Num documento da Organização de transparência WikiLeaks, referente aos arquivos Hacking Team (uma empresa de TI com sede em Milão, que vende ferramentas para ataques de acesso e vigilância), relata, numa série de emails, que a NSA (National Security Agency - NSA) se infiltrou na  The Internet Engineering Task Force (IETF®O objetivo tem como alvo a coleta de informações, mas, presumivelmente, também para influenciar as discussões do fórum que visa a melhora da segurança da internet. O esforço da NSA e seus parceiros, como a agência de inteligência britânica GCHQ - Government Communications Headquarters, tem o intuito de contornar os mecanismos de segurança da WEB, em alguns casos tentando enfraquecer os padrões de criptografia:


<p style = "color: rgb (41, 46, 104); família-fonte: Arial, Helvetica, sans-serif; line-height: normal;"> O The Internet Engineering Task Force (IETF®) não tem membros como tal, apenas participantes de um grande variedade de empresas e outras organizações que têm interesse na forma como a Internet se desenvolve. A adoção de seus padrões é voluntária e, como resultado, às vezes é desigual, mas eles são usados. Este é um fórum chave para a padronização do Web-RTC e da Internet das coisas, por exemplo, e o local onde nasceu o protocolo de comunicações IPv6. E a segurança agora é uma prioridade muito alta em muitos desses aspectos díspares. </ P>

<p style = "color: rgb (41, 46, 104); família de fontes: Arial, Helvetica, sans-serif; line-height: normal;"> Com a confiança na Internet tendo sido seriamente abalada pelas revelações de Snowden, batalha está de volta. Em maio do ano passado, o IETF publicou um documento de “melhores práticas” afirmando categoricamente que “o monitoramento pervasivo é um ataque a liberdade individual e quebra de privacidade dos usuários da NET ”. Stephen Farrell, um dos co-autores do documento e um dos dois diretores da área de segurança da IETF, explicou que esta nova  postura significava concentrar-se na incorporação da segurança em uma variedade de projetos diferentes em que a IETF está trabalhando. </ p>

<p style = "color: rgb (41, 46, 104); font-family: Arial, helvética, sans-serif; line-height: normal;"> Recentemente, o Der Spiegel da Alemanha publicou detalhes de alguns dos esforços da NSA. e seus parceiros, como a agência de inteligência britânica GCHQ, para contornar os mecanismos de segurança da Internet, em alguns casos tentando enfraquecer os padrões de criptografia. A revista afirmou que os agentes da NSA vão às reuniões da IETF "para coletar informações, mas presumivelmente também para influenciar as discussões lá", referindo-se em particular a uma página da Wiki do GCHQ que incluiu uma revisão de uma reunião da IETF em San Diego há alguns anos. / p>



CS-I News: Aviation Safety, Mass Surveillance Fightback, Darknet Arrests, AI, ISIS

Email-ID305086
Date2015-01-08 14:00:40 UTC
Frominfo@cybersecurity-intelligence.com
Toinfo@hackingteam.com
Received: from relay.hackingteam.com (192.168.100.52) by
 EXCHANGE.hackingteam.local (192.168.100.51) with Microsoft SMTP Server id
 14.3.123.3; Thu, 8 Jan 2015 15:01:03 +0100
Received: from mail.hackingteam.it (unknown [192.168.100.50]) by
 relay.hackingteam.com (Postfix) with ESMTP id 83111600EE; Thu,  8 Jan 2015
 13:41:23 +0000 (GMT)
Received: by mail.hackingteam.it (Postfix) id BAA6A2BC0F1; Thu,  8 Jan 2015
 15:01:03 +0100 (CET)
Delivered-To: info@hackingteam.com
Received: from manta.hackingteam.com (manta.hackingteam.com [192.168.100.25])
 by mail.hackingteam.it (Postfix) with ESMTP id B1CBF2BC047 for
 <info@hackingteam.com>; Thu,  8 Jan 2015 15:01:03 +0100 (CET)
X-ASG-Debug-ID: 1420725646-066a754e8d9f0d0001-NmYfmv
Received: from mail32.wdc01.mcdlv.net (mail32.wdc01.mcdlv.net
 [205.201.129.32]) by manta.hackingteam.com with ESMTP id aBbL6KMIo227Yasa for
 <info@hackingteam.com>; Thu, 08 Jan 2015 15:00:47 +0100 (CET)
X-Barracuda-Envelope-From: bounce-mc.us3_25286147.814793-info=hackingteam.com@mail32.wdc01.mcdlv.net
X-Barracuda-IPDD: Level1 [mail32.wdc01.mcdlv.net/205.201.129.32]
X-Barracuda-Apparent-Source-IP: 205.201.129.32
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; s=k1; d=mail32.wdc01.mcdlv.net;
 h=Subject:From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=info=3Dcybersecurity-intelligence.com@mail32.wdc01.mcdlv.net;
 bh=Ax61gWwqBjgQjGwgt/33UieuhHs=;
 b=QVIBi60C19gwvKVcf35srLtIF7TPgffXoeGNsFXjvHGG9k7yyVZ6r79cdQWPMLLWwFqlQQBFslIu
   ynsoQR+hrfu5cr24uOHDS2SKurFsSqTlxO3sDSpXfcOch6B9DUoifZlnZKvS+ApkEhorn8o6BETd
   lmhSC2d8gy4B5ed6UD8=
DomainKey-Signature: a=rsa-sha1; c=nofws; q=dns; s=k1; d=mail32.wdc01.mcdlv.net;
 b=Agcfob/2rn9oue5UJJFhm67nQ54FJFb1Kn1U8rN0FVlx/5EJlWkzAFZRYSsfVwBWOquZp+pixoph
   ICmjGkBnVlE5V1UnJE+jcAQ1TJ8CbU1sOJrmBwk5fKw3NNGRD4MdRNVSrmvJYinZV5mqysuEee4e
   agLjrjWZl5PlvMj6sM0=;
Received: from (127.0.0.1) by mail32.wdc01.mcdlv.net id hlq6ou174e0i for
 <info@hackingteam.com>; Thu, 8 Jan 2015 14:00:40 +0000 (envelope-from
 <bounce-mc.us3_25286147.814793-info=hackingteam.com@mail32.wdc01.mcdlv.net>)
Subject: =?utf-8?Q?CS=2DI=20News=3A=20Aviation=20Safety=2C=20Mass=20Surveillance=20Fightback=2C=20=20Darknet=20Arrests=2C=20AI=2C=20ISIS?=
From: =?utf-8?Q?Cyber=20Security=20Intelligence?=
 <info@cybersecurity-intelligence.com>
X-ASG-Orig-Subj: =?utf-8?Q?CS=2DI=20News=3A=20Aviation=20Safety=2C=20Mass=20Surveillance=20Fightback=2C=20=20Darknet=20Arrests=2C=20AI=2C=20ISIS?=
Reply-To: =?utf-8?Q?Cyber=20Security=20Intelligence?=
 <info@cybersecurity-intelligence.com>
To: =?utf-8?Q?Hacking=20Team?= <info@hackingteam.com>
Date: Thu, 8 Jan 2015 14:00:40 +0000
Message-ID: <a7a85ac110ceb74440637343ff655f647a8.20150108140030@mail32.wdc01.mcdlv.net>
X-Mailer: MailChimp Mailer - **CID12c2e4c7baf655f647a8**
X-Campaign: mailchimpa7a85ac110ceb74440637343f.12c2e4c7ba
X-campaignid: mailchimpa7a85ac110ceb74440637343f.12c2e4c7ba
X-Report-Abuse: Please report abuse for this campaign here: http://www.mailchimp.com/abuse/abuse.phtml?u=a7a85ac110ceb74440637343f&id=12c2e4c7ba&e=f655f647a8
X-MC-User: a7a85ac110ceb74440637343f
X-Feedback-ID: 25286147:25286147.814793:us3:mc
List-ID: a7a85ac110ceb74440637343fmc list <a7a85ac110ceb74440637343f.401805.list-id.mcsv.net>
X-Accounttype: pd
List-Unsubscribe: <mailto:unsubscribe-a7a85ac110ceb74440637343f-12c2e4c7ba-f655f647a8@mailin1.us2.mcsv.net?subject=unsubscribe>, <http://cybersecurity-intelligence.us3.list-manage1.com/unsubscribe?u=a7a85ac110ceb74440637343f&id=111de05f1d&e=f655f647a8&c=12c2e4c7ba>
Sender: Cyber Security Intelligence
 <info=cybersecurity-intelligence.com@mail32.wdc01.mcdlv.net>
x-mcda: FALSE
X-Barracuda-Connect: mail32.wdc01.mcdlv.net[205.201.129.32]
X-Barracuda-Start-Time: 1420725647
X-Barracuda-URL: http://192.168.100.25:8000/cgi-mod/mark.cgi
X-Barracuda-BRTS-Status: 1
X-Virus-Scanned: by bsmtpd at hackingteam.com
X-Barracuda-Spam-Score: 0.82
X-Barracuda-Spam-Status: No, SCORE=0.82 using global scores of TAG_LEVEL=3.5 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=8.0 tests=ADVANCE_FEE_1, BSF_SC5_SA210e, HTML_MESSAGE, MIME_QP_LONG_LINE, MIME_QP_LONG_LINE_2
X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.14081
 Rule breakdown below
  pts rule name              description
 ---- ---------------------- --------------------------------------------------
 0.00 HTML_MESSAGE           BODY: HTML included in message
 0.00 MIME_QP_LONG_LINE      RAW: Quoted-printable line longer than 76 chars
 0.82 MIME_QP_LONG_LINE_2    RAW: Quoted-printable line longer than 76 chars
 0.00 ADVANCE_FEE_1          Appears to be advance fee fraud (Nigerian 419)
 0.00 BSF_SC5_SA210e         Custom Rule SA210e
Return-Path: bounce-mc.us3_25286147.814793-info=hackingteam.com@mail32.wdc01.mcdlv.net
X-MS-Exchange-Organization-AuthSource: EXCHANGE.hackingteam.local
X-MS-Exchange-Organization-AuthAs: Internal
X-MS-Exchange-Organization-AuthMechanism: 10
MIME-Version: 1.0
Content-Type: multipart/mixed;
 boundary="--boundary-LibPST-iamunique-783489455_-_-"


----boundary-LibPST-iamunique-783489455_-_-
Content-Type: text/html; charset="utf-8"

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html><head><!-- This is a simple example template that you can edit to create your own custom templates -->
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
        <!-- Facebook sharing information tags -->
        <meta property="og:title" content="CS-I News: Aviation Safety, Mass Surveillance Fightback,  Darknet Arrests, AI, ISIS">

        <title>CS-I News: Aviation Safety, Mass Surveillance Fightback,  Darknet Arrests, AI, ISIS</title>
 
