Thursday, May 28, 2020

5/28/2020 - 50% of Home Workers are Using Workarounds for Security Policies and Trump is Going to War with Silicon Valley

Half of those surveyed said they've had to find workarounds for security policies in order to efficiently do the work they're required to do – suggesting that in some cases, security policies are too much of a barrier for employees working from home to adapt to.

However, by adopting workarounds employees could be putting their organisation at risk from cyber attacks, especially as hackers increasingly turn their attention to remote workers.

"People will cut corners on security best practices when working remotely and find workarounds if security policies disrupt their productivity in these new working conditions," said Tim Salder, CEO of Tessian.   

U.S. prosecutors have for over a year sought the extradition of Meng, the daughter of Huawei’s founder, on charges that she participated in a bank fraud scheme that violated trade sanctions against Iran.

After Canadian authorities arrested Meng in December 2018, she fought extradition, arguing that the allegations did not constitute a crime in Canada. But a British Columbia Supreme Court judge dismissed that argument Wednesday, saying that the offense she is accused of would be a crime if it occurred in Canada, potentially clearing the way for her extradition.

The long-awaited report, released by the Nuclear Fuel Working Group, spawned in July 2019 after President Trump rejected a petition from two U.S. uranium miners, Energy Fuels and Ur-Energy, to impose import quotas to protect jobs as a matter of maintaining national security.

Trump sided with nuclear utilities, who said trade restrictions would raise their costs, and instead established the working group, recognizing that “this issue is much larger than the mining of uranium out West,” Energy Secretary Dan Brouillette explained to reporters Thursday.

“This is a roadmap on what needs to be done to establish American leadership in this entire industry,” Brouillette said. It does not contain executive actions and its provisions require cooperation from Congress and regulatory agencies.

"We didn't fire anyone for speaking out about working conditions," Bezos said during Amazon's virtual shareholder meeting Wednesday as part of a Q&A portion. "We support every employee's right to criticize their employers working conditions, but that also doesn't mean that they're allowed to not follow internal policies. But for sure your rights to protest working conditions, we take that super seriously and we have no problem with that at all."

...

All the shareholder proposals were voted down, as Amazon's board recommended. Getting any of these proposals passed is a difficult feat, because Bezos controls 15% of the company's stock and major financial shareholders like Vanguard and BlackRock often back the board's requests. These proposals included calls for a report on food waste, a request for gender and racial pay equity and a push to separate the CEO and chairman positions, with both spots currently held by Bezos.

Arizona filed a consumer fraud lawsuit against Alphabet Inc’s Google on Wednesday, alleging that the company used “deceptive” and “unfair” practices to obtain the location data of users.

"Google collects detailed information about its users, including their physical locations, to target users for advertising. Often, this is done without the users' consent or knowledge," Attorney General Mark Brnovich said here in a tweet on Wednesday.  

The House of Representatives’ Democratic leaders said late on Wednesday a vote on renewing three government surveillance rules that expired in March would not take place as expected. There was no word on when a vote might be rescheduled.

Trump threatened a veto on Twitter earlier on Wednesday, posting: “If the FISA Bill is passed tonight on the House floor, I will quickly VETO it.”

After the tweet, none of Trump’s fellow Republicans in the House backed a procedural measure related to the bill. Some of the 183 Republican “no” votes came from lawmakers who previously supported it. 

The unique cyber issues associated with control system field devices were not included in the recently released DOE/DHS CISA infographic. There is nothing in the infographic that can be used to determine if hardware backdoors are inside equipment which was the reason for the Presidential Executive Order - https://www.wsj.com/articles/u-s-seizure-of-chinese-built-transformer-raises-specter-of-closer-scrutiny-11590598710?emailToken=3d85bf968355cc917220da50f9b7d496aep+m7M4+8QH3+Ko3zlkEq57f6+qAwWNh+S7eWJxBxQ110rspASHadV75GoMSH+deHpnXopZ3kCaaSbYhEyk9M3l02l8kogo53ANiSKgMJlbbSFL0gm0jPaEE+vIl40E8ih85jsPW6l3xFNjtTkRAg%3D%3D&reflink=article_email_share. Ironically, the one concern with that article is the purpose of this blog – ignoring the sensors. The Wall Street Journal article states: “However, transformers hadn’t typically been seen as products that could be easily isolated and hacked. That is because they don’t contain the software-based control systems that foreign actors could access. They are passive devices that increase or reduce voltages in switchyards, substations and on power poles according to the laws of physics." That statement is misleading. I was informed that at least some of the devices in the compromised transformer had a “manual” load tap changer. However as mentioned above, manual or automatic, the device, in this case the load tap changer, will respond to voltage fluctuations it sees from the sensors. If the sensors have been compromised via the backdoor, the transformer integrity is at risk. Compromising sensor configurations can lead to failures of controllers, voltage regulators (load tap changers), and other control system devices with no apparent indication.
 Holy Crap!  I think I am sympathetic to most of what Mr. Weiss is saying here, and in his other posts, but I can't honestly tell because it's like reading a giant stream of consciousness post by an angry serial killer.  

