<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TechDiem.com &#187; Security</title>
	<atom:link href="/category/security/feed/" rel="self" type="application/rss+xml" />
	<link>http://techdiem.com</link>
	<description>Your Daily Dose of Technology and Startup News</description>
	<lastBuildDate>Sat, 26 Sep 2015 10:44:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>KARMA POLICE: GCHQ spooks spied on every web user ever</title>
		<link>http://techdiem.com/2015/09/26/karma-police-gchq-spooks-spied-on-every-web-user-ever/</link>
		<comments>http://techdiem.com/2015/09/26/karma-police-gchq-spooks-spied-on-every-web-user-ever/#comments</comments>
		<pubDate>Sat, 26 Sep 2015 10:44:09 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/26/karma-police-gchq-spooks-spied-on-every-web-user-ever/</guid>
		<description><![CDATA[New documents revealing GCHQ&#8217;s mass-surveillance activities have detailed an operation codenamed KARMA POLICE, which slurped up the details of &#8220;every [&#8230;]]]></description>
				<content:encoded><![CDATA[<div align="center" style="padding-left:5px; padding-right:5px; padding-bottom:5px; padding-top:5px; margin-left:auto; margin-right:auto; ">
<script type="text/javascript"><!--
google_ad_client = "ca-pub-3784989093496765";
google_ad_width = 728;
google_ad_height = 90;
google_ad_type = "text_image";
google_color_border = "FFFFFF";
google_color_link = "0000FF";
google_color_text = "000000";
google_color_bg = "FFFFFF";
google_color_url = "008000";
//-->
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
</script>
</div>
<p>New documents revealing GCHQ&#8217;s mass-surveillance activities have detailed an operation codenamed KARMA POLICE, which slurped up the details of &#8220;every visible user on the Internet&#8221;.</p>
<p>The operation was launched in 2009, without Parliamentary consultation or public scrutiny, to record the browsing habits of &#8220;every visible user on the Internet&#8221; without the agency obtaining legal permission to do so, according to documents published by <i>The Intercept</i>.</p>
<p>KARMA POLICE was constructed between 2007 and 2008, and <a href="https://theintercept.com/document/2015/09/25/pull-steering-group-minutes/">according to slides</a> was developed with the explicit intention of correlating &#8220;every user visible to passive SIGINT with every website they visit, hence providing either (a) a web browsing profile for every visible user on the Internet, or (b) a user profile for every visible website on the Internet.&#8221;</p>
<p>Its 2009 run was particularly interested in those listening to online radio shows, although one <a href="https://firstlook.org/wp-uploads/sites/1/2015/09/cryptome.png">slide also shows</a> tracking of those who have visited <a href="http://www.theregister.co.uk/2015/09/16/cryptome_revokes_pgp_keys_after_mysterious_compromise/">spook-baiting</a> Cryptome.org, and pornography site RedTube.</p>
<p>A <a href="https://theintercept.com/document/2015/09/25/broadcast-analysis/">summary document</a> reveals that the operation affected &#8220;224,446 unique listener IP addresses over a three month period, covering approximately 108448 /24 subnets.&#8221;</p>
<p>Another programme, codenamed BLAZING SADDLES, was used to target listeners of &#8220;any one particular radio station &#8230; to understand any trends or behaviours.&#8221;</p>
<p>The summary report states how:</p>
<blockquote>
<p>A wealth of datamining techniques could be applied on small closed groups of individuals, to look for potential covert communications channels for hostile intelligence agencies running agents in allied countries, terrorist cells, or serious crime targets.</p>
</blockquote>
<p>One user was targeted, without any stated suspicion of being involved in terrorism or posing a threat to national security, and was found to have visited popular porn purveyor Redtube, as well as social media sites and several Arabic and Islamic sites, which appeared to be commercial enterprises.</p>
<p>Eric King, deputy director of Privacy International, tweeted his alarm at the revelations of GCHQ&#8217;s activities and the spooks&#8217; thoughts regarding oversight:</p>
<blockquote class="twitter-tweet" lang="en">
<p lang="en" dir="ltr">Best argument for Judicial Authorisation I&#8217;ve seen comes from GCHQs own internal documents. <a href="https://t.co/oDLjyinPKX">https://t.co/oDLjyinPKX</a> <a href="http://t.co/7MlJJlVK0x">pic.twitter.com/7MlJJlVK0x</a></p>
<p>— Eric King (@e3i5) <a href="https://twitter.com/e3i5/status/647361211982553088">September 25, 2015</a></p></blockquote>
<p><i>The Register</i> is analysing the new documents and will provide <a target="_blank" href="http://www.theregister.co.uk/2015/09/25/trillions_in_surveillance_gchq/">more reportage shortly</a>. ®</p>
<p class="wptl btm">
                    <span>Sponsored: </span><br />
                    <a href="http://go.theregister.com/tl/1391/-3629/go-beyond-apm-with-real-time-it-operations-analytics.pdf?td=wptl1391">Go beyond APM with real-time IT operations analytics</a>
                </p>
<p>Article source: TheReg <a href="http://go.theregister.com/feed/www.theregister.co.uk/2015/09/25/gchq_tracked_web_browsing_habits_karma_police/">http://go.theregister.com/feed/www.theregister.co.uk/2015/09/25/gchq_tracked_web_browsing_habits_karma_police/</a> </p><center> <script type="text/javascript"><!--
google_ad_client = "ca-pub-3784989093496765";
google_ad_width = 468;
google_ad_height = 60;
google_ad_type = "text_image";
google_color_border = "FFFFFF";
google_color_link = "0000FF";
