Start your day with intelligence. Get The OODA Daily Pulse.
One thing has been strikingly absent from the public debate about the terrorist surveillance program run by the National Security Agency: Perspective. While we may not know the full scope of the use of personal information by our intelligence services, we know quite a bit about the routine use and compromise of our most personal…
Slate takes a brief look at intel whiste-blowers and the potential significance of Russ’ testimony next week. I’m particularly fond of the wrap-up: Sources in addition to Tice sketched out the wiretapping program for the Times. But since the revelations became public, no one else has come forward. In an echo chamber of unnamed “senior…
This was just too good to pass up, and a nice way to lighten the mood on a Friday. New Zealand filmmaker Lee Tamahori, who directed the James Bond movie “Die Another Day,” has been arrested in a Hollywood prostitution sting while dressed in drag. Tamahori, 55, was arrested on January 8 when he allegedly…
. . . had the toughest most thankless job in the Community: Agency: Office of the Director of National Intelligence Job Announcement Number: TBD-2-13-2006 SALARY RANGE: 107,521.00 – 139,774.00 USD per year OPEN PERIOD: Thursday, February 02, 2006 to Friday, February 10, 2006 SERIES & GRADE: GS-0300,0000-15/15 POSITION INFORMATION: Full-Time Permanent DUTY LOCATIONS: 1 vacancy…
A visitor is concerned: Lately, and for reasons I do not understand, this site is regularly visited by The Department of Defense, at times particularly the CIFA arm of DOD, The United States Department of State, and yesterday, the U.S. General Accounting Office.(There are many, many more governmental entities that visit this site.) […] To…
The Washington Times allows for a moment of reflection: Despite statements by senior al Qaeda leaders, U.S. intelligence agencies do not have information indicating the group is ready to conduct a major attack, U.S. counterterrorism officials said. […] there are no signs of an impending attack like the hijacked airline strikes on the Pentagon and…
The Washington Post discovers the open secret: John D. Negroponte is to give a Capitol Hill briefing this morning on threats at home and abroad, as lawmakers express varying degrees of concern about whether he has moved quickly enough to establish his leadership as the nation’s first director of national intelligence. Several members of Congress…
Steve Hayes and William Kristol bring the noise on media exploitation.
The Hill reports on more Pentagon consolidation proposals: Sources tell The Hill that Secretary of Defense Donald Rumsfeld is considering a proposal to eliminate the office of the assistant secretary of defense for special operations and low-intensity conflict (ASD SO/LIC) and spreading its responsibilities across other Pentagon offices. The proposal comes from Ryan Henry, the…
A great series of questions and answers about Able Danger at Rory O’Conner’s blog that summarizes all you need to know (before the knock on the door comes). (more shortly)
GCN keeps setting them up . . . The Homeland Security Department will test how well it works with other federal agencies and private IT companies to protect cybersecurity in a national exercise Feb. 6-10. The Information Technology Information-Sharing and Analysis Center will take part in the exercise, known as Cyber Storm, with DHS to…
Catching up on more GCN tid-bits: John Russack, program manager for the Information-Sharing Environment in the office of the Director of National Intelligence, is leaving the post, according to a statement released today by Sen. Dick Durbin (D-Ill).