That complaint aside, I think he makes a good point about layers 1 and 0 in the Purdue model and the way I tried to address it in my last job was by acknowledging that it was an issue .  In the policies I wrote I specified that they were intended for layers 3.5 to 2 and that 1 and 0 had to be handled in consultation with the SCADA engineering team. I felt like and managed to convince others that was the best approach, rather than trying to shove inappropriate solutions down peoples throats or ignoring the issue.  Maybe I'm wrong but I assumed that others were following the same approach.


News of the proposed executive order came after Trump attacked Twitter for tagging the President’s tweets about unsubstantiated claims of fraud in mail-in voting with a warning prompting readers to fact-check the posts.

The draft order seen by Reuters directs federal agencies to modify the way a law known as Section 230, which protects internet companies from liability for content posted by their users, is implemented. It also orders a review of alleged “unfair or deceptive practices” by Facebook and Twitter, and calls on the government to reconsider advertising on services judged to “violate free speech principles.” 

Arguments can be made on both sides about whether Section 230 gives too much power to companies like YouTube, Facebook, and Twitter, but this order is going to be a disaster.  It looks like the worst type of fascist attack on speech platforms and appears both dictatorial and designed to distract from other issues.  

California was the first state to shut down to counter the coronavirus and has avoided the staggeringly high infection and death rates suffered in the Northeast. But the debilitating financial costs are mounting every day. California has an estimated unemployment rate above 20 percent, according to Mr. Newsom — far higher than the 14.7 percent national rate and similar to the estimated rate for New York State, where the virus has hit the hardest.

In Los Angeles, with movie productions shut down, theme parks padlocked and hotels empty, things are even worse: The jobless rate has reached 24 percent, roughly equal to the peak unemployment of the Great Depression, in 1933.

(A) common refrain from visa program advocates is that foreign nationals are just as knowledgeable as the American workers they replace, if not more so. That is simply not the case.

Drawing on data from the Program for International Assessment of Adult Competencies, the Center for Immigration Studies found that foreign-educated immigrants with a college or advanced degree perform poorly in both literacy and computer operations, scoring at the level of Americans with only a high-school diploma. One in six foreign degree holders score “below basic” in numeracy—so much for STEM supremacy. Skill disparities persist even after foreign degree holders have had at least five years in the United States to learn English. 

Thousands of Chinese graduate students and researches in the Unites States risk losing their visas as the Trump administration plans to cancel any held by academics who have direct ties to universities associated with China's People's Liberation Army.

...

To make matters worse, China's parliament rubber-stamped a new security law to give Beijing sweeping powers over Hong Kong on Wednesday, sparking global outrage.

...

In response, U.S. Secretary of State Mike Pompeo said that Hong Kong no longer deserves special treatment under trade laws as it no longer maintains a 'high degree' of autonomy from China.
Security Week - Researchers Unmask Brazilian Hacker Who Attacked Thousands of Websites -
Researchers at cybersecurity company Check Point said on Thursday that they have found the real identity of VandaTheGod, a Brazilian hacker involved in both hacktivist operations and financially-motivated cybercrimes.
Medium - Building a Cyber Security Lab -

Cyber Security is such a broad topic, how could one build a single lab that encompasses all aspects of cyber security? All the vulnerabilities, malware, databases, financial systems, Intrusion detection, firewalls, encryption standards, mobile security, etc. That would take a very large garage to build. However you can gain hands on knowledge with most of these aspects of cyber security using only a single computer.

You don’t need fancy several of high-powered servers in a Faraday cage to have an effective security lab environment . With just a one computer, dozens of computers can be experimented with, all due to the wonders of virtualization. Even an Active Directory system of windows computers can be built within a virtualized environment on an individual computer.


No comments: