America’s Fastest Spy Plane May Be Back — And Hypersonic

A Lockheed Skunk Works executive implied last week at an aerospace conference that the successor to one of the fastest aircraft the world has seen, the SR-71 Blackbird, might already exist. Previously, Lockheed officials have said the successor, the SR-72, could fly by 2030. Bloomberg reports: Referring to detailed specifics of company design and manufacturing, Jack O’Banion, a Lockheed vice president, said a “digital transformation” arising from recent computing capabilities and design tools had made hypersonic development possible. Then — assuming O’Banion chose his verb tense purposely — came the surprise. “Without the digital transformation, the aircraft you see there could not have been made, ” O’Banion said, standing by an artist’s rendering of the hypersonic aircraft. “In fact, five years ago, it could not have been made.” Hypersonic applies to speeds above Mach 5, or five times the speed of sound. The SR-71 cruised at Mach 3.2, more than 2, 000 mph, around 85, 000 feet. “We couldn’t have made the engine itself — it would have melted down into slag if we had tried to produce it five years ago, ” O’Banion said. “But now we can digitally print that engine with an incredibly sophisticated cooling system integral into the material of the engine itself and have that engine survive for multiple firings for routine operation.” The aircraft is also agile at hypersonic speeds, with reliable engine starts, he said. A half-decade before, he added, developers “could not have even built it even if we conceived of it.” Read more of this story at Slashdot.