Government Computer News reports on DHS’s new “Secure Border Initiative” The Homeland Security Department today took the wraps off its ambitious plan to quickly gain control of the U.S. northern and southern borders by hiring a systems integration contract team to carry out the Secure Border Initiative (SBI). DHS plans to request proposals…
The FBI Motto: Fidelity, Bravery, Integrity Her fidelity I can’t speak to . . . whatever bravery she had when she blew the whistle on stupid-headquarters-tricks has long past . . . and as far as integrity, well, read on (from Captain’s Quarters): […] former FBI agent and whistleblower Coleen Rowley […] has descended far…
Siobhan Gorman blazes a trail through Ft. Meade: A program that was supposed to help the National Security Agency pluck out electronic data crucial to the nation’s safety is not up and running more than six years and $1.2 billion after it was launched, according to current and former government officials. The classified project, code-named…
With smart contracts’ rapid growth, IT leaders should understand the role those contracts could play within an enterprise technology ecosystem. Smart contracts on blockchain have the potential to streamline certain business processes and some business and IT leaders are looking at the potential use cases, such as in the area of advertising and healthcare. But smart…
Crypto could use a bit of good news these days. And on Wednesday, it got some. Ethereum, the most popular crypto platform, appears to have successfully upgraded its software architecture from a type of blockchain known as “proof of work,” which it has run since its inception in 2015, to a type of blockchain known as…
Though many public pension funds have shied away from digital assets tied to cryptocurrencies and the blockchain, some are nevertheless moving forward with small investments in this potentially transformational yet volatile sector. Last year, for example, the $5.3 billion Houston Firefighters’ Relief and Retirement Fund decided to establish a $25 million portfolio in crypto assets. The…
The most worrisome trend in crypto crime is the startling increase in funds stolen from DeFi protocols, particularly the cross-chain bridges. A significant portion of the value stolen through Defi protocols can be traced back to malicious actors with ties to North Korea. Highly skilled hacking groups such as Lazarus Group have taken credit for…
Proponents paint Bitcoin (BTC) and other cryptocurrencies as antidotes to totalitarian governments and central banks. Simultaneously, international corporations and startups alike have designed blockchain platforms and products that could be used on behalf of totalitarian governments and central banks. One example is Microsoft, which applied for a patent for a cryptocurrency system using body activity data.…
The Justice Department announced charges Wednesday against three Iranian men accused of hacking into hundreds of U.S. computer systems, encrypting data and extorting victims for ransom. Victims of the scheme included a township in Union County, New Jersey, and a county government in Wyoming; accounting firms in New Jersey and Illinois; power companies in Indiana…
We have recently observed malicious actors exploiting both recently disclosed and older Oracle WebLogic Server vulnerabilities to deliver cryptocurrency-mining malware. Oracle WebLogic Server is typically used for developing and deploying high-traffic enterprise applications on cloud environments and engineered and conventional systems. One of the older vulnerabilities that is still being actively exploited by malicious actors…
The second biggest cryptocurrency, Ethereum, is about to switch over to a new operating model that uses 99.9% less energy. The change, called The Merge, is designed to win over critics who see cryptocurrencies as environmentally harmful. Ethereum currently uses as much energy as a medium-sized country. Other cryptocurrencies, including the biggest, Bitcoin, will remain…
A South Korean court has issued an arrest warrant for Do Kwon, the primary developer of cryptocurrencies Luna and TerraUSD, whose spectacular collapse in May roiled crypto markets around the world. Kwon, also the founder of blockchain platform Terraform Labs, has been accused of fraud by investors in the wake of the collapse. “An arrest warrant…
SWIFT, the messaging system used by financial institutions globally to convey instructions on tens of millions of transactions each day, is testing out blockchain. The Society for Worldwide Interbank Financial Telecommunication, or SWIFT for short, is piloting a project with fintech company Symbiont Inc., according to a post seen by Bloomberg. The collaboration, which includes Citigroup…
Scammers who ransacked cryptocurrency projects to the tune of hundreds of millions of dollars in recent months have been able to carry out such heists by taking advantage of a central tenet of decentralized financial services. While DeFi projects promise to enable more efficiency in crypto transactions, much of the code undergirding the software is public,…
In prepared remarks delivered at the Practising Law Institute’s “SEC Speaks” program on September 8, Chair Gensler emphasized and reiterated his long-standing position that the vast majority of cryptocurrency tokens are securities, and he noted that “only a small number of tokens, even though they may represent a significant portion of the crypto market’s aggregate…
It’s a big week for Ethereum: Its big merge is set for Thursday, and investors could see big price movement when it happens. This major network upgrade will see Ethereum transition from proof-of-work to proof-of-stake. The upgrade will address concerns about its environmental impact and dramatically improve its transaction speed, among other improvements, according to…
