USNA | June 2013

ACTIVE DEFENSE

06/13/2013, Letter Of (Cyber) Marque And Reprisal, http://www.darkreading.com/attacks-breaches/letter-of-cyber-marque-and-reprisal/240156591?goback=%2Egde_1807664_member_249719303#mce_temp_url#

06/03/2013, Support Grows to Let Cybertheft Victims 'Hack Back', http://online.wsj.com/article/SB10001424127887324682204578517374103394466.html

 APT

06/25/2013, Cracking the Maze of Advanced Persistent Threats!, http://resources.infosecinstitute.com/cracking-the-maze-of-advanced-persistent-threats/?goback=%2Egde_37658_member_253674072

CONTRACTING

06/10/2013, GOVERNMENT IT REPORT Feds Seek Private-Sector Cybersecurity Help, http://www.ecommercetimes.com/story/78218.html?goback=%2Egde_1836487_member_248398787

CYBERSECURITY

06/18/2013, Former US military chief: bold leadership required to solve cybersecurity problems, http://www.infosecurity-magazine.com/view/32982/former-us-military-chief-bold-leadership-required-to-solve-cybersecurity-problems/?goback=%2Egde_1765567_member_251027698

CYBER TERRORISM

06/11/2013, U.S. disrupts al-Qaeda’s online magazine, http://www.washingtonpost.com/world/national-security/officials-describe-how-us-disrupts-al-qaedas-online-magazine/2013/06/11/6a9196c6-ca07-11e2-9245-773c0123c027_story.html

CYBER WAR

06/09/2013, Silent War, http://www.vanityfair.com/culture/2013/07/new-cyberwar-victims-american-business?goback=%2Egde_1836487_member_248238705#

DOD

6/27/13, Report: Former general investigated over leaks, http://www.politico.com/story/2013/06/report-stuxnet-former-general-93544.html

06/27/2013, First DoD Meet With China On Cyber Next Week; Gen. Dempsey Offers Glimpse of Cyber ROE, http://breakingdefense.com/2013/06/27/first-dod-meet-with-china-on-cyber-next-week-gen-dempsey-offers-glimpse-of-cyber-roe/?goback=%2Egde_1836487_member_253707903%2Egde_1836487_member_253716250

06/13/2013, Official outlines challenges in securing DOD communications, http://www.af.mil/news/story.asp?storyID=123352317&goback=%2Egde_1836487_member_249705055

ECPA

06/02/2013  Push for US Internet 'wiretap' law faces tough road, http://news.xin.msn.com/en/sci-tech/push-for-us-internet-wiretap-law-faces-tough-road?goback=%2Egde_1836487_member_246673646

EDUCATION

06/24/2013, Cyber Security Depends on Education, http://blogs.hbr.org/cs/2013/06/cyber_security_depends_on_educ.html

EXPLOITS

06/28/2013, Why I Phished My Own Company, http://blogs.hbr.org/cs/2013/06/why_i_phished_my_own_company.html?goback=%2Egde_1836487_member_254140544

06/1402103, Microsoft and other U.S. firms disclose security flaws to spies before customers, report claims, http://gigaom.com/2013/06/14/microsoft-and-other-u-s-firms-disclose-security-flaws-to-spies-before-customers-report-claims/?utm_source=General+Users&utm_campaign=d268dce812-c%3Amob%2Ctec%2Ccld%2Capl%2Ceur%2Cdta+d%3A06-15&utm_medium=email&utm_term=0_1dd83065c6-d268dce812-99419753

06/10/2013, New Breed of Banking Malware Hijacks Text Messages, http://www.americanbanker.com/issues/178_111/new-breed-of-banking-malware-hijacks-text-messages-1059745-1.html?zkPrintable=1&nopagination=1

06/04/2013, Football Fan Pages Serve Up Bank Account-Draining Malware, http://betabeat.com/2013/06/football-fan-pages-serve-up-bank-account-draining-malware/?goback=%2Egde_1836487_member_246888987. (Zeus)

FBI

06/05/2013, Microsoft, FBI Take Down Hackers Who Stole Over $500 Million From Banks,http://www.businessinsider.com/microsoft-fbi-stop-big-cybercrime-ring-2013-6?goback=%2Egde_37658_member_247290921

FISA

Google Challenges NSA Secrecy in FISA Court, http://business.time.com/2013/06/18/google-challenges-nsa-secrecy-in-fisa-court/

HACKTIVISM

06/27/2013, Hacktivism: how worried should organisations be?, http://www.guardian.co.uk/media-network/media-network-blog/2013/jun/27/hactivism-how-worried-organisations?goback=%2Egde_1836487_member_253576567

INTERNATIONAL EFFORTS

06/21/2013, GCHQ taps fibre-optic cables for secret access to world's communications, http://www.guardian.co.uk/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa?goback=%2Egde_1836487_member_252115987

LEGISLATION

06/05/2013, U.S. government to propose bill targeting foreign hackers, http://news.cnet.com/8301-1009_3-57587942-83/u.s-government-to-propose-bill-targeting-foreign-hackers/?goback=%2Egde_1836487_member_247289573

NATO

06/05/2013, NATO to set up rapid reaction teams against cyber threats, http://www.hurriyetdailynews.com/nato-to-set-up-rapid-reaction-teams-against-cyber-threats.aspx?pageID=238&nid=48292&NewsCatID=359&goback=%2Egde_1836487_member_247292772