Read More:
America’s Fastest Spy Plane May Be Back — And Hypersonic

2017’s biggest cybersecurity facepalms

2017 was a year like no other for cybersecurity. It was the year we found out the horrid truths at Uber and Equifax, and border security took our passwords . A year of WannaCry and Kaspersky , VPNs and blockchains going mainstream, healthcare hacking , Russian hackers , WikiLeaks playing for Putin’s team , and hacking back . In 2017 we learned that cybersecurity is a Lovecraftian game in which you trade sanity for information. Let’s review the year that was (and hopefully will never be again). Moscow mules This was the year Kaspersky finally got all the big press they’ve been angling for. Unfortunately for them, it wasn’t for their research. The antivirus company spent an uncomfortable year in the headlines being accused of working with Russia’s FSB (former KGB) . Eventually those suspicions got it banned from use by US government agencies. Kaspersky’s alleged coziness with Putin’s inner circle has made the rounds in the press and infosec gossip for years. But it came to a head when an NSA probe surfaced, the Senate pushed for a ban, and — oddly — the Trump administration came with the executioner’s axe. Obviously, Kaspersky — the company, and its CEO of the same name — denied the accusations, and offered to work with the US government. They offered up their code for review and filed suit when the ban passed. At this point, the only thing that might save Kaspersky’s reputation in the US is finding us that pee tape. Fingers crossed. Be still my backdoored heart A ransomware attack on Hollywood Presbyterian Hospital in 2016 put health care hacking center stage, but in 2017 it turned into a true nightmare. The WannaCry ransomware attack spread like wildfire, locking up a third of the National Health Service (NHS) in England. That was followed by other worms, like Petya/NotPetya, which hit US hospitals in June. The security of pacemakers was exposed as being awful, specifically in the case of medical device manufacturer St. Jude Medical (now rebranded as Abbott). A lot of people hated on researcher Justine Bone and MedSec for the way they went about exposing pacemaker flaws, but they were right . The FDA put a painful pin in it when it notified the public of a voluntary recall (as a firmware update) of 465, 000 pacemakers made by St. Jude Medical. Meanwhile, white hat hackers put together the first Cyber Med Summit — a doctor-run, hacker boot camp for medical professionals. That the Summit exists is a tiny bit of good news in our medical mess, but it also proved that you should probably make sure your doctor keeps a hacker on staff. Medical staff at the Summit got a wake-up call about medical devices exploits, and concluded they need to add “hacking” to their list of possible problems to assess and diagnose. I’m not crying, you’re crying On May 12, over 150 countries were hit in one weekend by a huge ransomware crimewave named WannaCry . The attack was derived from a remote code execution vulnerability (in Windows XP up through Windows Server 2012) called “EternalBlue, ” found in the April Shadow Brokers/NSA dump. Those who did their Windows updates were not affected. WannaCry demanded $300 in Bitcoin from each victim and among those included were the UK’s National Health Service (NHS). The ransomworm was stopped in its tracks by the registration of a single domain that behaved like a killswitch. The creators apparently neglected to secure their own self destruct button. Researcher MalwareTech was the hero of the day with his quick thinking, but was sadly repaid by having his identity outed by British tabloids. Adding injury to insult, he was later arrested on unrelated charges as he attempted to fly home after the DEF CON hacking conference in August. Two weeks after the attack, Symantec published a report saying the ransomware showed strong links to the Lazarus group (North Korea). Others independently came to the same conclusion. Eight months later, and just in time for his boss’ warmongering on North Korea, Trump team member Thomas P. Bossert wrote in the Wall Street Journal that “the U.S. today publicly attributes the massive “WannaCry” cyberattack to North Korea.” Maybe he’s just a backdoor man US Deputy Attorney General Rod Rosenstein in October introduced the world to the new and totally made-up concept of ” responsible encryption ” — and was promptly laughed out of the collective infosec room. “Responsible encryption is effective secure encryption, coupled with access capabilities, ” he said . He suggested that the feds won’t mandate encryption backdoors “so long as companies can cough up an unencrypted copy of every message, call, photo or other form of communications they handle.” Even non-infosec people thought his new PR buzzwords were suspect. “Look, it’s real simple. Encryption is good for our national security; it’s good for our economy. We should be strengthening encryption, not weakening it. And it’s technically impossible to have strong encryption with any kind of backdoor, ” said Rep. Will Hurd (R-Texas) at The Atlantic’s Cyber Frontier event in Washington, D.C. Politico wrote : It’s a cause Rosenstein has quietly pursued for years, including two cases in 2014 and 2015 when, as the US attorney in Maryland, he sought to take companies to court to make them unscramble their data, a DOJ official told POLITICO. But higher-ups in President Barack Obama’s Justice Department decided against it, said the official, who isn’t authorized to speak to the news media about the cases. To everyone’s dismay, Rosenstein doubled down on his “responsible encryption” campaign when he capitalized on a mass shooting (using as his example the phone of Devin Patrick Kelley who opened fire on a congregation in Texas, killing 26 people). He said , “Nobody has a legitimate privacy interest in that phone … But the company that built it claims that it purposely designed the operating system so that the company cannot open the phone even with an order from a federal judge.” Like Uber, but for Equifax If there was some kind of reverse beauty pageant for worst look, worst behavior, and best example of what not to do with security, we’d need a tiebreaker for 2017. Equifax and Uber dominated the year with their awfulness. Equifax was forced to admit it was hacked badly in both March and July, with the latter affecting around 200 million people (plus 400, 000 in the UK). Motherboard reported that “six months after the researcher first notified the company about the vulnerability, Equifax patched it — but only after the massive breach that made headlines had already taken place… This revelation opens the possibility that more than one group of hackers broke into the company.” Shares of Equifax plummeted 35% after the July disclosure. And news that some of its execs sold off stock before the breach was made public triggered a criminal probe. Which brings us to the “unicorn” that fell from grace . In late November Uber admitted it was hacked in October 2016, putting 57 million users and over half a million drivers at risk. Uber didn’t report the breach to anyone — victims or regulators — then paid $100K to the hackers to keep it quiet, and hid the payment as a bug bounty. All of which led to the high-profile firing and departures of key security team members. Just a couple weeks later, in mid-December, the now-notorious ‘Jacobs letter’ was unsealed, accusing Uber of spying and hacking . “It was written by the attorney of a former employee, Richard Jacobs, and it contains claims that the company routinely tried to hack its competitors to gain an edge, ” Engadget wrote , and “used a team of spies to steal secrets or surveil political figures and even bugged meetings between transport regulators — with some of this information delivered directly to former CEO Travis Kalanick.” The letter was so explosive it’s now the trial between Uber and Waymo — so we can be sure we haven’t seen the last of Uber’s security disasters in the news. Images: Getty Images/iStockphoto (Wannacry); D. Thomas Magee (All illustrations)

