Archive

Monthly Archives: October 2012

  • arXiv [preprints – selected new articles]:
  • Ball, J. (2012, Oct. 23). Experts warn about security flaws in airline boarding passes. Washington Post. [Read]
  • Beckett, L. (2012, Oct. 22). How companies have assembled political profiles for millions of internet users [Pro Publica]. [Read]
  • Binney, W., & Wiebe, J. K. (2012, Oct. 23). SCOTUS must be last bulwark against NSA snooping. Politico. [Read]
  • Brecher, A., (2012, Oct. 22). Cyberattacks and the covert action statute: Toward a domestic legal framework for offensive cyber operations [Michigan Law Review preprint]. [Read]
  • Chesney, R. (2012). Computer network operations and U.S. domestic law: An overview [International Law Studies preprint]. [Read]
  • Cyber snooping – in whose hands should internet governance be entrusted? [Frontline Club]. (2012, Oct. 23).  [Watch / Panel discussion with Kirsty Hughes, Birgitta Jónsdóttir, Jacob Appelbaum, Karl Kathuria & Ian Brown]
  • Enderle, R. (2012, Oct. 19). Why the government’s cybersecurity plan will end in catastrophe. CIO. [Read]
  • Fahl, S., Harbach, M., Muders, T., & Smith, M. (2012, Oct.). Why Eve and Mallory love Android: An analysis of Android SSL (insecurity). Paper presented at the 19th ACM Conference on Computer and Communications Security. [Read]
  • Gallagher, R. (2012, Oct. 19). FBI accused of dragging feet on release of info about ‘Stingray’ surveillance technology. Slate. [Read]
  • Greenberg, A. (2012, Oct. 24). Bulgarian banks threaten to crush Wikileaks’ most successful copycat site. Forbes. [Read]
  • Hope, C., & Coughlin, C. (2012, Oct. 19). Gary McKinnon: Eric Holder formally complains to UK and refuses to take Theresa May’s calls. Telegraph. [Read]
  • Krebs, B. (2012, Oct. 22). Service sells access to Fortune 500 firms. Krebs on Security. [Read / Typical Cisco server username / pwd: “Cisco” / “Cisco”]
  • Oxford Intelligence Group. (2012, June 18 – newly available). Cyber security and social science [symposium]. [Download transcripts / “Issues of trust on the internet, analysis of social media, and ‘Advanced Persistent Threats’ were discussed by experts in computer science, behavioral psychology, sociology, policy and other interdisciplinary fields”.]
  • Pescatore, J. (2012, Oct. 19). Dealing with federal continuous monitoring security requirements [Gartner]. [Gartner – search for title in box at upper right].
  • Peterson, D. (2012, Oct. 25). New Project Basecamp tools for CoDeSys, 200+ vendors effected [digital bond]. [Read]
  • Tapadinhas, J. (2012, Oct. 19). How to meet the security challenges of mobile BI [Gartner]. [Gartner – search for title in box at upper right].
  • United States. Federal Trade Commission. (2012, ). Facing facts: Best practices for common uses of facial recognition technologies. [Read / Summary]
  • Valentino-DeVries, J. (2012, Oct. 22). Judge questions tools that grab cellphone data on innocent people. Wall Street Journal. [Read]
  • Verizon. (2012, Oct.). 2012 data breach investigations report. [Read]
  • Verton, D. (2012, Oct. 19). I’m betting on Kaspersky. [RE: secure SCADA OS]. Homeland Security Today. [Read]
  • Walker, D. (2012, Oct. 24). Thousands scammed by .gov open redirect flaw. SC Magazine. [Read]
  • WikiLeaks. (2012, Oct. 25). Detainee policies [“WikiLeaks has begun releasing the ‘Detainee Policies’: more than 100 classified or otherwise restricted files from the United States Department of Defense covering the rules and procedures for detainees in U.S. military custody.”] [Press release]
  • Wired for change: The power and pitfalls of big data [Ford Foundation conference]. (2012, Oct. 23). [Watch / “. . .  provocative conversations about the challenges and opportunities big data presents for social change makers. How can we ensure that vast data sets are tapped for the common good? How do we protect the right to privacy? And how do we build a transparent framework for data collection and analysis that allows us to create a better and more equitable future for all?”]

