies told Atlee:
"Knowledge regarding this scheme has been restricted to the fewest possible here, and for added security I have chosen to write in this way".
Atlee provided help with advice and training, and in May 1952 — just over 60 years ago — ASIS was formed. Alfred Brookes was appointed as the first head of the Service.
Menzies desire for secrecy stuck. Stories about ASIS didn't start to appear in the press until 1972, and ASIS's existence wasn't formally acknowledged publicly for another five years.
For the first couple of decades of its existence ASIS, small and Melbourne-based, was actually known to very few in the Canberra bureaucracy. In the 1960s some departments had only one or two officers briefed on the existence of ASIS.

7/23/2012

106 agencies get permits to fly drones over U.S.

by: Terence P. Jeffrey CNS News
Friday, July 20, 2012
clip_image001
A small Draganflyer X6 drone makes a test flight in Mesa County, Colo., with a forward-looking infrared payload. Photo Credit:AP
Since Jan. 1 of this year, according to congressional testimony presented Thursday by the Government Accountability Office, the Federal Aviation Administration has authorized 106 federal, state and local government “entities” to fly “unmanned aircraft systems,” also known as drones, within U.S. airspace. ...

Can the Web survive the ITU?

The obscure U.N. agency is mulling rules that could have profound, detrimental effects on the Internet.

clip_image001
A woman looks at the FBI site page dedicated to the DSN Malware in Paris. Cyber crime is a significant global problem, but some of the measures suggested to address it look more like tools for surveillance and repression than self-defense. (Michel Rubinel / AFP / Getty Images / July 9, 2012)
July 22, 2012
Pushed by various countries and interest groups, the International Telecommunications Union — an obscure United Nations agency that develops voluntary standards for international phone networks and communications satellites — is mulling whether to adopt new rules that could have a profound and detrimental effect on the Internet. Although the ITU's negotiations are secret, it's clear that some telecommunications companies are trying to persuade the agency to let them extract a larger share of the revenue generated online. And some governments are calling for regulations that would make it easier to identify and monitor their opponents. The ITU shouldn't serve any such agendas.
At issue is the ITU's effort to update an international telecommunications treaty last negotiated in 1988, before the Internet became the backbone of global electronic communications and commerce. The more than 190 countries and 700 industry and academic groups that are members of the ITU have until next month to submit proposals for the new draft of the treaty, which the ITU is expected to complete in December. It would then go to the member nations for ratification.

7/15/2012

What is the link between Ansar al-Sharia and Al-Qa'ida in the Arabian Peninsula?

The recent escalation of violence in Yemen underscores the terrorist challenge there. However, western policy will be unsuccessful if it conflates the international agenda of Al-Qa'ida with the local ambitions of Ansar al-Sharia.
By Benedict Wilkinson, Associate Fellow, RUSI 
clip_image001
Much has happened in Yemen in recent weeks.  The spate of events began in early May when, to the surprise of many, Al-Qa'ida in the Arabian Peninsula (AQAP) released Issues 8 and 9 of the now infamous Inspire magazine despite the fact its editor and guiding force, Samir Khan, was killed alongside Anwar al-Awlaqi last year. The re-release of Inspire was followed quickly by what appears to have been a retaliatory US drone strike which killed Fahd al-Quso (a high-ranking member of AQAP) in Shabwa province and the highly-publicised disruption of a plot, modelled exactly on the modus operandi of Umar Farouk Abdulmutallab, to attack the aviation industry.[1] Further US drone strikes in Yemen saw the killing of eleven militants on 12 May and two more on 17 May. More recently, Ansar al-Shariah, often described as an AQAP affiliate, attacked US civilian contractors who were training the Yemeni coast guard in the port of Hudaydah, before launching a major attack in Sana'a which left more than 90 dead.[2]
This escalation in violence poses crucial problems for western policy-makers and strategists, chief amongst which is the precise nature of the relationship between Ansar al-Shariah and AQAP. Throwing light on this relationship has major implications for US and UK policy towards Yemen, not only for the strategic logic of drone strikes but also on the way in which they tailor their humanitarian aid and security assistance appropriately.
The Relationship between AQAP and Ansar al-Shariah
Ansar al-Shariah has been waging an insurgency in the south and east of Yemen since their emergence in early 2011. The movement made considerable gains in the summer of 2011, capitalising on the security vacuum left by political instability when it captured Ja'ar and Zinjibar and established them as mini-Emirates. More recently the organisation has also been involved in social and humanitarian operations, providing free water and electricity, as well as abolishing taxes and setting up legal courts in an effort to improve its image in the eyes of the local population.