The brother of a former Coinbase Global Inc product manager pleaded guilty on Monday to a wire fraud conspiracy charge, in what US prosecutors have called the first insider trading case involving cryptocurrency. Nikhil Wahi, 26, admitted during a virtual court hearing before US district judge Loretta Preska in Manhattan that he made trades based…
At the end of August, the FBI issued a public service announcement on the susceptibility for cybercrime in DeFi (decentralized finance), the growing crypto segment of financial applications backed by blockchain technology. Of the $1.3 billion stolen in cryptocurrencies in the first three months of 2022, 97% came from DeFi platforms. The warning did nothing to…
Despite the Ethereum Merge being touted as a major upgrade to the blockchain network, its transition to proof-of-stake theoretically makes it more vulnerable to exploit. Speaking to Cointelegraph, the security researcher explained that unlike proof-of-work (PoW) systems, a proof-of-stake (PoS) system informs node validators in advance what blocks they will validate, thus enabling them to plan…
A malicious campaign conducted by the North Korean threat actor Lazarus Group targeted energy providers around the world between February and July 2022. The campaign was previously partially disclosed by Symantec and AhnLab in April and May, respectively, but Cisco Talos is now providing more details about it. Writing in an advisory on Thursday, the security researchers…
Popular YouTuber Scuba Jake has confirmed the hacking of his channel with over 13 million subscribers and 1.75 billion views since the channel’s creation in 2011. The September 9 incident saw crypto scammers take over the channel and attempt to defraud unsuspecting followers in a fake giveaway involving Bitcoin (BTC) and Ethereum (ETH). An analysis…
Many traders frequently express some relatively large misconceptions about trading cryptocurrency futures, especially on derivatives exchanges outside the realm of traditional finance. The most common mistakes involve futures markets’ price decoupling, fees and the impact of liquidations on the derivatives instrument. Let’s explore three simple mistakes and misconceptions that traders should avoid when trading crypto…
The Biden administration has pointed, with alarm, to the national security implications of both cybersecurity and cryptocurrency. It’s just a matter of time before the government begins worrying about their intersection—cryptocurrency security. All of the United States’ international adversaries are in the business of exploiting bad cybersecurity, and many of them monetize their exploits using…
Quantum computing has raised concerns about the future of cryptocurrency and blockchain technology in recent years. For example, it is commonly assumed that very sophisticated quantum computers will one day be able to crack present-day encryption, making security a serious concern for users in the blockchain space. The SHA-256 cryptographic protocol used for Bitcoin network security…
I explore the remarkable number of failures in cryptocurrency security for Lawfare. I argue that security really is worse for cryptocurrency, because the decentralization that proponents treasure makes it hard to safely disclose and fix security holes: Software security flaws … are ubiquitous in digital products. Like writers who can’t see their own typos, most coders…
The White House today suggested that U.S. lawmakers and regulators could soon crack down on cryptocurrency mining because of its large carbon footprint. In a Thursday report, mandated by President Biden in an executive order in March, the White House Office of Science and Technology Policy said crypto miners should reduce greenhouse gas emissions, with…
In an ironic twist, Rug Pull Finder (RPF), a nonfungible token (NFT) watchdog focused on identifying Web3-based fraud, has fallen victim to a smart contract exploit of its own. According to the NFT investigator’s post on Twitter on Friday, two people exploited a technical flaw in the project during the free mint stage — pilfering…
As Axie Infinity creator Sky Mavis works to further decentralize its Ronin network—a custom Ethereum sidechain designed for NFT-powered games—the Web3 startup has tapped one of the largest Web2 tech giants to help its cause. Today, Sky Mavis announced that it has reached an agreement with Google Cloud that will see the cloud computing division of…
At an industry conference today, Securities and Exchange Commission (SEC) chief Gary Gensler said that he supports handing the Commodity Futures Trading Commission (CFTC) the power to “oversee and regulate crypto nonsecurity tokens and related intermediaries.” Gensler stressed that should Congress give the CFTC prime oversight over crypto, his own federal agency shouldn’t be overlooked.…
Scammers in recent weeks have employed up fake cryptocurrency web pages to attempt to steal money from users, the latest tactic to emerge in what’s already been a costly year for crypto-related hacks. The sham websites – which masquerade as pages for popular services such as Coinbase, Gemini, Kraken and MetaMask – aim to dupe visitors…
Security researchers have linked a new cyber espionage campaign targeting U.S., Canadian and Japanese energy providers to the North Korean state-sponsored Lazarus hacking group. Threat intelligence company Cisco Talos said Thursday that it has observed Lazarus — also known as APT38 — targeting unnamed energy providers in the United States, Canada and Japan between February and…