Proceedings

  • 2012 ACM Conference on Computer and Communications Security (2012, Oct. 16-18) – papers presented [full text]:
  • 2nd International Conference on Security, Privacy, and Applied Cryptography Engineering. (2012, Nov. 3-4) – papers presented [abstracts / request]:

  • arXiv [preprints – selected new articles]:
  • Associated Press. (2012, Oct. 12). New computer virus targets Venezuelans after vote. [Read]
  • Bilge, L., & Dumitras, T. (2012). Before we knew it: An empirical study of zero-day attacks in the real world [preprint]. [Read]
  • Dorling, P. (2012, Oct. 10). Revealed: Canberra sharing intel on Assange with Washington. Sydney Morning Herald. [Read]
  • Gary McKinnon extradition to US blocked by Theresa May. (2012, Oct. 16). BBC. [Read / More: NYT]
  • Insinna, V. (2012, November). States to ramp up cybersecurity information sharing. National Defense. [Read]
  • International Journal of Electronic Security and Digital Forensics – new issue [abstracts / request]:
  • Krebs, B. (2012, Oct. 17). Critical Java patch plugs 30 security holes. Krebs on Security. [Read]
  • McCullagh, D. (2012, Oct. 16). Verizon draws fire for monitoring app usage, browsing habits. CNET. [Read]
  • Palmer, D. (2012, Oct. 16). Police force fined £120,000 for data breach. Computing. [Read]
  • Pauli, D. (2012, Oct. 17). Hacker terminals capable of causing pacemaker deaths. SC Magazine. [Read]
  • Schactman, N. (2012, Oct. 11). Pentagon chief reveals ‘classified’ cyber threats … that you read in August [Brookings]. [Read]
  • Setrakian, L. (2012, Oct. 15). Skype becomes operations center for Syrian rebels. ABC News. [Read]
  • Stross, R. (2012, Oct. 14). Doing the two-step [verification] beyond the ATM. New York Times. [Read]
  • Talbot, D. (2012, Oct. 17). Computer viruses are ‘rampant’ on medical devices in hospitals. Technology Review. [Read]

Proceedings

6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (2012, Oct. 17-19) – papers presented [abstracts / request]:

17th Nordic Conference on Secure IT Systems (2012, Oct. 31 –  Nov. 2) – papers presented [abstracts / request]:

Calls for Papers

Conferences

  • arXiv [preprints – selected new articles]:
  • Denbow, S., & Hertz, J. (2012). Pest control: Taming the RATs [Matasano]. [Read]
  • European Network and Information Security Agency. (2012, Oct. 11). Annual incident report 2011. [Read]
  • Hoofnagle, C. J., Urban, J. M., & Li, S. (2012, Oct. 8). Privacy and modern advertising: Most US internet users want ‘do not track’ to stop collection of data about their online activities [preprint]. [Read / More from NYT]
  • IEEE Security & Privacy – new issue [full text]:
  • IEEE Transactions on Dependable & Secure Computing – new issue / preprints [full text]:
  • Martinez, J. (2012, Oct. 10). FCC chairman warns telecomm treaty would ‘threaten the internet’. The Hill. [Read]
  • McCullagh, D. (2012, Oct. 9). Military court to review tight secrecy in Bradley Manning case. CNET. [Read]
  • Nakashima, E. (2012, Oct. 9). Iran aids Syria in tracking tracking opposition via electronic surveillance, U.S. officials say. Washington Post. [Read / Also this week: Lieberman on cyber attacks]
  • Oulasvirta, A., Pihlajamaa, A., Perkiöm, J., Ray, D., Vähäkangas, T., Hasu, T., Vainio, N., & Myllymäki, P. (2012). Long-term effects of ubiquitous surveillance in the home [preprint]. [Read]
  • Ramakers, R., Vanackenm D., Luyten, K., Coninx, K., & Schöning, J. (2012). Carpus: A non-intrusive user identification technique for interactive surfaces. Paper presented at the 25th Annual ACM Symposium on User Interface Software and Technology. [Read]
  • Roberts, P. (2012, Oct. 12). Exploit code released for software used to manage solar energy plants. Naked Security. [Read]
  • Ross, B. (2012, Oct. 9). Did the CIA have a double agent inside al Qaeda? [RE: alleged source of infected USB drive that facilitated killing of Anwar al-Awaki]. ABC News. [Read]
  • Security & Communication Networks – new preprints [Abstracts /Request articles]
  • Silver, V. (2012, Oct. 10). Spyware leaves trail to beaten activist through Microsoft flaw [RE: the UAE’s Ahmed Mansoor]. Bloomberg. [Read / More: University of Toronto / NYT]
  • Thompson, M. (2012, Oct. 12). Panetta sounds alarm on cyber-war threat. Time. [Read].
  • U.S. Chamber of Commerce. [Brief: Response to Federal Trade Commission on corporate data security accountability]. [Read]
  • United States. Congress. House. Permanent Select Committee on Intelligence. (2012, Oct. 8). Investigative report on the U.S. national security issues posed by Chinese telecommunications companies Huawei and ZTE. [Read]
  • United States. Department of Defense. (2012, Oct). [Documents related to funding of Tor Project, via Cryptome]. [Read]
  • United States. Department of Homeland Security. Industrial Control Systems Cyber Emergency Response Team. (2012, Oct. 11). ICS-CERT monthly monitor. [Read]
  • United States. Department of Justice. Office of the Inspector General. (2012, September).  Report to Congress on implementation of Section 1001 of the USA PATRIOT Act [FBI surveillance under DOJ investigation]. [Read]
  • United States. Executive Office of the President. (2012, Oct. 10). Presidential Policy Directive / PPD-19: Protecting whistleblowers with access to classified information. [Read]
  • United States. Federal Bureau of Investigation. (2012, Oct. 10). [FBI Data Warehouse System exempted from Privacy Act safeguards]. [Read – scroll to bottom].
  • United States. Government Accountability Office. (2012, September – newly released). Mobile device location data: Additional federal actions could help protect consumer privacy. [Read]
  • Warner, M. (2012). Cybersecurity: A pre-history. Intelligence & National Security. [Abstract / Request article]