7/05/2012

June Update – US covert actions in Pakistan, Yemen and Somalia

July 2nd, 2012 | by Chris Woods and Jack Serle
clip_image001
An armed US military Reaper drone over Afghanistan (US Air Force/ Lt Col Lesley Pratt/ Flickr)
The Bureau’s covert war investigation tracks drone strikes and other US military and paramilitary actions in Yemen, Somalia and Pakistan. Here we summarise our key work and findings for June 2012. We also compare the first six months of this year with 2011.
An analysis of our data over this period reveals: 
  • As relations between Washington and Islamabad continue to falter, Bureau data shows fewer civilians are being killed in CIA drone strikes in Pakistan than at any time in the Obama presidency.
  • US military action in Yemen is at its bloodiest ever, with the strike rate and reported casualties the highest yet recorded.
  • The true extent of US action in Somalia remain unclear, despite many claims of attacks.
Chris Woods discusses TBIJ’s findings with ABC Australia’s Connect Asia
Pakistan
June 2012 actions
Total CIA strikes in June: 6
Total killed in US strikes in June: 26 – 46, of whom 0 – 2 were reportedly civilians
All Actions 2004 – 2012
Total Obama strikes: 282
Total US strikes since 2004: 334
Total reported killed: 2,496 – 3,202Civilians reported killed: 482 – 832
Children reported killed: 175
Total reported injured: 1,196 – 1,318
For the Bureau’s full Pakistan databases click here.

7/02/2012

Defending Critical Information Infrastructure

Cyber security threats will continue to grow in 2012: there will not only be a record number of attacks this year, but these attacks will also evince an unprecedented sophistication as both the targets and attack vectors diversify. As the use of information and communications technologies continue to grow at an astonishing pace on the African continent, the concomitant security threats grow apace. Additionally, cyberwar is clearly no longer mere science fiction, as Stuxnet and the wider Iranian-Israeli cyber conflict amply demonstrates. It is thus clearly time to review and strengthen our individual and collective cyber security.
Cyber Defence & Network Security Africa, taking place 16-19 July in Johannesburg, is part of a global series of cyber security and information warfare events that IQPC organizes in Berlin, Kuala Lumpur, New Delhi, London, Brussels, Washington DC and elsewhere.

Inside the Mind of the Spy: Agents Struggle in the Shadows

Jul 1, 2012 4:45 AM EDT
Espionage is physically and mentally unforgiving, and anything but exotic. A psychologist to the clandestine world on the unseen toll—and true heroes—of intelligence work.
Every few years, major news breaks about spying, with stories of spectacular heroism and shocking betrayal. What goes on in the mind of those who inhabit the clandestine world?
In early May, the world learned of a real example of heroic espionage. Intelligence officials foiled an al Qaeda plot to bring down a plane by having a suicide operative smuggle on board a nonmetallic exploding device concealed beneath his clothing. The terrorist group failed because the operative they chose for the mission was widely reported to have been an agent of British or Saudi intelligence. For those of us in the business, it was rare to see an agent’s heroism come to light, though we get to witness their bravery covertly on a routine basis in our daily work. What do people outside the clandestine world not see?
Many Spies Are Not Heroic
Intelligence officers who handle espionage sources—variously called informants, assets, or agents, to distinguish them from the professionals—and the psychologists they consult with study the motives of agents closely. These motivations are often self-serving. Some want money, or the excitement of a James Bond adventure, or to believe they are playing dramatic, if hidden, roles in historical events. Some are aggrieved and seek revenge. Some agents spy as a kind of sport. They like sneaking around and manipulating others, and feel superior to their oblivious targets drawn into hidden games of secrecy and deception.
In Some Places, Only Heroes Will Spy
Heroic spies are an entirely different type of human being, set apart from ordinary clandestine players not by the tradecraft they use—which is universal—but by their fundamental values. Their motives are not self-serving—the risks of espionage in the contexts they serve in are too high to draw in selfish people. They are morally revolted by their targets’ conduct and dismayed at the future they’re intent on building or have already actualized.
It is nearly impossible for intelligence professionals to keep agents safe when they are spying against groups such as the current terrorist targets—as was also the case with Soviet Russia or Saddam Hussein’s Iraq. Most sane prospective spies realistically assessing the ruthlessness and counterintelligence capabilities of targets like al Qaeda choose to stand down from entering espionage. Heroic agents are the small group of sane people who make the same assessments, but make a different choice.
clip_image001
Corbis
The Losses and Stress Can Be Punishing 
A case-officer colleague of mine, formerly a member of an elite military combat unit, was handling a source who was captured and then killed in the village square in front of friends and relatives by terrorists using the drawn-out methods worthy of medieval torturers. As we discussed the nature of his lost agent, my colleague remarked that the world had lost that day an unrecognized prince, a noble and civilized man whose war flag—if the work of spies permitted such emblems of service—should have been flown high at his funeral and included symbols of both an eagle and a dove.