google_color_text = "000000";
google_color_bg = "FFFFFF";
google_color_url = "008000";
//-->
</script>
<script type="text/javascript"
src="http://pagead2.googlesyndication.com/pagead/show_ads.js">
</script> </center>
]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/26/karma-police-gchq-spooks-spied-on-every-web-user-ever/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Obama brain trust sidesteps mandatory hackers&#8217; backdoor idea</title>
		<link>http://techdiem.com/2015/09/26/obama-brain-trust-sidesteps-mandatory-hackers-backdoor-idea/</link>
		<comments>http://techdiem.com/2015/09/26/obama-brain-trust-sidesteps-mandatory-hackers-backdoor-idea/#comments</comments>
		<pubDate>Sat, 26 Sep 2015 10:44:08 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/26/obama-brain-trust-sidesteps-mandatory-hackers-backdoor-idea/</guid>
		<description><![CDATA[An Obama administration working group mulled four mechanisms for breaking the encrypted smartphones of terrorist and criminal suspects before rejecting [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>An Obama administration working group mulled four mechanisms for breaking the encrypted smartphones of terrorist and criminal suspects before rejecting them all as too politically fraught or impractical.</p>
<p>While planting backdoors was &#8220;technically feasible&#8221;, each method risked becoming a focus of attacks by third parties and posed a risk to relations with tech firms, who might be less inclined to co-operate with other initiatives as a result.</p>
<p>Law enforcement officials and intel agencies have heightened warnings over the last year or so that web communications are going dark due to greater use of encryption in the latest generation of smartphones and messaging apps.</p>
<p>Spooks want access to any communications via a warrant, but that&#8217;s simply not possible if <em>well engineered</em> end-to-end encryption has been applied.*</p>
<p>The working group considered four technical methods towards implementing what is described as &#8220;accessible encryption&#8221; – an emphasis independent security experts were quick to <a target="_blank" href="https://twitter.com/thegrugq/status/647035275865014272">mock</a> as like TSA-compliant locks on suitcases.</p>
<p>One of the main candidates for working around encryption was compromising vendors&#8217; update channels, an approach deemed unwieldy and problematic because it relied on users applying updates. Forced back-up and splitting of encryption keys, an option floated by NSA director Michael S Rogers earlier this year, were also considered. Adding a new physical, encrypted port to their devices for access by law enforcement was looked at but was considered too costly.</p>
<p>“Any proposed solution almost certainly would quickly become a focal point for attacks,” said the unclassified memo, put together by officials from law enforcement, intelligence, diplomatic and economic agencies for eventual debate by Cabinet members, the <em>Washington Post</em> <a target="_blank" href="https://www.washingtonpost.com/world/national-security/obama-administration-ponders-how-to-seek-access-to-encrypted-data/2015/09/23/107a811c-5b22-11e5-b38e-06883aacba64_story.html">reported</a>.</p>
<p>“Rather than sparking more discussion, government-proposed technical approaches would almost certainly be perceived as proposals to introduce ‘backdoors’ or vulnerabilities in technology products and services and increase tensions rather [than] build cooperation,” the <a target="_blank" href="http://apps.washingtonpost.com/g/documents/world/read-the-obama-administrations-draft-paper-on-technical-options-for-the-encryption-debate/1753">memo</a> said.</p>
<p>Instead of developing a 21st century equivalent to <a target="_blank" href="http://www.theregister.co.uk/2006/05/09/inside_nsa/">the infamous Clipper Chip</a> of the &#8217;90s, governments should agree a framework with industry that respected key principles such as no backdoors and so-called “golden keys” for the government to gain access to data.</p>
<p>The whole discussion represents the results of a technical evaluation of encryption policy options for the Obama administration. A leaked memo from the National Security Council, published by <i>The Washington Post</i> earlier this month, lays out the political options facing Obama in handling the encryption issue over the last year or so of his presidency, as explained in our earlier story <a target="_blank" href="http://www.theregister.co.uk/2015/09/16/obama_edging_toward_support_for_encryption/">here</a>. ®</p>
<h3>Bootnote</h3>
<p>* Even without a convenient backdoor the situation is far from hopeless for police and intel agencies. Mistakes made by suspects or weak passwords can offer a way in, as has been demonstrated on numerous occasions.</p>
<p class="wptl btm">
                    <span>Sponsored: </span><br />
                    <a href="http://go.theregister.com/tl/1391/-3629/go-beyond-apm-with-real-time-it-operations-analytics.pdf?td=wptl1391">Go beyond APM with real-time IT operations analytics</a>
                </p>
<p>Article source: TheReg <a href="http://go.theregister.com/feed/www.theregister.co.uk/2015/09/25/obama_panel_rejects_backdoor_option/">http://go.theregister.com/feed/www.theregister.co.uk/2015/09/25/obama_panel_rejects_backdoor_option/</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/26/obama-brain-trust-sidesteps-mandatory-hackers-backdoor-idea/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hilton hotels in credit-card-stealing malware infection scare</title>
		<link>http://techdiem.com/2015/09/26/hilton-hotels-in-credit-card-stealing-malware-infection-scare/</link>
		<comments>http://techdiem.com/2015/09/26/hilton-hotels-in-credit-card-stealing-malware-infection-scare/#comments</comments>
		<pubDate>Sat, 26 Sep 2015 10:44:06 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/26/hilton-hotels-in-credit-card-stealing-malware-infection-scare/</guid>
		<description><![CDATA[Someone has hacked the Hilton&#8217;s sales registers, and made off with guests&#8217; credit-card details, it&#8217;s claimed. The hotel chain confirmed [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Someone has hacked the Hilton&#8217;s sales registers, and made off with guests&#8217; credit-card details, it&#8217;s claimed. The hotel chain confirmed today it is investigating the alleged breach of its computer security.</p>
<p>Investigative journo Brian Krebs <a href="http://krebsonsecurity.com/2015/09/banks-card-breach-at-hilton-hotel-properties/" target="_blank">says malware</a> in point-of-sale (POS) terminals is believed to have nicked the card information, some of which is already being used to make fraudulent transactions, we&#8217;re told.</p>
<p>Multiple sources have told Krebs that bank staff have traced the misused cards to a common source: the tills at restaurants and gift shops in various Hilton hotels around the US.</p>
<p>It is not clear how many accounts may have been compromised, but the malware was active from April 21 to July 27 of this year, apparently. Visa reportedly issued a security alert on the security breach back in August.</p>
<p>Sales terminals in Doubletree, Embassy Suites, Hampton, and Waldorf Astoria hotels were also compromised, it is claimed.</p>
<p>A Hilton spokesperson told <i>The Register</i> late on Friday afternoon:</p>
<blockquote><p>Hilton Worldwide is strongly committed to protecting our customers&#8217; credit card information. We have many systems in place and work with some of the top experts in the field to address data security. Unfortunately the possibility of fraudulent credit card activity is all too common for every company in today&#8217;s marketplace. We take any potential issue very seriously, and we are looking into this matter.</p></blockquote>
<p>If Krebs&#8217; sources are on the money, Hilton will be the latest major American chain to suffer a massive credit card security breach as the result of a malware incursion. Criminals typically plant malware on PC-like tills to collect credit card information when a purchase is made, and then siphon off the numbers.</p>
<p>In 2014, <a href="http://www.theregister.co.uk/2014/11/12/pos_malware_attacks_should_prompt_security_rethink_report/">Target, Home Depot, and UPS</a> all caught infections in their tills. ®</p>
<p class="wptl btm">
                    <span>Sponsored: </span><br />
                    <a href="http://go.theregister.com/tl/1391/-3629/go-beyond-apm-with-real-time-it-operations-analytics.pdf?td=wptl1391">Go beyond APM with real-time IT operations analytics</a>
                </p>
<p>Article source: TheReg <a href="http://go.theregister.com/feed/www.theregister.co.uk/2015/09/25/hilton_pos_breach/">http://go.theregister.com/feed/www.theregister.co.uk/2015/09/25/hilton_pos_breach/</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/26/hilton-hotels-in-credit-card-stealing-malware-infection-scare/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Friday Squid Blogging: Disney&#8217;s Minigame Squid Wars</title>
		<link>http://techdiem.com/2015/09/25/friday-squid-blogging-disneys-minigame-squid-wars/</link>
		<comments>http://techdiem.com/2015/09/25/friday-squid-blogging-disneys-minigame-squid-wars/#comments</comments>
		<pubDate>Sat, 26 Sep 2015 04:43:54 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/25/friday-squid-blogging-disneys-minigame-squid-wars/</guid>
		<description><![CDATA[Friday Squid Blogging: Disney&#8217;s Minigame Squid Wars It looks like a Nintendo game. As usual, you can also use this [&#8230;]]]></description>
				<content:encoded><![CDATA[<h2 class="entry" id="a007281">Friday Squid Blogging: Disney&#8217;s Minigame Squid Wars</h2>
<p>It <a href="http://en.rocketnews24.com/2015/09/17/is-disney-ripping-off-nintendos-splatoon-with-its-new-squid-wars-minigame-fans-say-it-sure-is/">looks like</a> a Nintendo game.</p>
<p>As usual, you can also use this squid post to talk about the security stories in the news that I haven&#8217;t covered. </p>
<p class="entry-tags">Tags: <a href="https://www.schneier.com/cgi-bin/mt/mt-search.cgi?search=games__mode=tagIncludeBlogs=2limit=10page=1" rel="tag">games</a>, <a href="https://www.schneier.com/cgi-bin/mt/mt-search.cgi?search=squid__mode=tagIncludeBlogs=2limit=10page=1" rel="tag">squid</a></p>
<p class="posted"><a href="https://www.schneier.com/blog/archives/2015/09/friday_squid_bl_495.html">Posted on September 25, 2015 at  4:30 PM</a><br />
	 •<br />
	9 Comments</p>
<aside />
<p>Article source: Shei <a href="https://www.schneier.com/blog/archives/2015/09/friday_squid_bl_495.html">https://www.schneier.com/blog/archives/2015/09/friday_squid_bl_495.html</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/25/friday-squid-blogging-disneys-minigame-squid-wars/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Anti-Alien Security</title>
		<link>http://techdiem.com/2015/09/25/anti-alien-security/</link>
		<comments>http://techdiem.com/2015/09/25/anti-alien-security/#comments</comments>
		<pubDate>Sat, 26 Sep 2015 04:43:54 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/25/anti-alien-security/</guid>