Proceedings

  • 2012 Symposium on Visualization for Cybersecurity. (2012, Oct. 15) – papers presented [full text]:

Calls for Papers

Conferences

Journals

  • Ackerman, S. (2012, Oct. 2). DHS counterterror centers produce ‘a bunch of crap’,  Senate finds. Wired. [Read / Senate report]
  • arXiv [preprints – new articles]:
  • Goodin, D. (2012, Oct. 3). DDoS attacks on major US banks are no Stuxnet – here’s why. Ars Technica. [Read / More]
  • Information Management & Computer Security – new issue [full text]:
  • International Journal of Information Security – new issue [abstracts / request]:
  • Kazansky, B. (2012, October 3). Hacking censorship – drone humanitarianism  CNET[Interview from Circumvention Tools Hackfest / Harvard University]. [Listen]
  • Krebs, B, (2012, Oct. 1), In a zero-day world, it’s active attacks that matter. Krebs on Security. [Read]
  • Musil, S. (2012, Oct. 3). Hackers post data from dozens of breached college servers [including the University of Maryland].. [Read]
  • Security and Communication Networks – new issue [abstracts / request]:
  • Sharma, A. (2012, Oct. 4). [Indian government licensing US, Canadian, Israeli software to crack password protected phones]. Times of India. [Read]
  • Temple, J. (2012, Oct. 3). Governor vetoes [California] location privacy bill. San Francisco Chronicle. [Read]
  • Templeman, R., Rhaman, Z., Crandall, D., & Kapadia, A. (2012). PlaceRaider: Virtual theft in physical spaces with smartphones [preprint]. [Read / Related]
  • United States. Congressional Budget Office. Proposed homeland security budget for 2013. [Read]
  • United States. Department of Defense. (2012, Oct. 1). Directive: Management of the Defense Security Enterprise. [Read]
  • United States. Department of Homeland Security. Office of Inspector General. (2012, Sept.). Transportation Security Administration has taken steps to address the insider threat but challenges remain. [Read redacted version /Congress reacts]
  • United States. District Court for the Northern District of Texas. (2012, Oct. 3). [Indictment against Barrett Brown]. [Read /Background RE: Anonymous]
  • United States. Government Accountability Office. (2012, Aug. 31 – newly released).  FDA should expand its consideration of information security for certain types of [medical] devices. [Read]
  • York, G. C. (2012, Oct. 3). A dark day for the Philippines as government passes cybercrime act [Electronic Frontier Foundation]. [Read / Anonymous retaliates]
  • Zetter, K. (2012, Oct. 2). DHS issued false ‘water pump hack’ report; called it a ‘success’. Wired. [Read]