<style type="text/css">
  #outlook a{
   padding:0;
  }
  body{
   width:100% !important;
  }
  body{
   -webkit-text-size-adjust:none;
  }
  body{
   margin:0;
   padding:0;
  }
  img{
   border:none;
   font-size:14px;
   font-weight:bold;
   height:auto;
   line-height:100%;
   outline:none;
   text-decoration:none;
   text-transform:capitalize;
  }
  #backgroundTable{
   height:100% !important;
   margin:0;
   padding:0;
   width:100% !important;
  }
  body,.backgroundTable{
   background-color:#9090BA;
  }
  #templateContainer{
   border:1px solid #FFFFFF;
  }
  h1,.h1{
   color:#000000;
   display:block;
   font-family:Arial;
   font-size:26px;
   font-weight:bold;
   line-height:100%;
   margin-bottom:10px;
   text-align:left;
  }
  h2,.h2{
   color:#292e68;
   display:block;
   font-family:Arial;
   font-size:22px;
   font-weight:bold;
   line-height:100%;
   margin-bottom:10px;
   text-align:left;
  }
  h3,.h3{
   color:#9090BA;
   display:block;
   font-family:Arial;
   font-size:18px;
   font-weight:bold;
   line-height:100%;
   margin-bottom:10px;
   text-align:left;
  }
  h4,.h4{
   color:#FFFFFF;
   display:block;
   font-family:Arial;
   font-size:18px;
   font-weight:bold;
   line-height:100%;
   margin-bottom:10px;
   text-align:left;
  }
  #templatePreheader{
   background-color:#9090BA;
  }
  .preheaderContent div{
   color:#292E68;
   font-family:Arial;
   font-size:10px;
   line-height:100%;
   text-align:left;
  }
  .preheaderContent div a:link,.preheaderContent div a:visited{
   color:#FFFFFF;
   font-weight:normal;
   text-decoration:underline;
  }
  .preheaderContent div img{
   height:auto;
   max-width:600px;
  }
  #templateHeader{
   background-color:#292E68;
   border-bottom:0;
  }
  .headerContent{
   color:#FFFFFF;
   font-family:Arial;
   font-size:34px;
   font-weight:bold;
   line-height:100%;
   padding:0;
   text-align:left;
   vertical-align:middle;
  }
  .headerContent a:link,.headerContent a:visited{
   color:#336699;
   font-weight:normal;
   text-decoration:underline;
  }
  #headerImage{
   height:auto;
   max-width:600px !important;
  }
  #templateContainer,.bodyContent{
   background-color:#ffffff;
  }
  .bodyContent div{
   color:#000000;
   font-family:Arial;
   font-size:14px;
   line-height:150%;
   text-align:left;
  }
  .bodyContent div a:link,.bodyContent div a:visited{
   color:#9090BA;
   font-weight:normal;
   text-decoration:underline;
  }
  .bodyContent img{
   display:inline;
   margin-bottom:10px;
  }
  #templateFooter{
   background-color:#FDFDFD;
   border-top:0;
  }
  .footerContent div{
   color:#292E68;
   font-family:Arial;
   font-size:12px;
   line-height:125%;
   text-align:left;
  }
  .footerContent div a:link,.footerContent div a:visited{
   color:#292E68;
   text-decoration:underline;
  }
  .footerContent img{
   display:inline;
  }
  #social{
   background-color:#FFFFFF;
   border:1px solid #FFFFFF;
  }
  #social div{
   text-align:center;
  }
  #utility{
   background-color:#FDFDFD;
   border-top:1px solid #F5F5F5;
  }
  #utility div{
   text-align:center;
  }
  #monkeyRewards img{
   max-width:160px;
  }
</style></head>
    <body leftmargin="0" marginwidth="0" topmargin="0" marginheight="0" offset="0" style="-webkit-text-size-adjust: none;margin: 0;padding: 0;background-color: #9090BA;width: 100% !important;">
     <center>
         <table border="0" cellpadding="0" cellspacing="0" height="100%" width="100%" id="backgroundTable" style="margin: 0;padding: 0;height: 100% !important;width: 100% !important;">
             <tr>
                 <td align="center" valign="top">
                        <!-- // Begin Template Preheader \\ -->
                        <table border="0" cellpadding="5" cellspacing="0" width="580" id="templatePreheader" style="background-color: #9090BA;">
                            <tr>
                                <td valign="top" class="preheaderContent">

                                 <!-- // Begin Module: Standard Preheader \\ -->
                                    <table border="0" cellpadding="5" cellspacing="0" width="100%">
                                     <tr>
                                         <td valign="top">
                                             <div style="color: #292E68;font-family: Arial;font-size: 10px;line-height: 100%;text-align: left;">
                                                 Welcome to the Cyber Security Intelligence newsletter</div>
                                            </td>
                                            <td valign="top" width="180">
                                             <div style="color: #292E68;font-family: Arial;font-size: 10px;line-height: 100%;text-align: left;">
                                                 <!--
 -->Is this email not displaying correctly?<br><a href="http://us3.campaign-archive2.com/?u=a7a85ac110ceb74440637343f&amp;id=12c2e4c7ba&amp;e=f655f647a8" target="_blank" style="color: #FFFFFF;font-weight: normal;text-decoration: underline;">View it in your browser</a>.<!--
 -->
                                                </div>
                                            </td>
                                        </tr>
                                    </table>
                                 <!-- // End Module: Standard Preheader \\ -->

                                </td>
                            </tr>
                        </table>
                        <!-- // End Template Preheader \\ -->
                     <table border="0" cellpadding="0" cellspacing="0" width="580" id="templateContainer" style="border: 1px solid #FFFFFF;background-color: #ffffff;">
                         <tr>
                             <td align="center" valign="top">
                                    <!-- // Begin Template Header \\ -->
                                 <table border="0" cellpadding="0" cellspacing="0" width="100%" id="templateHeader" style="background-color: #292E68;border-bottom: 0;">
                                        <tr>
                                            <td width="300" class="headerContent" style="color: #FFFFFF;font-family: Arial;font-size: 34px;font-weight: bold;line-height: 100%;padding: 0;text-align: left;vertical-align: middle;">

                                             <!-- // Begin Module: Standard Header Image \\ -->
                                              <img src="http://www.nonamenoslogan.com/mail/logo.gif" alt="Cyber Security Intelligence" border="0" style="margin: 0;padding: 0;max-width: 600px;border: none;font-size: 14px;font-weight: bold;height: auto;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;" id="headerImage campaign-icon">
                                             <!-- // End Module: Standard Header Image \\ --></td>
                                            <td width="300" class="headerContent" style="text-align: right;color: #FFFFFF;font-family: Arial;font-size: 34px;font-weight: bold;line-height: 100%;padding: 0;vertical-align: middle;"><a href="http://cybersecurity-intelligence.us3.list-manage1.com/track/click?u=a7a85ac110ceb74440637343f&amp;id=d695fd7536&amp;e=f655f647a8" style="color: #336699;font-weight: normal;text-decoration: underline;"><img src="http://www.nonamenoslogan.com/mail/twitter.gif" alt="Follow Us On Twitter" style="max-width: 600px;border: none;font-size: 14px;font-weight: bold;height: auto;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;"></a></td>
                                        </tr>
                                        <tr>
                                          <td colspan="2" class="headerContent" style="color: #FFFFFF;font-family: Arial;font-size: 34px;font-weight: bold;line-height: 100%;padding: 0;text-align: left;vertical-align: middle;"><span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;">&nbsp;&nbsp;&nbsp; Captured, Organised &amp; Accessible</span></td>
                                        </tr>
                                    </table>
                                 <!-- // End Template Header \\ -->
                                </td>
                            </tr>
                         <tr>
                             <td align="center" valign="top">
                                    <!-- // Begin Template Body \\ -->
                                 <table border="0" cellpadding="10" cellspacing="0" width="600" id="templateBody">
                                     <tr>
                                            <td valign="top" class="bodyContent" style="background-color: #ffffff;">

                                                <!-- // Begin Module: Standard Content \\ -->
                                                <table border="0" cellpadding="10" cellspacing="0" width="100%">
                                                    <tr>
                                                        <td valign="top">
                                                            <div style="color: #000000;font-family: Arial;font-size: 14px;line-height: 150%;text-align: left;"><h1 style="font-size: 20px;color: rgb(41, 46, 104);font-family: Arial, Helvetica, sans-serif;line-height: normal;display: block;font-weight: bold;margin-bottom: 10px;text-align: left;"><span class="h2" style="color: #292e68;display: block;font-family: Arial;font-size: 22px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:24px">January Newsletter #1 2015</span></span></h1>

<h2 style="font-size: 16px;margin-top: 30px;font-family: Arial, Helvetica, sans-serif;line-height: normal;color: #292e68;display: block;font-weight: bold;margin-bottom: 10px;text-align: left;"><span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:21px">Will Hackers cause an aviation disaster in 2015?</span></span></h2>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><img align="right" height="200" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/c2eb7e24-5c88-4ce2-afe0-248d8fcdefe8.jpg" style="width: 330px;height: 200px;margin: 5px 0px 10px 10px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="330">Cyber crime is a serious threat to safety in the skies as an aviation industry heavyweight&nbsp;said recently, vowing to fight the growing problem. Hackers, cyber criminals and other “terrorists” are stealing information but in a worst-case scenario could endanger lives by tampering with airline systems. Among the organisations getting together to take action against hacking are the International Air Transport Association (IATA) that signed a new cyber security agreement, formalising their front against cyber crime.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">“Our common goal in developing this agreement is to work more effectively together to establish and promote a robust cyber security culture and strategy for the benefit of all actors in our industry,” said Raymond Benjamin, secretary general of the International Civil Aviation Organization (ICAO).</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">He added: “As technologies rapidly evolve and become more readily accessible to all, cyber threats cannot be ignored.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">“This is an important new area of aviation security concern and our global community will ensure that it is met with a strong level of commitment and response.” &nbsp; <a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&amp;id=e1fb974ffe&amp;e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;"><span style="font-size:11px">mybroadband</span></a></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span class="h2" style="color: #292e68;display: block;font-family: Arial;font-size: 22px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:12px"><strong><em>The problem of cyber attacks on airline systems is seen as a real and growing issue and one that could cause serious problems in 2015 before &nbsp;improved cyber security systems are put in place.</em></strong></span></span></span></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:17px"><strong style="font-weight:bold"><span style="font-size:19px">Mass Surveillance: </span><span style="font-size:16px">The Internet’s best engineers are fighting back</span></strong></span></span></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">The Internet Engineering Task Force (IETF) has played down suggestions that the NSA is weakening the security of the Internet through its standardization processes, and has insisted that the nature of those processes will result in better online privacy for all.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><img align="left" height="142" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/d174ad2a-7500-4c80-b3d8-653c8a7ca9b5.jpg" style="width: 245px;height: 142px;margin: 5px 10px 5px 0px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="245">After the Snowden documents dropped in mid 2013, the IETF said it was going to do something about mass surveillance. After all, the Internet technology standards body is one of the groups that’s best placed to do so and a year and a half after the NSA contractor blew the lid on the activities of the NSA and its international partners, it looks like real progress is being made.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">The IETF doesn’t have members as such, only participants from a huge variety of companies and other organizations that have an interest in the way the Internet develops. Adoption of its standards is voluntary and as a result sometimes patchy, but they are used. This is a key forum for the standardization of Web-RTC and the Internet of Things, for example, and the place where the IPv6 communications protocol was born. And security is now a very high priority across many of these disparate strands.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">With trust in the Internet having been severely shaken by Snowden’s revelations, the battle is back on. In May last year, the IETF published a “best practice” document stating baldly that, “pervasive monitoring is an attack.” Stephen Farrell, one of the document’s co-authors and one of the two IETF Security Area Directors, explained that this new stance meant focusing on embedding security in a variety of different projects that the IETF is working on.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Recently Germany’s Der Spiegel published details of some of the efforts by the NSA and its partners, such as British signals intelligence agency GCHQ, to bypass Internet security mechanisms, in some cases by trying to weaken encryption standards. The piece stated that NSA agents go to IETF meetings “to gather information but presumably also to influence the discussions there,” referring in particular to a GCHQ Wiki page that included a write-up of an IETF gathering in San Diego some years ago.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Snowden’s revelations prompted a fundamental rethink within the IETF about what kind of security the Internet should be aiming for overall. Specifically, the IETF is in the process of formalizing a concept called “opportunistic security” whereby, even if full end-to-end security isn’t practical for whatever reason, some security is now officially recognized as being better than nothing.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Facebook and Google have stepped up mail-server-to-mail-server encryption in the wake of Snowden. Facebook sends a lot of emails to its users and, according to Farrell, 90 percent of those are now encrypted between servers. Google has also done a lot of work to send encrypted mail to more providers.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Meanwhile, a separate working group is trying to develop a new DNS Private Exchange (DPRIVE) mechanism to make DNS transactions – where someone enters a web address and a Domain Name System server translates it to a machine-friendly IP address – more private. &nbsp; <a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&amp;id=4291217d5c&amp;e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;"><span style="font-size:11px">gigaom</span></a></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:18px"><strong style="font-weight:bold">Artificial Intelligence &amp; The US Military’s New Year Resolution</strong></span></span></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">In November, US Undersecretary of Defense Frank Kendall quietly issued a memo to the Defense Science Board that could go on to play a role in history. The memo calls for a new study that would “identify the science, engineering, and policy problems that must be solved to permit greater operational use of autonomy across all war-fighting domains…Emphasis will be given to exploration of the bounds-both technological and social-that limit the use of autonomy across a wide range of military operations.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><img align="left" height="213" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/6050c4d6-f0b7-4e72-802d-9d6e02566b36.jpg" style="width: 236px;height: 213px;margin: 5px 10px 10px 0px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="236">The study will ask questions such as: What activities cannot today be performed autonomously? When is human intervention required? What limits the use of autonomy? How might we overcome those limits and expand the use of autonomy in the near term as well as over the next 2 decades?” In the event that robots one day attempt to destroy humanity, 2014 will be remembered as the year that two of technology’s great geek heroes, Elon Musk and Stephen Hawking, predicted it would happen. And if that never comes to pass, 2014 will go down as the year two of the world’s smartest people had a media panic attack about robots for no reason.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">In August, Musk tweeted that artificial intelligence could be more dangerous than nuclear weapons and in October, likened it to “summoning a demon.” Hawking, meanwhile, told the BBC in December that humanistic artificial intelligence could “spell the end of the human race.” The context for the claim was a discussion of the AI aide that helps Hawking to speak despite the theoretical physicist’s crippling ALS.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">The route to a humanistic artificial brain is as murky as ever. Inventor and Google director of engineering Ray Kurzweil has suggested that it will only be possible only after humanity creates a map of the human brain accurate to the sub-cellular level, a prize that seems far off.<br>
Elon Musk’s freak-out was prompted not by any technological breakthrough but by philosopher Nick Bostrom’s book titled Super Intelligence (Oxford 2014).</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">It’s a remarkable read for many reasons, but principally, it offers a deep exploration of a threat for which there is no precedence or any real world example in the present day. It is a text of brilliant speculation rather than observation. Here’s how Bostrom describes the inevitable rise of malevolent super-intelligence in chapter six, evolving from a limited AI program, somewhat like Siri, but one capable of recursive learning.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">In his book&nbsp;<em><strong>Moral Machines</strong></em>, Wallach, with co-author Colin Allen, argues convincingly that a robotic intelligence need not be “super” or even particularly smart in order to be extremely dangerous. It needs only to have the authority, autonomy if you will, to make extremely important, life or death, decisions.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">“Within the next few years, we predict there will be a catastrophic incident brought about by a computer system making a decision independent of human oversight,” the authors write. “Already, in October 2007, a semiautonomous robotic cannon deployed by the South African army malfunctioned, killing 9 soldiers and wounding others… although early reports conflicted about whether it was a software or hardware malfunction. The potential for an even bigger disaster will increase as such machines become more fully autonomous.”</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Earlier this year, the Defense Advanced Research Projects Agency, or DARPA, put out a proposal for a system, called the Aircrew Labor In-Cockpit Automation System, to effectively automate most of the piloting of an aircraft, in order to “reduce pilot workload,” according to the agency. Even those planes that are piloted are becoming less so.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Then, of course, there are unmanned systems, which usually require a two-person team, at least. But that’s rapidly changing. The high-tech, largely classified RQ-180, developed by Northrup Grumman, will show off new more autonomous features, in addition to stealth capabilities unprecedented in a UAV when it becomes operational. It’s currently in testing.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Of course, the United States military isn’t the only player building autonomy robotic systems, either weapons or consumer devices. For example, Google’s self-driving cars are legal and in-use in several US states at this point. in any kind of military domain where lives are at stake.”</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">In conversation with Defense One, the Pentagon official reiterated that point, that regardless of what the military does or does not build, the national security community has a big interest in understanding the possibilities and limitations of AI, especially as those will be tested by other nations, by corporations and by hobbyists. &nbsp; <a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&amp;id=51ad1cc85f&amp;e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;"><span style="font-size:11px">defenseone</span></a></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:21px"><strong style="font-weight:bold">Huge Raid Shuts Down Over 400 &nbsp;Dark Net sites</strong></span></span></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Silk Road 2.0 and 400 other sites believed to be selling illegal items including drugs and weapons have been shut down. The sites operated on the Tor network, which is a more secure software for Internet search - a system that also gives access to otherwise hard-to-reach parts of the net.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><img align="right" height="153" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/4462e77b-d978-4f01-8ec0-c97203532490.jpg" style="width: 275px;height: 153px;margin: 5px 0px 5px 10px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="275">The joint operation between 16 European countries and the US saw 17 arrests, including Blake Benthall who is said to be behind Silk Road 2.0. Experts believe the shutdown represents a breakthrough for fighting cybercrime. Six Britons were also arrested, including a 20-year-old man from Liverpool, a 19-year-old man from New Waltham, a 30 year-old-man from Cleethorpes and a man and woman, both aged 58, from Aberdovey, Wales. All were interviewed and bailed according to the UK &nbsp;National Crime Agency.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">As well as providing anonymous access to legitimate sites, Tor also lets people hide their visits to thousands of illegal marketplaces, trading in drugs, child abuse images as well as sites for extremist groups. It was the operation last year to take down the drugs marketplace Silk Road, which was the first major success in the battle against criminal use of the dark net.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Now this much bigger operation involving global cooperation amongst law enforcement agencies sees that battle taken to a new level, with Silk Road 2.0 amongst 400 sites closed. Still, the number of arrests may be telling - 400 sites closed, but just 17 arrests. That would suggest there is a lot of work still to be done. Silk Road 2.0 was resurrected after the original Silk Road site was shut down and its alleged owner arrested. The operation also saw the seizure of Bitcoins worth approximately $1m (£632,000).</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Tor is a special way to access the Internet that requires software, known as the Tor Browser bundle, to use it. The name is an acronym for The Onion Router - just as there are many layers to the vegetable, there are many layers of encryption on the network. It was originally designed by the US Naval Research Laboratory, and continues to receive funding from the US State Department.<br>
<br>
<span style="color:rgb(41, 46, 104); font-family:arial,helvetica,sans-serif; line-height:normal">It attempts to hide a person's location and identity by sending data across the Internet via a very circuitous route involving several &quot;nodes&quot; - which, in this context, means using volunteers' PCs and computer servers as connection points. Encryption applied at each hop along this route makes it very hard to connect a person to any particular activity.</span></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><img align="none" height="225" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/9b55c29e-1b7d-4cef-b037-b5c448486ca6.jpg" style="width: 400px;height: 225px;margin: 10px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="400"><br>
Tor hides a user's identity by routing their traffic through a series of other computers. And Tor's users include the military, law enforcement officers and journalists - who use it as a way of communicating with whistle-blowers - as well as members of the public who wish to keep their browser activity secret. But it has also been associated with illegal activity, allowing people to visit sites offering illegal drugs for sale and access to child abuse images, which do not show up in normal search engine results and would not be available to those who did not know where to look. &nbsp; <a href="http://cybersecurity-intelligence.us3.list-manage1.com/track/click?u=a7a85ac110ceb74440637343f&amp;id=4efc99bf8e&amp;e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;"><span style="font-size:11px">bbc</span></a>&nbsp; &nbsp;&nbsp;<a href="http://cybersecurity-intelligence.us3.list-manage1.com/track/click?u=a7a85ac110ceb74440637343f&amp;id=e848b8c80a&amp;e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;"><span style="font-size:11px">torproject</span></a></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span class="h2" style="color: #292e68;display: block;font-family: Arial;font-size: 22px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:12px"><strong><em>Many experts believe that this is an ongoing process and that Tor 3.0 which is now available will become more viable and sophisticated.</em></strong></span></span></span></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:21px"><strong style="font-weight:bold">Cyber Security Insurance Underwriters Demand&nbsp;their Clients Understand the Threat Landscape</strong></span></span></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Insurance underwriters aren't looking for companies impervious to risk. They want clients that understand the threat landscape and have demonstrated abilities to mitigate attacks.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">With security breaches on the rise, IT professionals spend a lot of time questioning what kinds of cyber risk their companies’ insurance policies will cover. However, as those policies quickly move from optional to necessary, insurance companies are the ones asking the hard questions.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><img align="right" height="206" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/dc5b104b-a368-4805-8706-c7dc3090a9ea.png" style="width: 245px;height: 206px;margin: 5px 0px 5px 10px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="245">Before underwriters give the green light to cyber liability coverage, they want to see proof of insurability. That doesn’t mean they’re looking at your actuarial risk. To the contrary, regardless of past history, virtually every company today is susceptible to hacking or insider threats. That is the new reality. Therefore, insurance companies are focusing on factors beyond historic risk to inform their decisions.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">When you seek out cyber insurance, underwriters will ask that you demonstrate your insurability as part of the pre-binding due diligence process. Doing so involves three primary factors:</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><strong><em>Your understanding of cyber risk&nbsp;</em></strong>The days when cyber risk was considered an IT problem are over. Today, cyber risk is an issue your entire business must address. In order to demonstrate that your organization fully understands the scope of cyber risk, evaluate it in a holistic manner. Consider the many directions from which an attack might come, the many forms it might take, the many information assets it might target, and the many motives that might spur it. Possibilities might include:</p>

