CyberWire Daily - The CyberWire 12.28.15

Episode Date: December 28, 2015

Learn more about your ad choices. Visit megaphone.fm/adchoices...

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyber Wire Network, powered by N2K. stay home with her young son. But her maternal instincts take a wild and surreal turn as she discovers the best yet fiercest part of herself. Based on the acclaimed novel, Night Bitch is a thought-provoking and wickedly humorous film from Searchlight Pictures. Stream Night Bitch January 24 only on Disney+. Hey everybody, Dave here. Have you ever wondered where your personal information is lurking online? Like many of you, I was concerned about my data being sold by data brokers. So I decided to try DeleteMe. I have to say, DeleteMe is a game changer.
Starting point is 00:00:59 Within days of signing up, they started removing my personal information from hundreds of data brokers. I finally have peace of mind knowing my data privacy is protected. Delete.me's team does all the work for you with detailed reports so you know exactly what's been done. Take control of your data and keep your private life private by signing up for Delete.me. Now at a special discount for our listeners. private by signing up for Delete Me. Now at a special discount for our listeners, today get 20% off your Delete Me plan when you go to joindeleteme.com slash n2k and use promo code n2k at checkout. The only way to get 20% off is to go to joindeleteme.com slash n2k and enter code n2k at checkout. That's joindeleteme.com slash n2k code N2K at checkout. That's joindelete.me.com slash N2K, code N2K. responses to ISIS in cyberspace, government's involvement in Juniper Backdoor, and Iranian
Starting point is 00:02:05 group claims hack of downstate New York dam. I'm Dave Bittner in Baltimore with your Cyber Wire summary for Monday, December 28, 2015. A large distributed denial-of-service campaign continues to disrupt Turkey's servers. Online banking has been worrisomely affected, with other sectors sustaining various degrees of disruption. The.tr domain has been under attack since around December 14th, and Turkey's government has resorted to blocking inbound foreign traffic in an effort to mitigate the campaign's effects. resorted to blocking inbound foreign traffic in an effort to mitigate the campaign's effects. Anonymous claims credit for the operation, which it maintains is retaliation for Turkish support of ISIS.
Starting point is 00:02:53 Turkey naturally denies supporting ISIS. Anonymous also claims to have averted a significant terrorist action in Italy through its infiltration of ISIS communications, perhaps, the hacktivist darkly suggest, shared with various governments. Italian authorities have nothing to say on the matter. ISIS Dash over the weekend posted a new video mocking the Saudi-led Coalition Against Extremism. ISIS sympathizers also took a poke at university websites in New Jersey and small business in Texas. The fight against ISIS makes for strange bedfellows.
Starting point is 00:03:25 Russian intelligence services are said to be cooperating closely with Afghanistan's Taliban against Daesh. No government seems to have an answer to Daesh recruiting and inspirational chatter. Frustration moves some officials and policy wonks in the U.S. to talk up measures to restrict strong encryption or access to jihadist websites. And China enacts a law that mandates backdoors. But these measures are overdetermined. They would have been attractive modes of social control in any case. A nominally independent Iranian group claims credit for the New York dam hack. Downstate officials continue to press the feds for details and cast doubt on the effectiveness of cyber threat intelligence sharing measures.
Starting point is 00:04:08 The recently disclosed Juniper Network's issues remain under investigation. Many observers perceive some governments' hand in the matter. Which government or governments remains a matter of dispute. Do you know the status of your compliance controls right now? Like, right now. We know that real-time visibility is critical for security, but when it comes to our GRC programs, we rely on point-in-time checks. But get this. More than 8,000 companies, like Atlassian and Quora,
Starting point is 00:04:44 have continuous visibility into their controls with Vanta. Here's the gist. Vanta brings automation to evidence collection across 30 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done five times faster with AI. Now that's a new way to GRC. Get $1,000 off Vanta when you go to vanta.com slash cyber. That's vanta.com slash cyber for $1,000 off.
Starting point is 00:05:35 Cyber threats are evolving every second, and staying ahead is more than just a challenge. It's a necessity. That's why we're thrilled to partner with ThreatLocker, a cybersecurity solution trusted by businesses worldwide. ThreatLocker, a cybersecurity solution trusted by businesses worldwide. ThreatLocker is a full suite of solutions designed to give you total control, stopping unauthorized applications, securing sensitive data, and ensuring your organization runs smoothly and securely. Visit ThreatLocker.com today to see how a default-deny approach can keep your company safe and compliant. Joining me once again is John Petrick, editor of the Cyber Wire.