Continue Reading:
2017’s biggest cybersecurity facepalms

US government names North Korea as the source of WannaCry

Donald Trump’s homeland security adviser, Tom Bossert, said in a Wall Street Journal op-ed that “after careful investigation, the U.S. today publicly attributes the massive ” WannaCry ” cyberattack to North Korea.” Coming during increasing tensions between the two countries over nuclear threats and Twitter outbursts, Bossert said this attribution is based on evidence and agrees with the findings from the UK and Microsoft. In the op-ed we did not see traces of the evidence used to link the May attack to the “Lazarus Group” (also blamed for the Sony Pictures hacking incident ) and North Korea, but the White House will reportedly follow up Tuesday with a more formal statement. While some, like Microsoft , have blamed the US government for stockpiling vulnerabilities — the WannaCry attack used an exploit based on technology apparently stolen from the NSA — the op-ed says: Stopping malicious behavior like this starts with accountability. It also requires governments and businesses to cooperate to mitigate cyber risk and increase the cost to hackers. The U.S. must lead this effort, rallying allies and responsible tech companies throughout the free world to increase the security and resilience of the internet. Bossert also called the attack reckless, while Reuters cites a “senior administration official” who declined to comment on whether or not the US believes it was a deliberate attack or accidental. So what happens now? According to the piece, the Trump administration “will continue to use our maximum pressure strategy to curb Pyongyang’s ability to mount attacks, cyber or otherwise.” Source: Wall Street Journal

Read More:
US government names North Korea as the source of WannaCry

Ransomware Hack Targeting 2 Million an Hour

New submitter Zorro writes: A ransomware attack sweeping the globe right now is launching about 8, 000 different versions of the virus script at Barracuda’s customers, Eugene Weiss, lead platform architect at Barracuda, told Axios, and it’s hitting at a steady rate of about 2 million attacks per hour. What to watch out for: An incoming email spoofing the destination host, with a subject about “Herbalife” or a “copier” file delivery. Two of the latest variants Barracuda has detected include a paragraph about legalese to make it seem official, or a line about how a “payment is attached, ” which tricks you to click since, as Weiss puts it, “everyone wants a payment.” Read more of this story at Slashdot.

View the original here:
Ransomware Hack Targeting 2 Million an Hour

Mystery of Sonic Weapon Attacks At US Embassy In Cuba Deepens

An anonymous reader quotes a report from The Guardian: The blaring, grinding noise jolted the American diplomat from his bed in a Havana hotel. He moved just a few feet, and there was silence. He climbed back into bed. Inexplicably, the agonizing sound hit him again. It was as if he’d walked through some invisible wall cutting straight through his room. Soon came the hearing loss, and the speech problems, symptoms both similar and altogether different from others among at least 21 U.S. victims in an astonishing international mystery still unfolding in Cuba. The top U.S. diplomat has called them “health attacks.” New details learned by the Associated Press indicate at least some of the incidents were confined to specific rooms or even parts of rooms with laser-like specificity, baffling U.S. officials who say the facts and the physics don’t add up. Suspicion initially focused on a sonic weapon, and on the Cubans. Yet the diagnosis of mild brain injury, considered unlikely to result from sound, has confounded the FBI, the state department and U.S. intelligence agencies involved in the investigation. Some victims now have problems concentrating or recalling specific words, several officials said, the latest signs of more serious damage than the U.S. government initially realized. The United States first acknowledged the attacks in August — nine months after symptoms were first reported. Read more of this story at Slashdot.