		<description><![CDATA[Anti-Alien Security You can wrap your house in tinfoil, but when you start shining bright lights to defend yourself against [&#8230;]]]></description>
				<content:encoded><![CDATA[<h2 class="entry" id="a007286">Anti-Alien Security</h2>
<p>You can wrap your house in tinfoil, but when you start <a href="http://www.upi.com/Odd_News/2015/09/11/Man-angers-neighbors-by-shining-alien-fighting-spotlights/5421441980144/">shining bright lights</a> to defend yourself against alien attack, you&#8217;ve gone too far.</p>
<p>In general, society puts limits on what types of security you are allowed to use, especially when that use can affect others. You can&#8217;t <a href="https://answers.yahoo.com/question/index?qid=20100112173136AAkvsKU">place landmines on your lawn</a> or shoot down drones hovering over your property.</p>
<p class="entry-tags">Tags: <a href="https://www.schneier.com/cgi-bin/mt/mt-search.cgi?search=drones__mode=tagIncludeBlogs=2limit=10page=1" rel="tag">drones</a>, <a href="https://www.schneier.com/cgi-bin/mt/mt-search.cgi?search=law%20enforcement__mode=tagIncludeBlogs=2limit=10page=1" rel="tag">law enforcement</a>, <a href="https://www.schneier.com/cgi-bin/mt/mt-search.cgi?search=laws__mode=tagIncludeBlogs=2limit=10page=1" rel="tag">laws</a>, <a href="https://www.schneier.com/cgi-bin/mt/mt-search.cgi?search=security%20policies__mode=tagIncludeBlogs=2limit=10page=1" rel="tag">security policies</a></p>
<p class="posted"><a href="https://www.schneier.com/blog/archives/2015/09/anti-alien_secu.html">Posted on September 25, 2015 at  2:23 PM</a><br />
	 •<br />
	17 Comments</p>
<aside />
<p>Article source: Shei <a href="https://www.schneier.com/blog/archives/2015/09/anti-alien_secu.html">https://www.schneier.com/blog/archives/2015/09/anti-alien_secu.html</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/25/anti-alien-security/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Google, Others Seek to Make Cybercrime Costlier For Criminals</title>
		<link>http://techdiem.com/2015/09/25/google-others-seek-to-make-cybercrime-costlier-for-criminals/</link>
		<comments>http://techdiem.com/2015/09/25/google-others-seek-to-make-cybercrime-costlier-for-criminals/#comments</comments>
		<pubDate>Sat, 26 Sep 2015 04:43:51 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/25/google-others-seek-to-make-cybercrime-costlier-for-criminals/</guid>
		<description><![CDATA[Most effective long-term strategy is to target the support infrastructure and financial services used by criminals, Google says Researchers from [&#8230;]]]></description>
				<content:encoded><![CDATA[<header /><span class="strong black">Most effective long-term strategy is to target the support infrastructure and financial services used by criminals, Google says<br />
</span>
<p class="">Researchers from Google and several academic institutions are devising ways to fight organized cybercrime by targeting the support infrastructure and financial services used by threat actors to conduct illegal activities.</p>
<p>The goal of the effort is to try and discourage fraudulent activity to the extent possible by making it costlier for criminals to operate, Kurt Thomas and Elie Bursztein, two members of Google’s Anti-Fraud and Abuse Research said in a blog post Thursday.</p>
<p>The two researchers pointed to several examples where Google and others have already begun taking such actions to try and disrupt the cyber underground.</p>
<p>By studying and understanding how cybercriminals are abusing the phone verified account system to do bulk registration of fraudulent accounts, Google for instance, has been able to make its accounts 30 to 40 percent <a href="http://static.googleusercontent.com/media/research.google.com/en/us/pubs/archive/43134.pdf">costlier to register</a> in the black market, Thomas and Bursztein said.</p>
<p>Similarly, by studying the methods used by a group of 26 underground merchants to register fake Twitter accounts, researchers at the University of California, Berkeley, George Mason University and Twitter were able to develop a method for retroactively detecting the fake accounts.</p>
<p>With Twitter’s help, the researchers were able to use the method to <a href="http://www.icir.org/vern/papers/twitter-acct-purch.usesec13.pdf">disable 95 percent</a> of all fraudulent accounts registered by the 27 merchants, including those accounts that had already been sold in the underground.</p>
<p>Using similar tactics, researchers from George Mason University and the University of California, San Diego were able to <a href="http://cseweb.ucsd.edu/~savage/papers/CCS12Priceless.pdf">disrupt payment processing</a> for several illegal pharmacies and outlets selling counterfeit software, the two researchers said.</p>
<p>Such measures are needed because conventional client and server-side oriented countermeasures such as personal anti-virus tools, firewalls, network packet scanners, automated software updates, and two-factor authentication only have had a limited effect in stemming cybercrime, Thomas and Bursztein noted in the blog.</p>
<p>Each time security researchers have developed defensive measures cyber criminals have been able to circumvent them. “While these safeguards have significantly improved user security, they create an arms race: criminals adapt or find the subset of systems that remain vulnerable and resume operation.”</p>
<p>The increasing sophistication and commoditization of the cyber underground has made it easy for criminals from everywhere to trade in knowledge, technologies, services, and data for defrauding businesses and users.</p>
<p>The availability of specialized services for buying and selling infected systems, exploit kits, spam hosting, and user records have transformed cybercrime into a massive collaborative operation among criminals, the Google researchers said.</p>
<p>“An alternative strategy in this space is to target resource bottlenecks within the underground,” they said. The goal should be to try and make it costlier for cybercriminals to do business.</p>
<p>Going forward, security researchers need to focus on a more thorough understanding of the ecosystem used by cybercriminals to develop, execute, and profit from fraudulent campaigns, the two researchers said in a <a href="http://static.googleusercontent.com/media/research.google.com/en/us/pubs/archive/43798.pdf">technical paper</a> to the topic developed with other researchers.</p>
<p>The study of underground markets has to evolve from an exploratory niche involving mostly anecdotal research to a core-component of security research.  A clear picture of how attackers profit from victims and institutions is vital to developing effective countermeasures and breaking up the “fragile interdependencies” that exist in the cyber underground, the paper said.</p>
<p> </p>
<p><span class="italic">Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year &#8230; View Full Bio</span></p>
<p>Article source: Dark <a href="http://www.darkreading.com/risk/google-others-seek-to-make-cybercrime-costlier-for-criminals/d/d-id/1322354?_mc=RSS_DR_EDT">http://www.darkreading.com/risk/google-others-seek-to-make-cybercrime-costlier-for-criminals/d/d-id/1322354?_mc=RSS_DR_EDT</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/25/google-others-seek-to-make-cybercrime-costlier-for-criminals/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Tits and ads: Malware-riddled banners stiff X-rated websites</title>
		<link>http://techdiem.com/2015/09/25/tits-and-ads-malware-riddled-banners-stiff-x-rated-websites/</link>
		<comments>http://techdiem.com/2015/09/25/tits-and-ads-malware-riddled-banners-stiff-x-rated-websites/#comments</comments>
		<pubDate>Fri, 25 Sep 2015 22:43:54 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/25/tits-and-ads-malware-riddled-banners-stiff-x-rated-websites/</guid>
		<description><![CDATA[An ongoing malvertising campaign that began in August by targeting Yahoo.com, MSN.com and other websites visited by millions of people [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>An ongoing malvertising campaign that began in August by targeting Yahoo.com, MSN.com and other websites visited by millions of people has expanded to hit smut sites as well.</p>
<p>Many porn websites have been fingered with tainted advertisements via an ad network called TrafficHaus, a big player in supplying ads to adult networks.</p>
<p>Surfers visiting xHamsters and other popular grumble flick sites were in the firing line of attacks using the Angler Exploit Kit, ultimately geared towards planting malware onto systems running outdated versions of Internet Explorer.</p>
<p>&#8220;The malicious advert – served by TrafficHaus – was for a dating application called &#8216;Sex Messenger&#8217; and was displayed often enough that we were able to reliably reproduce the infection in our lab, something that isn&#8217;t always feasible when it comes to malvertising,&#8221; web security firm Malwarebytes reports.</p>
<p>TrafficHaus was quick to stop the initial assault, but this has been followed up by another tainted ad attack slinging browser-based ransomware (browlock) at surfers frequenting xHamster. The ransomware page came from TrafficHaus, according to Malwarebytes.</p>
<p>&#8220;This latest example is a reminder that malvertising does not always equate to malware infections via exploit kits,&#8221; Jérôme Segura, senior security researcher at Malwarebytes, explains in a <a target="_blank" href="https://blog.malwarebytes.org/malvertising-2/2015/09/ssl-malvertising-campaign-targets-top-adult-sites/">blog post</a>.</p>
<p>&#8220;In fact, a very large portion of malvertising attacks push fraudulent pages (FBI browserlock ransomware, tech support scams, fake surveys, etc) because they can affect all platforms, and especially mobile users,&#8221; he added.</p>
<p>&#8220;Those sites are typically harmless, but display alarming messages and annoying pop-ups preventing users from closing their browser easily,&#8221; he concluded. ®</p>
<h3>Bootnotes</h3>
<p>Sex Messenger is an application to meet up with other adults. The program itself does not appear to be malicious as such, according to Malwarebytes.</p>
<p class="wptl btm">
                    <span>Sponsored: </span><br />
                    <a href="http://go.theregister.com/tl/1391/-3629/go-beyond-apm-with-real-time-it-operations-analytics.pdf?td=wptl1391">Go beyond APM with real-time IT operations analytics</a>
                </p>
<p>Article source: TheReg <a href="http://go.theregister.com/feed/www.theregister.co.uk/2015/09/25/smut_site_tainted_ad_campaign_ie/">http://go.theregister.com/feed/www.theregister.co.uk/2015/09/25/smut_site_tainted_ad_campaign_ie/</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/25/tits-and-ads-malware-riddled-banners-stiff-x-rated-websites/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Blighty&#8217;s GCHQ stashes away 50+ billion records a day on people. Just let that sink in</title>
		<link>http://techdiem.com/2015/09/25/blightys-gchq-stashes-away-50-billion-records-a-day-on-people-just-let-that-sink-in/</link>
		<comments>http://techdiem.com/2015/09/25/blightys-gchq-stashes-away-50-billion-records-a-day-on-people-just-let-that-sink-in/#comments</comments>
		<pubDate>Fri, 25 Sep 2015 22:43:53 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/25/blightys-gchq-stashes-away-50-billion-records-a-day-on-people-just-let-that-sink-in/</guid>
		<description><![CDATA[The enormous scale of GCHQ&#8217;s surveillance was revealed on Friday by newly published Snowden documents. The files note the growth [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The enormous scale of GCHQ&#8217;s surveillance was revealed on Friday by newly published Snowden documents. The files note the growth in capabilities enjoyed by the UK government&#8217;s snoopers since intercepting communications in bulk from 2007.</p>
<p>These details were revealed in a series of documents published by The Intercept including one on <a href="https://theintercept.com/document/2015/09/25/qfd-blackhole-technology-behind-inoc">the &#8220;flat data store&#8221;</a> codenamed BLACK HOLE, and <a href="https://theintercept.com/document/2015/09/25/cyber-defence-operations-legal-policy">a document</a> calling itself &#8220;the one-stop shop for Cyber Defence Operations legal and policy information.&#8221;</p>
<p>When the slide on BLACK HOLE was composed in March 2009, the flat data store held more than 1.1 trillion things which GCHQ had collected since August 2007.</p>
<p>The store weighed in at 217TB when uncompressed, the largest share of which was HTTP data (41 per cent), which alongside web search (19 per cent) and SMTP data (12 per cent) accounted for almost three quarters of all that it held.</p>
<p>Additional data covered instant messenger records, hacking logs for Computer Network Exploitation (CNE) operations, and the use of &#8220;Anonymisers.&#8221;</p>
<p>The collection began after Section 32 of the Terrorism Act 2007 had <a href="http://www.legislation.gov.uk/ukpga/2006/11/section/32/enacted">amended</a> RIPA to extend interception warrants.</p>
<p>By 2010, GCHQ <a href="https://theintercept.com/document/2015/09/25/operational-engineering-november-2010">stated</a> it was logging &#8220;30bn metadata records per day. By 2012, collection had <a href="https://theintercept.com/document/2015/09/25/gchq-analytic-cloud-challenges">increased</a> to 50 billion per day, and work was underway to double capacity to 100 billion.&#8221;</p>
<p>GCHQ has <a href="https://theintercept.com/document/2015/09/25/cloud-developers-exchange-july-2011">since</a> &#8220;developed new population scale analytics for multi-petabyte cluster,&#8221; which allows &#8220;population scale target discovery.&#8221;</p>
<p>In <a href="https://theintercept.com/document/2015/09/25/access-vision-2013">a vision document</a> for 2013, its aim was to have created &#8220;the world&#8217;s biggest SIGINT engine to run cyber operations and to enable IA, Effects and SIGINT &#8230; [as well as] to perform CNE exfiltration, eAD, beaconry, and geo-location.&#8221;</p>
<blockquote class="twitter-tweet" lang="en">
<p lang="en" dir="ltr">There are 7 billion people in the world. GCHQ has 18 billion targeting identifiers for them. <a href="https://t.co/ttTIhq7K91">https://t.co/ttTIhq7K91</a></p>
<p>— Eric King (@e3i5) <a href="https://twitter.com/e3i5/status/647381599655477249">September 25, 2015</a></p></blockquote>
<p>BLACK HOLE&#8217;s recorded events contain only metadata, according to <a href="https://theintercept.com/document/2015/09/25/events/">the &#8220;Events&#8221; page</a> from the GCWiki, although it notes that &#8220;sometimes there are grey areas between events and content&#8221; citing how the subject of an email is generally transmitted in the header portion of the SMTP communication, despite being considered content.</p>
<p>Slides showing GCHQ&#8217;s <a href="https://theintercept.com/document/2015/09/25/content-metadata-matrix">Content-Metadata Matrix</a> suggest that the spooks&#8217; views of what is metadata extends to passwords, buddylists, and folders used to organize emails.</p>
<p>The majority of GCHQ&#8217;s operational data is acquired through the agency&#8217;s operational activities, whether they are interception, computer network exploitation (CNE, or aggressive hacking), or through <a href="http://www.theregister.co.uk/2014/07/14/gchq_poll/">JTRIG operations</a>.</p>
<p>One new document also <a href="https://theintercept.com/document/2015/09/25/blazing-saddles-tools/">discloses</a> a number of tools used to analyze the data stored in BLACK HOLE, which are complementary and provide an insight into the depth and breadth of GCHQ&#8217;s surveillance practices. These tools all come under a portion of GCHQ&#8217;s analysis project called BLAZING SADDLES.</p>
<p>It is worth noting that the word &#8220;target&#8221; here does not mean a person specified for investigation by a warrant, but merely a hypothetical identity which has had identifiers allocated to it.</p>
<ul>
<li>
<p><b>AUTOASSOC</b> provides information as to which Target Detection Identities (TDIs) have been seen at the same time and from the same IP addresses as other TDIs – allowing the spooks to enlarge the number of identifiers tied to a particular target.</p>
</li>
<li>
<p><b>HRMap</b> provides information about host-referrer relationships, examining how internauts traverse the web, i.e., what route they have taken to a particular site, and where they proceed to.</p>
</li>
<li>
<p><b>INFINITE MONKEYS</b> is a tool which targets v-bulletin software, to reveal the forum accounts of targets and additionally to target particular forum users.</p>
</li>
<li>
<p><b>KARMA POLICE</b>, which <a href="http://www.theregister.co.uk/2015/09/25/gchq_tracked_web_browsing_habits_karma_police/">we have reported on</a>, allows the spooks to know which websites the target visited, and when/where those targets occur – all of which is additionally tied to IPs.</p>
</li>
<li>
<p><b>MARBLED GECKO</b> provides information about the use of Google Earth and Google Maps, which combined with MUTANT BROTH allows the noseys to see who is looking at particular areas of the Earth.</p>
</li>
<li>
<p><b>MEMORY HOLE</b> provides information on web searches made on engines such as Google&#8217;s. It provides information on when, where, and from which IP addresses particular searches were made.</p>
</li>
<li>
<p><b>MUTANT BROTH</b> is a tool to sift through BLACK HOLE data by TDIs, such as cookies. It allows the spooks to create a profile of any given target&#8217;s online activities.</p>
</li>
<li><b>SAMUEL PEPYS</b> is described as &#8220;a near real-time Internet diarisation tool. It enables powerful IP stream analysis/profiling by fusing all available traffic types in one place. It contains both unselected events and content.&#8221;</li>
<li>
<p><b>SOCIAL ANIMAL</b> provides information about how targets interact with other targets, and with files/pictures/video on the internet.</p>
</li>
<li>
<p><b>SOCIAL ANTHROPOID</b> is a &#8220;converged comms events database&#8221; which enables the spooks to see who their targets have communicated with &#8220;via phone, internet, or using converged channels (e.g., sending emails from a phone or making voice calls over the internet).&#8221; This project is set to subsume SOCIAL ANIMAL.</p>
</li>
<li>
<p><b>GOLDEN AXE</b>, which shares its name with a classic side-scrolling Sega game, is primarily for International Mobile Equipment Identity defeats – allowing the spooks to figure out whether particular mobile devices uniquely identify targets. <i>The Register</i> <a href="https://twitter.com/hackerfantastic/status/647419617300905984">understands</a> that some handsets may have identical IMEI, as in India.</p>
</li>
</ul>
<p>These tools were being used in a Joint Collaboration Environment titled Innov8, which was testing large-scale analytics using both GCHQ and NSA data.</p>
<p>A sample search <a href="https://firstlook.org/wp-uploads/sites/1/2015/09/Youporn.png">was provided</a>, based on automatic TDIs, which showed visits to pornography site YouPorn, as well as Reuters, Facebook, Yahoo, and Google.</p>
<p>The Intercept noted that MUTANT BROTH&#8217;s ability to identify cookies was integral to <a href="http://www.theregister.co.uk/2013/09/20/gchq_belgacom_hack_link/">GCHQ&#8217;s attack on Belgian telco Belgacom</a>.</p>
<blockquote>
<p>Cookies associated with the IPs revealed the Google, Yahoo, and LinkedIn accounts of three Belgacom engineers, whose computers were then targeted by the agency and infected with malware.</p>
</blockquote>
<p>The hack, codenamed &#8220;Operation Socialist,&#8221; gained access to Belgacom&#8217;s Core GRX routers so the spooks could run man-in-the middle attacks against targets roaming with smartphones.</p>
<p class="wptl btm">
                    <span>Sponsored: </span><br />
                    <a href="http://go.theregister.com/tl/1391/-3629/go-beyond-apm-with-real-time-it-operations-analytics.pdf?td=wptl1391">Go beyond APM with real-time IT operations analytics</a>
                </p>
<p>Article source: TheReg <a href="http://go.theregister.com/feed/www.theregister.co.uk/2015/09/25/trillions_in_surveillance_gchq/">http://go.theregister.com/feed/www.theregister.co.uk/2015/09/25/trillions_in_surveillance_gchq/</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/25/blightys-gchq-stashes-away-50-billion-records-a-day-on-people-just-let-that-sink-in/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>US, China manage to keep a straight face while promising to not hack each other&#8217;s corps</title>
		<link>http://techdiem.com/2015/09/25/us-china-manage-to-keep-a-straight-face-while-promising-to-not-hack-each-others-corps/</link>
		<comments>http://techdiem.com/2015/09/25/us-china-manage-to-keep-a-straight-face-while-promising-to-not-hack-each-others-corps/#comments</comments>
		<pubDate>Fri, 25 Sep 2015 22:43:51 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/25/us-china-manage-to-keep-a-straight-face-while-promising-to-not-hack-each-others-corps/</guid>
		<description><![CDATA[US President Barack Obama and Chinese President Xi Jinping have announced an cyber-peace deal in which neither side will engage [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>US President Barack Obama and Chinese President Xi Jinping have announced an cyber-peace deal in which neither side will engage in commercial spying online.</p>
<p>&#8220;We have agreed that neither the US nor the Chinese government will conduct, or knowingly support, cyber-enabled theft of intellectual property – including trade secrets or other confidential business information – for commercial advantage,&#8221; Obama said in a press conference on Friday.</p>
<p>&#8220;In addition we will work together, and with other nations, to promote international rules of the road for appropriate conduct in cyberspace.&#8221;</p>
<p>As part of the no-hack pact, the two superpowers will share information about online threats and set up meetings to discuss hackers latest techniques. The US and China will also create a body of experts to look into computer network defenses.</p>