Starting point is 00:06:25 John, let's talk about information operations. In particular, what have they got to do with cybersecurity? I know the conventional wisdom is that information ops have nothing to do with hacking, viruses, Trojans, and things like that. Well, as usual, the conventional wisdom has the details right, but it's got the big picture wrong. Now, of course, information operations need have nothing at all to do with hackers, APTs, viruses, or malware of any kind. They're much broader than that. I think a good way to approach them is by understanding U.S. military doctrine. And in that doctrine, and here I'll quote Joint Pub 3-13, information operations include strategic communications, public affairs. include strategic communications, public affairs. They are the integrated employment, the manual says,
Starting point is 00:07:10 of electronic warfare, computer network operations, psychological operations, military deception, and information security in concert with specified supporting and related capabilities to, and this is the key point, influence, disrupt, corrupt, or usurp adversary of human and automated decision-making while protecting our own. That's the U.S. Department of Defense. Okay, but once again, how does cyberspace figure into information ops? So once again, I think we can return to the Department of Defense doctrine. And on that topic, it says, or what they call a cyber persona, that is an online identity that facilitates communication,
Starting point is 00:08:06 decision-making, and the influencing of audiences in the cognitive dimension. When employed in support of information operations, cyberspace operations, the manual says, generally focus on the integration of offensive and defensive capabilities exercised in and through cyberspace in concert with other measures and coordination across multiple lines of operations and lines of effort. So to step away from the language of doctrine for a minute, if you're familiar with online marketing, think of cyber information operations as online marketing and battle stress. But the target demographic isn't customers here, it's adversaries. And so are we seeing the bad guys engaging in information operations?
Starting point is 00:08:45 Yes, we are indeed. And in fact, in the case of ISIS, it's their stock and trade. Few governments worry about ISIS hacking very much in the classical sense of hacking and that their technical operations conducted against non-cooperating systems. ISIS really hasn't shown much ability in that regard. However much they'd like to, we haven't seen reports of ISIS sympathizers establishing persistent presence in networks, shutting down systems, corrupting data, or even stealing data. We have seen some website defacements.
Starting point is 00:09:14 We saw some late last week, essentially cyber vandalism. But governments still worry about ISIS in cyberspace. And they're concerned because ISIS recruits its members online, and it does so with considerable success. They're also concerned because ISIS uses the Internet to inspire acts of terrorism. They may also use it to some extent to coordinate or control terrorist actions. But to their successful inspiration of terrorists, there's no doubt. So if you could summarize, like, why is this of concern for those of us in the cybersecurity world? Yeah, today information is carried, it's stored, it's transmitted, it's even created largely in cyberspace.
Starting point is 00:09:52 And what happens in cyberspace under opposition is a security matter. Because unfortunately, what happens in cyberspace doesn't stay in cyberspace. And that makes it cybersecurity. All right, John Petrick, once again, thanks for joining us. John is the editor of the Cyber Wire. And now a message from Black Cloak. Did you know the easiest way for cyber criminals to bypass your company's defenses is by targeting your executives and their families at home? Black Cloak's award-winning
Starting point is 00:10:32 digital executive protection platform secures their personal devices, home networks, and connected lives. Because when executives are compromised at home, your company is at risk. In fact, over one-third of new members discover they've already been breached. Protect your executives and their families 24-7, 365, with Black Cloak.
Starting point is 00:10:54 Learn more at blackcloak.io. And that's The Cyber Wire. We are proudly produced in Maryland by our talented team of editors and producers. I'm Dave Bittner. Thanks for listening. Thank you. innovative uses that deliver measurable impact. Secure AI agents connect, prepare, and automate your data workflows, helping you gain insights, receive alerts, and act with ease through guided apps tailored to your role. Data is hard. Domo is easy. Learn more at ai.domo.com.
Starting point is 00:12:03 That's ai.domo.com.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.