<ul style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; font-size: medium; line-height: normal;">
 <li style="font-size: 14px;">A hacker group that views your company as an attractive political target</li>
 <li style="font-size: 14px;">A trusted insider who could be enticed to sell your intellectual property to a competitor</li>
 <li style="font-size: 14px;">One of your third-party service providers that is vulnerable to a malware attack, which could also expose your customers’ personally identifiable information</li>
</ul>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Savvy companies know that the risks come in many forms, so be ready to explain what policies and tools you have in place to address a variety of threats.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><strong><em>Your ability to mitigate a cyber attack</em></strong>&nbsp;The ultimate goal for any security strategy is to prevent an attack from occurring in the first place, but unfortunately that’s not entirely reasonable. The next best thing is to minimize the harm it causes. No company is entirely inoculated from risk, but those that are prepared for it in advance suffer less. To prepare, your company needs to understand the threat landscape outlined above. That means assessing real-time risk across the entire ecosystem of your business: upstream, downstream, and inside your own organization. Unless you’re evaluating your weaknesses in a holistic manner, you won’t convince an insurer of your ability to identify an attack, never mind stop one.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">You’ll need to show underwriters that you’re serious about security by conducting a holistic risk assessment before you face any known threats. Gather intelligence about which assets are your highest priorities, and which are most exposed. Then, align your security investments and resources to address those vulnerabilities. This can include a combination of perimeter and end-point solutions, and should incorporate extensive employee training. Showing that your organization has a strong cyber security culture goes a long way toward establishing security maturity.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><strong><em>Your likelihood of returning to business operations quickly&nbsp;</em></strong>Cyber insurers know that your business is at risk -- all businesses are. However, you can increase your organization’s chances of receiving a policy by demonstrating cyber resilience. Do this by adopting mature security practices, continuously assessing risk, and creating a plan for business continuity during and after an attack. This is of great interest to cyber insurance underwriters, who want to see that you can stem data loss, protect your brand, and retain customer loyalty, even after an attack. All parties will benefit from an organization’s ability to mitigate risk, shorten attacks, and get back to business quickly, thereby reducing losses.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Insurance underwriters aren’t looking for clients that are impervious to cyber risk. There are no longer any companies that fall into that category, unfortunately. What they are looking for are businesses that understand the threat landscape and their own risks and have established a cyber security culture demonstrated through mature security practices. As you seek out the most beneficial cyber insurance policy your company can find, be prepared to prove that your organization is committed to not only improving its cyber security company-wide, but also to reducing data and financial loss resulting from an attack. &nbsp; <a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&amp;id=8c8e8dfe65&amp;e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;"><span style="font-size:11px">darkreading</span></a></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><span style="font-size:21px"><strong style="color:rgb(144, 144, 186); font-size:18px; font-weight:bold; line-height:18px">2025: &nbsp;Experts predict a m</strong><strong style="color:rgb(144, 144, 186); font-family:arial; font-size:18px; font-weight:bold; line-height:18px">ajor Cyber Attack will cause significant loss of life&nbsp;</strong></span><br>
<br>
A major cyber attack will happen between now and 2025 and it will be large enough to cause “significant loss of life or property losses/damage/theft at the levels of tens of billions of dollars,” according to more than 60 percent of technology experts interviewed by the Pew Internet and American Life Project. But other experts interviewed for the project “Digital Life in 2015,” released Wednesday, said the current preoccupation with cyber conflict is product of software merchants looking to hype public anxiety against an eternally unconquerable threat.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><img align="left" height="182" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/2abcdb93-2bd2-4da9-a12d-3c15b358854f.jpg" style="width: 325px;height: 182px;margin: 5px 10px 5px 0px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="325">You may believe that a major cyber attack is likely to occur between now and 2025, or you may view the entire cyber menace as a scheme by security software companies. (The truth may be a mixture of both.) However, one thing that the threat of cyberwar will certainly do is increase the amount of computer, and particularly network government, surveillance to detect “anomalous behaviors,” possibly related to cyber attacks. The same recently released Pentagon paper on offensive cyber operations made a pointed mention of networks and the cloud as a potential source of signals intelligence of relevance to cyber-operators. Networks were “a primary target for signals intelligence (SIGINT), including computer network exploitation (CNE), measurement and signature intelligence, open source intelligence, and human intelligence.”</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Make no mistake, signals intelligence collection means watching how individuals behave online.&nbsp;As for the Pew’s 2025 date, Jason Healey, director of the Cyber Statecraft Initiative of the Atlantic Council, told Defense One that he considered it to be arbitrary. “We just don’t have a clue when it’s going to happen,” he said, adding that a single cyber attack on the scale of Pearl Harbor frightened him less than the prospect of a massive cyber failure, absent of malice but with real-time market implications.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">“I’m less concerned about attacks and more about a shock” of the size of a major market collapse, he said and argued that pre-occupation with a “cyber Pearl Harbor” ignores the “larger complexity” of the issue. “What do we do if one of these IT companies that’s too big to fail has a Lehman Brother’s moment? The data was there on Monday and is gone on Friday? If a major cloud provider fails, how do we get our data back?”</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">While Healey was incredulous that a country like Russia would launch a cyber attack resulting in loss of life, he acknowledged that much has changed between today and 1991 when the electronic Pearl Harbor concept first emerged. And the changes are coming only more rapidly, as are potential vulnerabilities.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">“The more that we plug things to the Internet, things of concrete and steel and connect them to the Internet, the more likely we are to get ourselves into the state where this will happen in 2025. The dynamic that will make that more and more true is the Internet of Things,” he said. &nbsp; <a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&amp;id=034dcefcf0&amp;e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;"><span style="font-size:11px">defenseone</span></a></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:20px"><strong style="font-weight:bold"><span style="font-size:19px">Egyptian Cyber Army:</span> <span style="font-size:18px">The Hacker Group Attacking ISIS online</span></strong></span></span></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">There's a new hacking group in cyberspace, and it's going after the Islamic State's online propaganda.<br>
<br>