<p>On the Chinese side, this will include representatives from Ministry of Public Security, Ministry of State Security, Ministry of Justice, and the State Internet and Information Office. The US Secretary of Homeland Security and the US Attorney General will co-chair the group, with staff from the FBI, intelligence community, and other agencies.</p>
<p>The gang will meet twice a year to go over outstanding issues and discuss progress in online security. A hotline will also be established between the two nations to ensure a speedy response to online security issues as they come up.</p>
<blockquote class="twitter-tweet" lang="en">
<p lang="en" dir="ltr"><a href="https://twitter.com/hashtag/DOJ?src=hash">#DOJ</a>, which has indicted Chinese officials for hacking, will work with Chinese officials to crack down on hacking.</p>
<p><a href="http://t.co/uU3XEEASva">http://t.co/uU3XEEASva</a></p>
<p>— Brad Heath (@bradheath) <a href="https://twitter.com/bradheath/status/647530821360988161">September 25, 2015</a></p></blockquote>
<p>President Xi began his state visit with protestations that China doesn&#8217;t slurp commercial secrets from other countries, and is more hacked against than hacking. He called the peace deal &#8220;productive&#8221; in today&#8217;s press conference.</p>
<p>But there are real doubts that the agreement will stick. Let&#8217;s face it, working out who hacked whom is difficult, and it would be easy for any miscreant to route their attacks through a server in almost any country.</p>
<p>Crucially, the pact covers nothing about political or &#8220;national security&#8221; hacking, so expect to see plenty of this sort of stuff going forward. ®</p>
<p class="wptl btm">
                    <span>Sponsored: </span><br />
                    <a href="http://go.theregister.com/tl/1391/-3629/go-beyond-apm-with-real-time-it-operations-analytics.pdf?td=wptl1391">Go beyond APM with real-time IT operations analytics</a>
                </p>
<p>Article source: TheReg <a href="http://go.theregister.com/feed/www.theregister.co.uk/2015/09/25/us_china_promise_to_stop_hacking/">http://go.theregister.com/feed/www.theregister.co.uk/2015/09/25/us_china_promise_to_stop_hacking/</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/25/us-china-manage-to-keep-a-straight-face-while-promising-to-not-hack-each-others-corps/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>People Who Need to Pee Are Better at Lying</title>
		<link>http://techdiem.com/2015/09/25/people-who-need-to-pee-are-better-at-lying/</link>
		<comments>http://techdiem.com/2015/09/25/people-who-need-to-pee-are-better-at-lying/#comments</comments>
		<pubDate>Fri, 25 Sep 2015 16:43:50 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[InfoSec]]></category>

		<guid isPermaLink="false">http://techdiem.com/2015/09/25/people-who-need-to-pee-are-better-at-lying/</guid>
		<description><![CDATA[People Who Need to Pee Are Better at Lying No, really. Abstract: The Inhibitory-Spillover-Effect (ISE) on a deception task was [&#8230;]]]></description>
				<content:encoded><![CDATA[<h2 class="entry" id="a007287">People Who Need to Pee Are Better at Lying</h2>
<p>No, <a href="http://www.sciencedirect.com/science/article/pii/S1053810015300301">really</a>. </p>
<blockquote><p><b>Abstract</b>: The <i>Inhibitory-Spillover-Effect (ISE)</i> on a deception task was investigated. The ISE occurs when performance in one self-control task facilitates performance in another (simultaneously conducted) self-control task. Deceiving requires increased access to inhibitory control. We hypothesized that inducing liars to control urination urgency (physical inhibition) would facilitate control during deceptive interviews (cognitive inhibition). Participants drank small (low-control) or large (high-control) amounts of water. Next, they lied or told the truth to an interviewer. Third-party observers assessed the presence of behavioral cues and made true/lie judgments. In the high-control, but not the low-control condition, liars displayed significantly fewer behavioral cues to deception, more behavioral cues signaling truth, and provided longer and more complex accounts than truth-tellers. Accuracy detecting liars in the high-control condition was significantly impaired; observers revealed bias toward perceiving liars as truth-tellers. The <i>ISE</i> can operate in complex behaviors. Acts of deception can be facilitated by covert manipulations of self-control.</p>
</blockquote>
<p>News <a href="https://www.newscientist.com/article/dn28199-the-lies-we-tell-are-more-convincing-when-we-need-to-pee/">article.</a></p>
<p class="entry-tags">Tags: <a href="https://www.schneier.com/cgi-bin/mt/mt-search.cgi?search=behavioral%20detection__mode=tagIncludeBlogs=2limit=10page=1" rel="tag">behavioral detection</a>, <a href="https://www.schneier.com/cgi-bin/mt/mt-search.cgi?search=deception__mode=tagIncludeBlogs=2limit=10page=1" rel="tag">deception</a>, <a href="https://www.schneier.com/cgi-bin/mt/mt-search.cgi?search=lies__mode=tagIncludeBlogs=2limit=10page=1" rel="tag">lies</a></p>
<p class="posted"><a href="https://www.schneier.com/blog/archives/2015/09/people_who_need.html">Posted on September 25, 2015 at  5:54 AM</a><br />
	 •<br />
	25 Comments</p>
<aside />
<p>Article source: Shei <a href="https://www.schneier.com/blog/archives/2015/09/people_who_need.html">https://www.schneier.com/blog/archives/2015/09/people_who_need.html</a> </p>]]></content:encoded>
			<wfw:commentRss>http://techdiem.com/2015/09/25/people-who-need-to-pee-are-better-at-lying/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
