You are a SPECIAL Librarian! You are a Military Librarian!

Tag Archive | "privacy and security"

DoD Press Briefing on Navy Yard Shooting investigations

Defense Department Press Briefing on Implementation Plans as a Result of the Washington Navy Yard Shooting Investigations and Reviews by Secretary Hagel and Navy Secretary Mabus in the Pentagon Briefing Room
Source: U.S. Department of Defense

Okay. Six months ago, the Department of Defense lost 12 members of its family in a senseless act of violence at the Washington Navy Yard. I said at the time that where there are gaps or inadequacies in the department’s security, we’ll find them and we’ll correct them.

And accordingly today, I’m announcing steps DoD is taking to enhance physical security at our installations and improve security clearance procedures responding to lessons learned from this terrible, terrible tragedy. These new measures are based on the recommendations of two reviews that I ordered in the aftermath of the shooting, including an internal review, led by Undersecretary of Defense for Intelligence Michael Vickers, and an outside review, led by former Assistant Secretary of Defense Paul Stockton, who is with us today, and retired Admiral Eric Olson.

Secretary Mabus, who joins me here this morning, also directed the Department of the Navy to conduct its own reviews of security standards, which complemented our work. I appreciate the hard work and the thorough analysis that went into all of these efforts by all of these people.

The reviews identified troubling gaps in DoD’s ability to detect, prevent, and respond to instances where someone working for us, a government employee, member of our military, or a contractor, decides to inflict harm on this institution and its people.

Posted in linksComments Off

RAND: Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar

Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar
Source: RAND Corporation

Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass “smash-and-grab” attacks).

Posted in links, securityComments Off

RAND: Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar

Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar
Source: RAND Corporation

Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass “smash-and-grab” attacks).

Posted in links, securityComments Off

Home Location Identification of Twitter Users

Home Location Identification of Twitter Users
Source: arXiv.org

We present a new algorithm for inferring the home location of Twitter users at different granularities, including city, state, time zone or geographic region, using the content of users tweets and their tweeting behavior. Unlike existing approaches, our algorithm uses an ensemble of statistical and heuristic classifiers to predict locations and makes use of a geographic gazetteer dictionary to identify place-name entities. We find that a hierarchical classification approach, where time zone, state or geographic region is predicted first and city is predicted next, can improve prediction accuracy. We have also analyzed movement variations of Twitter users, built a classifier to predict whether a user was travelling in a certain period of time and use that to further improve the location detection accuracy. Experimental evidence suggests that our algorithm works well in practice and outperforms the best existing algorithms for predicting the home location of Twitter users.

Posted in linksComments Off

Microsoft Ending Support for Windows XP and Office 2003

Microsoft Ending Support for Windows XP and Office 2003 Source: U.S. Computer Emergency Readiness Team (US-CERT)

Computers operating Windows XP with SP3 or running Office 2003 products will continue to work after support ends. However, using unsupported software may increase the risk of viruses and other security threats.

Users have the option to upgrade to a currently supported operating system or office productivity suite. The Microsoft “End of Support” pages for Windows XP and Office 2003 offer additional details.

There are software vendors and service providers in the marketplace who offer assistance in migrating from Windows XP or Office 2003 to a currently supported operating system or office productivity suite. US-CERT does not endorse or support any particular product or vendor.

Users who choose to continue using Windows XP after the end of support may mitigate some risks by using a web browser other than Internet Explorer. The Windows XP versions of some alternative browsers will continue to recieve support temporarily. Users should consult the support pages of their chosen alternative browser for more details.

Posted in Web/TechComments Off

Blog Archives