After ISIS social media accounts posted a threatening message from the group's leader, the audio recording was replaced with a song and its transcript with a logo resembling that of the Egyptian military, accompanied by a writing in Arabic that read &quot;Egyptian Cyber Army.&quot; ISIS leader Abu Bakr al-Baghdadi's recording had been hacked, and the operation carried all the hallmarks of a group such as the Syrian Electronic Army.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><img align="left" height="168" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/106afcfb-dc56-4bcb-81a7-22d08d19d7d4.jpg" style="width: 299px;height: 168px;margin: 5px 10px 5px 0px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="299"></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">The Egyptian Cyber Army is clearly inspired by the infamous Syrian hacktivist group, but a spokesperson told Mashable that the group's members are all Egyptians — some civilians, some with a military or police background — all sympathizers of the Egyptian government led by former Commander-in-Chief Abdel Fattah el-Sisi. Their goal is to defend al-Sisi's governments against any opponent, such as the Muslim Brotherhood or ISIS, according to the group as well as experts who've been tracking it. With its anti-ISIS stance, the group seems to join a motley crew of hacktivists who are trying to counter the terrorist group's influence on the Internet.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Baghdadi &quot;was delivering a message to all extremists all over the Middle East and my country that you have to use your weapons in the faces of the government and our people so we took it down and replaced it with a very popular song,&quot; the spokesman of the Egyptian Cyber Army, who claimed to be a 37-year-old former Cairo police officer named Khaled Abubakr (he declined to offer any proof of his identity), told Mashable. &quot;All the people instead of hearing this pig heard our song and laughed.&quot;</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Experts who have been tracking the group confirmed to Mashable that the group's actions suggest they're pro-government and anti-ISIS, but it's unclear who is really behind the group, and whether they're sanctioned by the Egyptian government.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">We are an idea, not only a team,&quot; Abubakr said, explaining that the group is a loose-knit collective. &quot;When we started the team we accepted that all the people can work in screwing the Brotherhood or ISIS or any radical Islamic party.&quot;</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">The group has claimed to have infiltrated top Islamic State web forums, according to Laith Alkhouri, a researcher with Flashpoint Partners, a company that tracks online jihadists, but they have also claimed to have hit American pro-democracy websites like the Open Society Foundation and the U.S.-Middle East Partnership Initiative. In March, they also claimed to have jammed the signal of a popular Egyptian satirical show, though Abubakr now admits his group was not responsible for it.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Despite their claims, there's &quot;no proof or solid evidence&quot; of their hacks, according to Ramy Raoof, an Egyptian technologist and human rights advocate.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">&quot;I have never taken them seriously,&quot; he told Mashable.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Not everyone agrees, though. The group is focused on disrupting the flow of information from al-Sisi's opponents, but also on trying to compromise them and expose anonymous online activists to identify them and facilitate their arrest, according to Helmi Noman, a researcher with the Berkman Center at Harvard University and the Ciizen Lab at University of Toronto.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">&quot;They should be taken seriously because of the potential [harm] their attacks can cause, even if they use low level skills such as phishing,&quot; he told Mashable.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Ali-Reza Anghaie, a security researcher who tracks hackers online, said that &quot;some of the alleged supporters do indeed show some highly capable technical background, but I have yet to see a substantial claim of military background.&quot;</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">As for their apparent connection to the Syrian Electronic Army, it seems like it stops at the name. Abubakr said that while the Egyptian Electronic Army was inspired by the group, they do not &quot;cooperate with them at all,&quot; and a member of the Syrian Electronic Army told Mashable that they have nothing to do with the Egyptian group.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">The Egyptian Embassy in D.C. did not respond to Mashable's request for comment.<br>
It remains unclear how the Egyptian Cyber Army replaced Baghdadi's message. Abubakr refused to disclose how the attack went down, and a spokesman for the Internet Archive, a nonprofit digital library where the recording was hosted, said that no outside account &quot;made any modifications&quot; to the files other than the original uploader. But that doesn't rule out the possibility that the account was taken over by the hackers.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">What's next for the group? More hacks, of course, or so they claim.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">&quot;We have our people spying on al-Furqan [the media arm of ISIS] which is the media of the terrorists and this will not be the last thing we are going to do,&quot; Abubakr said. &quot;They must expect us any time.&quot; &nbsp; <a href="http://cybersecurity-intelligence.us3.list-manage2.com/track/click?u=a7a85ac110ceb74440637343f&amp;id=bac2c96796&amp;e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;"><span style="font-size:11px">snip</span></a>&nbsp;</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;"><span style="font-size:20px"><strong style="font-weight:bold">UK Police Arrest Alleged Lizard Squad Hacker</strong></span></span></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;"><img align="left" height="250" src="https://gallery.mailchimp.com/a7a85ac110ceb74440637343f/images/5bcbb710-4e47-401f-baa7-acd8103d3334.png" style="width: 150px;height: 250px;margin: 0px 10px 5px 0px;border: none;font-size: 14px;font-weight: bold;line-height: 100%;outline: none;text-decoration: none;text-transform: capitalize;display: inline;margin-bottom: 10px;" width="150">Vinnie Omari, alleged member of the Lizard Squad, the hacking crew that took down both Xbox Live and the Playstation Network on Christmas, was arrested on December 31. Omari provided details to the Daily Dot regarding the arrest and the police issued a press release announcing the raid.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">From the release: The South East Regional Organised Crime Unit (SEROCU) has arrested a 22-year-old man from Twickenham on suspicion of fraud by false representation and Computer Misuse Act offences.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">The arrest yesterday (30/12) is in connection with an ongoing investigation in to cyber fraud offences which took place between 2013 and August 2014 during which victims reported funds being stolen from their PayPal accounts.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">Omari said police took his computers, game consoles, and USB drives.</p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal;">The Lizard Squad are a loosely affiliated hacking group and are accused of taking down Xbox Live and PSN by directly attacking the game servers. The group also recently announced the launch of something called the Lizard Stresser, a paid tool that allows sysadmin to send denial of service attacks at their own servers. Omari is currently out on bail. &nbsp; <span style="font-size:11px"><a href="http://cybersecurity-intelligence.us3.list-manage1.com/track/click?u=a7a85ac110ceb74440637343f&amp;id=b980acf86f&amp;e=f655f647a8" target="_blank" style="color: #9090BA;font-weight: normal;text-decoration: underline;">techcrunch</a><span class="h3" style="color: #9090BA;display: block;font-family: Arial;font-size: 18px;font-weight: bold;line-height: 100%;margin-bottom: 10px;text-align: left;">_______________________________________________________</span></span></p>

<p style="color: rgb(41, 46, 104); font-family: Arial, Helvetica, sans-serif; line-height: normal; text-align: center;"><span style="font-size:11px"><em>The full web site is currently under development and will be available shortly</em></span></p>
</div>
              </td>
                                                    </tr>
                                                </table>
                                                <!-- // End Module: Standard Content \\ -->

                                            </td>
                                        </tr>
                                    </table>
                                    <!-- // End Template Body \\ -->
                                </td>
                            </tr>
                         <tr>
                             <td align="center" valign="top">
                                    <!-- // Begin Template Footer \\ -->
                                 <table border="0" cellpadding="5" cellspacing="0" id="templateFooter" style="background-color: #FDFDFD;border-top: 0;">
                                     <tr>
                                         <td valign="top" class="footerContent">

                                                <!-- // Begin Module: Standard Footer \\ -->
                                                <table border="0" cellpadding="5" cellspacing="0" width="100%">
                                                    <tr>
                                                        <td colspan="2" valign="middle" id="social" style="background-color: #FFFFFF;border: 1px solid #FFFFFF;">
                                                            <div style="color: #292E68;font-family: Arial;font-size: 12px;line-height: 125%;text-align: center;">
<p><strong><a href="http://cybersecurity-intelligence.us3.list-manage1.com/track/click?u=a7a85ac110ceb74440637343f&amp;id=7f92cc970f&amp;e=f655f647a8" style="color: #292E68;text-decoration: underline;">www.cybersecurity-intelligence.com</a></strong></p>
                                                                <p><a href="http://cybersecurity-intelligence.us3.list-manage.com/track/click?u=a7a85ac110ceb74440637343f&amp;id=b6ec3953cf&amp;e=f655f647a8" style="color: #292E68;text-decoration: underline;">Follow us on Twitter</a> | <a href="http://us3.forward-to-friend1.com/forward?u=a7a85ac110ceb74440637343f&amp;id=12c2e4c7ba&amp;e=f655f647a8" style="color: #292E68;text-decoration: underline;">Forward to a friend</a>&nbsp;</p>
                                                            </div>
                                                        </td>
                                                    </tr>
                                                    <tr>
                                                        <td valign="top" width="370">
                                                            <br>
                                                            <div style="color: #292E68;font-family: Arial;font-size: 12px;line-height: 125%;text-align: left;">
                                                                <em>Copyright © 2015 Cyber Security Intelligence, All rights reserved.</em>
                                                                <br>
                                                                <!--
 -->
                                                                You are on this mailing list because you are connected with Cyber Security Intelligence via Twitter and / or the 2014 InfoSecurity &amp; CyberSecurityExpo Exhibitions
                                                                <br>
                                                                <strong>Our mailing address is:</strong>
                                                                <br>
                                                                <div class="vcard"><span class="org fn">Cyber Security Intelligence</span><div class="adr"><div class="street-address">Sterling House</div><div class="extended-address">22 Hatchlands Road</div><span class="locality">Redhill</span>, <span class="region">Surrey</span>  <span class="postal-code">RH1 6RW</span> <div class="country-name">United Kingdom</div></div><br><a href="http://cybersecurity-intelligence.us3.list-manage.com/vcard?u=a7a85ac110ceb74440637343f&amp;id=111de05f1d" class="hcard-download">Add us to your address book</a></div>
                                                                <br>
                                                                <!--
 -->
                                                            </div>
                                                            <br>
                                                        </td>
                                                        <td valign="top" width="170" id="monkeyRewards">
                                                            <br>
                                                            <div style="color: #292E68;font-family: Arial;font-size: 12px;line-height: 125%;text-align: left;">
                                                            </div>
                                                            <br>
                                                        </td>
                                                    </tr>
                                                    <tr>
                                                        <td colspan="2" valign="middle" id="utility" style="background-color: #FDFDFD;border-top: 1px solid #F5F5F5;">
                                                            <div style="color: #292E68;font-family: Arial;font-size: 12px;line-height: 125%;text-align: center;">
                                                                &nbsp;<a href="http://cybersecurity-intelligence.us3.list-manage1.com/unsubscribe?u=a7a85ac110ceb74440637343f&amp;id=111de05f1d&amp;e=f655f647a8&amp;c=12c2e4c7ba" style="color: #292E68;text-decoration: underline;">unsubscribe from this list</a> | <a href="http://cybersecurity-intelligence.us3.list-manage.com/profile?u=a7a85ac110ceb74440637343f&amp;id=111de05f1d&amp;e=f655f647a8" style="color: #292E68;text-decoration: underline;">update subscription preferences</a><!--
 --> | <a href="http://us3.campaign-archive2.com/?u=a7a85ac110ceb74440637343f&amp;id=12c2e4c7ba&amp;e=f655f647a8" style="color: #292E68;text-decoration: underline;">view email in browser</a><!--
 -->&nbsp;
                                                            </div>
                                                        </td>
                                                    </tr>
                                                </table>
                                                <!-- // End Module: Standard Footer \\ -->

                                            </td>
                                        </tr>
                                    </table>
                                    <!-- // End Template Footer \\ -->
                                </td>
                            </tr>
                        </table>
                        <br>
                    </td>
                </tr>
          </table>
    </center>
<img src="http://cybersecurity-intelligence.us3.list-manage.com/track/open.php?u=a7a85ac110ceb74440637343f&amp;id=12c2e4c7ba&amp;e=f655f647a8" height="1" width="1"></body>
</html>
----boundary-LibPST-iamunique-783489455_-_---

Comentários

Postagens mais visitadas deste blog