Read the original:
Mystery of Sonic Weapon Attacks At US Embassy In Cuba Deepens

The IRS Decides Who To Audit By Data Mining Social Media

In America the Internal Revenue Service used to pick who got audited based on math mistakes or discrepancies with W-2 forms — but not any more. schwit1 shares an article from the Vanderbilt Journal of Entertainment and Technology Law describing their new technique: The IRS is now engaging in data mining of public and commercial data pools (including social media) and creating highly detailed profiles of taxpayers upon which to run data analytics. This article argues that current IRS practices, mostly unknown to the general public, are violating fair information practices. This lack of transparency and accountability not only violates federal law regarding the government’s data collection activities and use of predictive algorithms, but may also result in discrimination. While the potential efficiencies that big data analytics provides may appear to be a panacea for the IRS’s budget woes, unchecked these activities are a significant threat to privacy [PDF]. Other concerns regarding the IRS’s entrée into big data are raised including the potential for political targeting, data breaches, and the misuse of such information. While tax evasion cost the U.S.$3 trillion between 2000 and 2009, one of the report’s authors argues that people should be aware âoethat what they say and do onlineâ could be used against them. Read more of this story at Slashdot.

View original post here:
The IRS Decides Who To Audit By Data Mining Social Media

N. Korean defectors show locations of mass graves using Google Earth

Much of what happens in North Korea remains hidden from the outside world. But commercial satellite imagery and Google Earth mapping software are helping a human-rights organization take inventory of the worst offenses of the North Korean regime and identify sites for future investigation of crimes against humanity. A new report from the South Korea-based Transitional Justice Working Group (TJWG) —a non-governmental organization that tracks human-rights abuses and crimes against humanity by the world’s most oppressive regimes—details how the organization’s researchers used Google Earth in interviews with defectors from North Korea to identify sites associated with mass killings by the North Korean regime. Google Earth imagery was used to help witnesses to killings and mass burials orient themselves and precisely point out the locations of those events. Entitled “Mapping Crimes Against Humanity in North Korea: Mass Graves, Killing Sites and Documentary Evidence,” the report does not include the actual locations of what the researchers deemed to be sensitive sites out of concern that the North Korean regime would move evidence from those sites. But it does provide location data of other sites with potential documentary evidence of crimes, including police stations and other government facilities that may have records of atrocities. Read 5 remaining paragraphs | Comments

View article:
N. Korean defectors show locations of mass graves using Google Earth

NSA Links WannaCry To North Korea

An anonymous reader quotes a report from The Washington Post: The National Security Agency has linked the North Korean government to the creation of the WannaCry computer worm that affected more than 300, 000 people in some 150 countries last month, according to U.S. intelligence officials. The assessment, which was issued internally last week and has not been made public, is based on an analysis of tactics, techniques and targets that point with “moderate confidence” to North Korea’s spy agency, the Reconnaissance General Bureau, according to an individual familiar with the report. The assessment states that “cyber actors” suspected to be “sponsored by” the RGB were behind two versions of WannaCry, a worm that was built around an NSA hacking tool that had been obtained and posted online last year by an anonymous group calling itself the Shadow Brokers. Though the assessment is not conclusive, the preponderance of the evidence points to Pyongyang. It includes the range of computer Internet protocol addresses in China historically used by the RGB, and the assessment is consistent with intelligence gathered recently by other Western spy agencies. It states that the hackers behind WannaCry are also called “the Lazarus Group, ” a name used by private-sector researchers. Read more of this story at Slashdot.

Visit link:
NSA Links WannaCry To North Korea

NASA Is Developing 3D-Printed Chain Mail to Protect Ships and Astronauts

Chain mail was an essential tool for medieval warriors hoping to avoid a quick (or slow) death by a sword. But NASA engineers hope a similar material , with a few modern upgrades, could prove to be just as useful for spacecraft and astronauts looking to survive the rigors of outer space. Read more…

Read the original:
NASA Is Developing 3D-Printed Chain Mail to Protect Ships and Astronauts

Second Handwritten Copy of the Declaration of Independence Discovered in England

Harvard researchers have discovered a parchment manuscript of the Declaration of Independence at a small archive office in the United Kingdom. Only the second parchment copy known to exist, it contains several features that mark it as distinct from the original. Read more…

View article:
Second Handwritten Copy of the Declaration of Independence Discovered in England