6/30/2012

Cyber threats as important as terrorism - MI5

Director general of UK Security Service organisation warns that business will be a target for cyber threats, with one London company's losses estimated at £800m.
Article | June 26, 2012 - 1:27pm
clip_image001
Yesterday, the director general of the UK Security Service, MI5, warned that rapidly escalating cyber crime is as important to the country as terrorism and that businesses and government must work together for mutual protection.
Jonathan Evans was speaking at the Lord Mayor's inaugural Defence and Security Lecture in Mansion House, London.
Having covered the upcoming Olympics and global terrorism, Evans turned his attention to cyber security, something he said is as pivotal to business as it is to government and is indeed seen on a par with terrorism as a key security challenge.
The rise in big data as a state security and industrial competitive asset and the development of the ‘Internet of things’ with a vast array of everyday devices interconnected and accessible via the web has vastly increased both the opportunity and impetus for information-phishing and viral cyber crime.

6/25/2012

Threats to Nigeria's Security: Boko Haram and Beyond

On Tuesday, June 19, 2012, The Jamestown Foundation held a conference on Nigerian security entitled, “Threats to Nigeria's Security: Boko Haram and Beyond” at Carnegie Endowment for International Peace in Washington, DC.
The conference highlighted the domestic factors of instability in Nigeria such as the regional rise of extremist Islam and militant movements taking place in Central Africa. The panelists also discussed U.S.-Nigeria relations and the United States' response to Boko Haram.
The event, featured Ambassador Eunice Reddick, CRS Specialist in African Affairs Lauren Ploch Blanchard, Jamestown Foundation Analyst Jacob Zenn, Jamestown Foundation Editor-in-Chief of Terrorism Monitor Andrew McGregor, as well as other indigenous and U.S. experts on Nigeria and Central Africa.
Full video of the conference can be found below:

Part One



Video streaming by Ustream

Part Two



Video streaming by Ustream

Bios

Lauren Ploch Blanchard
Ms. Blanchard provides nonpartisan analysis on African political, military and diplomatic affairs, and on U.S. policy in the region, to Members of the United States Congress, congressional committees and congressional staff. She has written extensively on security issues on the continent, and has testified before Congress on U.S. military engagement and counterterrorism efforts in Africa. Prior to joining CRS, she managed governance programs in East and Southern Africa. Previously, Ms. Blanchard served as Legislative Assistant in the United States Senate. She holds a master's degree in National Security Studies from Georgetown University and a bachelor’s degree in Political Science and Classical Studies, with a minor in African Studies, from the University of Florida. Her publications include: Africa Command: U.S. Strategic Interests and the Role of the U.S. Military in Africa; Piracy off the Horn of Africa; Countering Terrorism in East Africa: The U.S. Response; Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy; and Nigeria: Issues for Congress; among others.

Were the Turkish Phantoms ‘Teasing’ Syrian Air Defenses for NATO’s ELINT Collection?

Tamir Eshel June 24, 2012 21:25
The Syrian news agency SANA confirmed yesterday (June 23, 2012) that on 11:40 AM on Friday (June 22, 2012) the Syrian air defense forces have downed an ‘unidentified target’ that violated Syrian airspace coming from the west (seaside) at a very low altitude and at high speed over Syrian territorial waters. After spotting the aircraft Syrian air defense artillery units opened fire, hitting the target about one kilometer from the coastline, causing it to crash into Syrian territorial waters about seven kilometers west of the Om al-Tuyour village in the Latakia province. The two crewmen are still missing.
Apparently, the target headed west before crashing, hitting the water about ten kilometers from the coastline. The Syrian agency released a map showing the target’s route before the intercept. Syria has tried to play down the incident. Syrian foreign ministry spokesman Jihad Makdissi said the incident was “not an attack”. “There was no hostile act against Turkey whatsoever. It was just an act of defense for our sovereignty.” he said.
clip_image001
The Syrian news agency SANA published this map showing the tracks of the Turkish aircraft before it was shot down by its anti-aircraft artillery seven kilometers off the Latakia coastline. Photo: SANA
According to the map released by the SANA agency, the Turkish aircraft, apparently an unarmed reconnaissance version of the Turkish Air Force F-4E, was circling at higher altitude in Turkish airspace north of the area, possibly using Long Range Oblique Photography (LOROP) payloads (similar to the system Turkey bought in Israel few years ago). LOROP provides high quality imagery form very long range (up to 100 km), when taken from high altitude. However, it is less suitable for fast, low-altitude tactical recce missions characteristic of the final dash the Phantom performed just before it was shot down. What drew the pilot to act this way? One possible explanation for the Turkish maneuver is an Electronic Intelligence (ELINT) gathering mission.