Blog

POTUS taps Uber chief security officer to be a part of a cyber security commission

 POTUS taps Uber chief security officer to be a part of a cyber security commission

In looking to leverage that wealth of knowledge of and experience with cyber security attacks, President Barack Obama appointed a number of former and current tech executives to a 12-person Commission on Enhancing National Security.

Among those pulled from the tech world, including former IBM CEO Sam Palmisano, is Uber’s Chief Security Officer Joe Sullivan. Sullivan, who joined Uber in 2015, handled security at Facebook prior to that for five years and at eBay before that.

From the outside, it’s tough to say what Sullivan has done in his time at Uber because much of his job goes on behind the scenes. The most recent forward-facing project that would have fallen under Sullivan’s purview is the bug bounty for which Uber would reward $10,000 to the hacker who could find a bug in the app.

Six Common Legal Mistakes Entrepreneurs Make & How to Avoid Them

 Six common legal mistakes entrepreneurs make and how to avoid them

Most seasoned entrepreneurs will tell you that starting a business is one of the most rewarding experiences in life. At the same time, many will caveat that getting a business off the ground is harder than most people think.

For founding startup teams, a bit of preventive care and planning can go a long way.

When it comes to legal issues, the natural reaction is to put them off and hope they never happen or go away. Hard-to-understand “gotcha” rules and regulations, the odd language of “legalease” and the high hourly rates most lawyers charge are just a few things that make the law intimidating.

AFCEA Tokyo (東京) TechNet 2016 – “Resilience”

AFCEA Tokyo (東京) TechNet 2016 is right around the corner, scheduled to run from Wednesday June 1 through Friday June 3. This is the tenth anniversary of TechNet events for the AFCEA Tokyo (東京) chapter, and we are expecting this to be the largest and most exciting Tokyo TechNet to date. There is a full lineup of training on day one, a classic sit-down Kick-Off Dinner, then two full days of keynote presentations and panel sessions on general IT, cyber security, government cyber security, and military oriented IT topics.

AFCEA is a 501(c)(6) non-profit international organization that serves its members by providing a forum for ethical exchange of information and is dedicated to increasing knowledge through the exploration of issues in information technology, communications, and electronics for the defense, homeland security, and intelligence communities. AFCEA Tokyo (東京) aims to engage both the US defense community, academia, and local industry in Japan.

AFCEA Tokyo (東京) TechNet is the chapter’s largest event and AFCEA International’s biggest in Asia. TechNet brings a wide array of voices from academia, industry, and government alongside educational opportunities through training sessions, keynote speeches, and panel sessions. This conference will mark our 10th Anniversary event and will highlight tactical, technical, and strategic challenges that Japan, the United States, and their allies and partners currently face in national and regional security.

Additionally, AFCEA Tokyo (東京) is marking its 10th Anniversary with the theme “Resilience” – in part to show our solidarity with the local Japanese community by honoring the five year anniversary of the tragic March 11 Great Tohoku Earthquake, the obvious connotations to IT and cyber security, and finally, to demonstrate the resilience of our old yet small AFCEA chapter.
If you are interested in attending, visit the attendee registration page.

If you are interested in sponsoring or exhibiting at the event, AFCEA Tokyo (東京) offers a wide range of sponsoring options for you to display your wares, conduct marketing, or just performing mere brand awareness.

Please help spread the word about this exciting Tokyo-based event being held at The New Sanno Hotel in Minami-Azabu on June 1-3.

Fed asks auto industry to help combat cyber attacks

 Fed asks auto industry to help combat cyber attacks

Carlin made the remarks during a speech before the Society of Automotive Engineers’ 2016 World Congress at the Cobo Convention Center. More than 11,000 engineers, auto industry executives, consultants, academics, government and military officials are expected to attend the event, which began Tuesday and runs through Thursday.

“What brings me here is this is an industry that’s on the cusp of not just an evolution but a revolution in how are cars operate, how they talk to each other,” he said.

Carlin said experts estimate more than 220 million vehicles will be able to connect to the internet by the year 2020.

The technology has the potential to save lives, but warned terrorists will exploit its weaknesses and use it to do harm, he added.

“Within each of those cars will be hundreds of different systems, each essentially computers in the car, and connected wirelessly,” he said. “What we can see based on the threats we’ve seen in other industries and other areas is those who oppose our values — be they rogue nation states or terrorist groups — are looking to exploit this change in technology.”

FBI paid professional hackers one-time fee to crack San Bernardino iPhone

 FBI paid professional hackers one-time fee to crack San Bernardino iPhone

The FBI cracked a San Bernardino terrorist’s phone with the help of professional hackers who discovered and brought to the bureau at least one previously unknown software flaw, according to people familiar with the matter.

The new information was then used to create a piece of hardware that helped the FBI to crack the iPhone’s four-digit personal identification number without triggering a security feature that would have erased all the data, the individuals said.

The researchers, who typically keep a low profile, specialize in hunting for vulnerabilities in software and then in some cases selling them to the U.S. government. They were paid a one-time flat fee for the solution.

Cracking the four-digit PIN, which the FBI had estimated would take 26 minutes, was not the hard part for the bureau. The challenge from the beginning was disabling a feature on the phone that wipes data stored on the device after 10 incorrect tries at guessing the code. A second feature also steadily increases the time allowed between attempts.

Sweden secretly blames Russian hackers for taking out air traffic control

 Sweden secretly blames Russian hackers for taking out air traffic control

Sweden suspects a hacker group linked to Russian intelligence was responsible for an attack on its air traffic control systems last November, we’re told.

Air traffic control systems across much of Sweden were unavailable on November 4. Computer problems meant air traffic controllers were unable to use their displays, an issue that prompted the cancellation of multiple domestic and international flights. Arlanda, Landvetter and Bromma airports were particularly affected.

The Swedish Civil Aviation Administration publicly blamed a solar storm. However, behind the scenes the Swedes were notifying NATO about a serious, ongoing cyber attack, Norwegian news outlet aldrimer.no reports.

Military academies take on each other in cyber competition

 Military academies take on each other in cyber competition

Military academy students will be competing against each other this week in an annual cyber-defense exercise.

The service academies will defend themselves against cyber-attacks starting Monday on computer networks individual teams design and build. The attacks are launched over three days by employees of the National Security Agency and the Department of Defense.

Commissaries look to limit cyber breaches

 Commissaries look to limit cyber breaches

The Defense Commissary Agency is looking to hire a rapid-response service available within an hour of any incident that breaches payment systems, threatens cardholder data or otherwise disrupts the agency’s systems, according to a contract put out for bid this month.

The service would be the first to assess any suspected attack against agency networks.

“Typical incidents include the introduction of viruses or worms into a network, DoS (denial of service) attacks, unauthorized alteration of software or hardware, and identity theft of individuals or institutions,” the solicitation states.

DeCA’s move follows a larger trend of government and military-related agencies moving to protect customer data in light of high-profile incidents where it was hacked or lost. The personal details of more than 21 million people were exposed in a 2015 hack of the Office of Personnel Management. The Department of Veterans Affairs has been criticized for its failure to protected sensitive information.

US Naval Intelligence Officer Held on Espionage Charges

 US Naval Intelligence Officer held on espionage charges

The US Naval Institute identified the suspect as Taiwanese-born, naturalized American citizen Lieutenant Commander Edward Lin, who was arrested eight months ago, although details have only just emerged following Friday’s hearing.

Lt. Cmdr. Lin, who was profiled in a US Navy public relations article in 2008 following his naturalization ceremony, allegedly had access to materials classified at the “secret” level – one level below the well-known “top secret” classification.

Navy’s New Stealth Destroyer is Too Stealthy

 Navy’s New Stealth Destroyer is Too Stealthy

Lawrence Pye, a lobsterman, told The Associated Press that on his radar screen the 610-foot ship looked like a 40- to 50-foot fishing boat. He watched as the behemoth came within a half-mile while returning to shipbuilder Bath Iron Works.

“It’s pretty mammoth when it’s that close to you,” Pye said.

Despite its size, the warship is 50 times harder to detect than current destroyers thanks to its angular shape and other design features, and its stealth could improve even more once testing equipment is removed, said Capt. James Downey, program manager.