NSA

06/24/2013, NSA Surveillance Leaks Prompt Legislation, http://www.wired.com/threatlevel/2013/06/nsa-spy-legislation/?goback=%2Egde_1807664_member_252654625

06/17/2013, Secret U.S. cyber actions exposed by Snowden leaks demand much larger debate, http://www.scmagazine.com//secret-us-cyber-actions-exposed-by-snowden-leaks-demand-much-larger-debate/article/298937/?goback=%2Egde_37658_member_250700070

06/14/2013, NSA Director: Security Leaks Have Done Great Harm, http://www.defense.gov/news/newsarticle.aspx?id=120296&goback=%2Egde_1836487_member_250045915

06/14/2013, How did mainstream media get the NSA PRISM story so hopelessly wrong, http://www.zdnet.com/how-did-mainstream-media-get-the-nsa-prism-story-so-hopelessly-wrong-7000016822/

06/14/2013, The NSA's Big Data Problem, http://www.time.com/time/printout/0,8816,2145481,00.html

06/11/2013, NSA Snooping Was Only the Beginning. Meet the Spy Chief Leading Us Into Cyberwar, Threat Level, http://www.wired.com/threatlevel/2013/06/general-keith-alexander-cyberwar/all/

06/10/2013, President Obama's Flawed Defense of Surveillance: 4 Responses, http://www.linkedin.com/today/post/article/20130610082630-2259773-president-obama-s-flawed-defense-of-surveillance-4-responses?goback=%2Egde_1807664_member_248296527&_mSplash=1

06/09/2013, DAMAGE CONTROL, Edward Snowden’s lesson to both businesses and the NSA: Your IT people are your biggest risk, http://qz.com/92509/edward-snowdens-lesson-to-both-businesses-and-the-nsa-your-it-people-are-your-biggest-risk/

06/09/2013, Edward Snowden: the whistleblower behind the NSA surveillance revelations, http://www.guardian.co.uk/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance?goback=%2Enmp_*1_*1_*1_*1_*1_*1_*1_*1_*1_*1

06/09/2013, Contractor Says He Is Source of NSA Leak, http://online.wsj.com/article/SB10001424127887323495604578535653583992418.html?mod=trending_now_2

06/07/2013, U.S. Collects Vast Data Trove, http://online.wsj.com/article/SB10001424127887324299104578529112289298922.html?mod=WSJ_hpp_LEFTTopStories

06/07/2013, U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program, http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497_story_3.html

06/06/2013, Report: Secret court order forces Verizon to turn over telephone records of millions, http://www.cnn.com/2013/06/05/politics/nsa-verizon-records/index.html?hpt=hp_t1

05/06/2013, Revealed: NSA collecting phone records of millions of Americans daily, http://www.guardian.co.uk/world/2013/jun/06/nsa-phone-records-verizon-court-order?goback=%2Egde_1836487_member_247278689

PRIVACY

06/21/2013, Privacy board meets with Obama, http://www.washingtonpost.com/politics/privacy-board-meets-with-obama/2013/06/21/81586678-daa1-11e2-a016-92547bf094cc_story.html

06/09/2013, Privacy Protection Urged After U.S. Surveillance Leaked, http://www.bloomberg.com/news/2013-06-09/privacy-protection-urged-by-lawmakers-after-u-s-internet-spying.html?goback=%2Egmp_1836487%2Egde_1836487_member_248230055

STUXNET

Legal Experts: Stuxnet Attack on Iran Was Illegal ‘Act of Force’, http://www.wired.com/threatlevel/2013/03/stuxnet-act-of-force/

TOOLS & EXPLOITS

06/27/2013, Hackers Grab Opera Certificate, 1,000 Users Infected with Password-Stealing Malware, http://www.hotforsecurity.com/blog/hackers-grab-opera-certificate-1000-users-infected-with-password-stealing-malware-6488.html

06/06/2013, SOCOM-approved Silent Circle Resists Calls For Wiretap Backdoors, http://www.defensenews.com/article/20130606/C4ISR01/306060013/SOCOM-approved-Silent-Circle-Resists-Calls-Wiretap-Backdoors?goback=%2Egde_1836487_member_248180772

USAF

6/5/2013 Airmen must understand business of cyber, general says, http://www.af.mil/news/story.asp?storyID=123351327&goback=%2Egde_1836487_member_247284413

USCC

06/04/2013, Gen. Keith Alexander, chief at U.S. Cyber Command, describes growing threats, http://www.gsnmagazine.com/article/29902/gen_keith_alexander_chief_us_cyber_command_describ?goback=%2Egde_1836487_member_247288037

June 1, 2013, Cyber Command Redefines the Art, http://www.afcea.org/content/?q=node/11117

US POLICY

06/07/2013, Obama Asked Intel Agencies to Draw Up List of Possible Cyber Targets Overseas, http://www.wired.com/threatlevel/2013/06/presidential-cyber-targets/?goback=%2Egde_37658_member_247957998

 

 
Center for Cyber Security Studies
Current Cyber News
USNA Home

For more news about USNA, visit us on

facebook       Flickr       YouTube       Twitter       News(Rss)