The Week That Was – 11/26/2012

Here’s the week that was.  As always, we have a little bit of everything from encrypted messages from secret societies [18] to Chinese aircraft carriers [9].

The story about the encrypted messages from the Great Enlightened Society of Oculists was my favorite.  [18]  It’s a great overlap of history and technology.  And the technology used to decode the message is impressive.  I can’t do it justice, so go give it a read.

Speaking of history and technology, the worm attacking Iranian databases seems to be based on malcode first identified in 2010.  [10]  The story is significant for two reasons.  First, it serves as a warning to us that just because a threat is old doesn’t mean it isn’t still dangerous in the right context.  Second, I feel this is a good example of information warfare’s more frequent appearance.  It’s a risk that doesn’t necessarily loom large for all organizations, but it could be significant for a few.  It’s worth thinking about how such an attack would impact you and what the threat communities might look like.

Finally we have the story of Andrea Hernandez who refused to wear an ID card with embedded RFID chip.  [16]  Her home school district, Northside Independent, mandated students wear them to better track attendance.  Northside Independent receives state funding based on the average daily attendance level of its schools.  I see where this is an effective means of tracking attendance, but schools seemed to do OK with a paper-based roll call in home room back when I was a kid.  Why won’t paper still work?

Link Dump

[1] G. Thompson, “Are We Ready To Fight The Next Generation Of Threats? New (ISC)2 Survey Lets You Give The Answer,” (ISC)2 Blog, 21-Nov-2012. [Online]. Available: http://blog.isc2.org/isc2_blog/2012/11/are-we-ready-to-fight-the-next-generation-of-threats-new-isc2-survey-lets-you-give-the-answer.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+isc2Blog+%28%28ISC%292+Blog%29. [Accessed: 26-Nov-2012].

[2] S. Ackerman, “Army Sticks ‘War on Islam’ Teacher in Bureaucratic Depths,” Danger Room, 26-Nov-2012. [Online]. Available: http://www.wired.com/dangerroom/2012/11/dooley/. [Accessed: 26-Nov-2012].

[3]“Army Wants to Stop Bombs Using Halo-Style Electric Pulses,” Danger Room, 20-Nov-2012. [Online]. Available: http://www.wired.com/dangerroom/2012/11/emp-grenades/. [Accessed: 21-Nov-2012].

[4]“Global mobile data traffic doubled in year, Ericsson says,” Phys.org, 21-Nov-2012. [Online]. Available: http://phys.org/news/2012-11-global-mobile-traffic-year-ericsson.html. [Accessed: 21-Nov-2012].

[5] T. B. Lee, “Google rallies opposition to UN takeover of Internet governance,” Ars Technica. [Online]. Available: http://arstechnica.com/tech-policy/2012/11/google-rallies-opposition-to-un-takeover-of-internet-governance/. [Accessed: 21-Nov-2012].

[6] N. Shachtman, “How Israeli Drone Pilots Made Their Life-and-Death Choices Over Gaza,” Danger Room, 26-Nov-2012. [Online]. Available: http://www.wired.com/dangerroom/2009/01/inside-israels-2/. [Accessed: 26-Nov-2012].

[7] S. Sharwood, “Human Rights Watch proposes new laws of robotics,” The Register, 22-Nov-2012. [Online]. Available: http://www.theregister.co.uk/2012/11/22/human_rights_watch_says_ban_killer_robots/. [Accessed: 26-Nov-2012].

[8] D. Fisher, “New Linux Rootkit Emerges,” ThreatPost, 20-Nov-2012. [Online]. Available: https://threatpost.com/en_us/blogs/new-linux-rootkit-emerges-112012. [Accessed: 20-Nov-2012].

[9] D. Axe, “New Naval Era Dawns as China’s Carrier Launches First Jet,” Danger Room, 26-Nov-2012. [Online]. Available: http://www.wired.com/dangerroom/2012/11/china-carrier-first-jet/. [Accessed: 26-Nov-2012].

[10] J. Leyden, “New table-munching worm ravages Iranian biz databases,” The Register, 26-Nov-2012. [Online]. Available: http://www.theregister.co.uk/2012/11/26/database_thrashing_malware/. [Accessed: 26-Nov-2012].

[11] J. Leyden, “Nintendo downplays Wii U ‘hidden control panel’ hack fears,” The Register, 20-Nov-2012. [Online]. Available: http://www.theregister.co.uk/2012/11/20/miiverse_security_flap/. [Accessed: 20-Nov-2012].

[12] J. Leyden, “PGP Zimmermann teams with Navy SEALs, SAS techies in London,” The Register, 21-Nov-2012. [Online]. Available: http://www.theregister.co.uk/2012/11/21/silent_circle/. [Accessed: 21-Nov-2012].

[13] B. Donohue, “Researchers Remotely Control Smart Cards with Malware PoC,” ThreatPost, 20-Nov-2012. [Online]. Available: https://threatpost.com/en_us/blogs/researchers-remotely-control-smart-cards-malware-poc-112012. [Accessed: 21-Nov-2012].

[14] M. Mimoso, “Resilient Security Requires Creativity and Intelligence,” ThreatPost, 20-Nov-2012. [Online]. Available: https://threatpost.com/en_us/blogs/resilient-security-requires-creativity-and-intelligence-112012. [Accessed: 20-Nov-2012].

[15] E. Chickowski, “Slide Show: 2012 Pastebin Pinups,” Dark Reading, 21-Nov-2012. [Online]. Available: http://www.darkreading.com/galleries/security/news/240142411/slide-show-2012-pastebin-pinups.html. [Accessed: 26-Nov-2012].

[16] D. Kravets, “Student Suspended for Refusing to Wear a School-Issued RFID Tracker,” Threat Level, 21-Nov-2012. [Online]. Available: http://www.wired.com/threatlevel/2012/11/student-suspension/. [Accessed: 26-Nov-2012].

[17] J. Sawyer, “Tech Insight: Better Defense Through Open Source Intelligence,” Dark Reading, 18-Nov-2012. [Online]. Available: http://www.darkreading.com/security/vulnerabilities/240142294/tech-insight-better-defense-through-open-source-intelligence.html. [Accessed: 19-Nov-2012].

[18] N. Shachtman, “They Cracked This 250-Year-Old Code, and Found a Secret Society Inside,” Danger Room, 16-Nov-2012. [Online]. Available: http://www.wired.com/dangerroom/2012/11/ff-the-manuscript/. [Accessed: 20-Nov-2012].

 

Leave a Reply

%d bloggers like this: