Economic Jihad

No surprise, really, Jihadist terror organizations have set economic terrorism as their new target. They intend to paralyze Western economies, the United Sates in particular, claims Prof. Gabriel Weimann at the University of Haifa. Prof. Weimann monitored websites hosted by terrorist and terrorism-supporting organizations and concludes: “For the Jihadists, the present economic crisis signifies an ideal opportunity and platform to leverage a economic terrorist campaign.”

Over a number of years, Prof. Weimann surveyed public and encoded websites run by Islamic terrorist organizations, forums, video clips, and practically all the information related to Islamic Jihad terrorism that is flowing through the network.

http://newmedia-eng.haifa.ac.il/?p=2623

Advertisements

Former MI6 Agent Sells Top-Secret Files

Daniel Houghton, 25, a former MI6 agent appeared in court charged with trying to sell top-secret files. He was arrested at a London hotel on Monday. He is alleged to have handed over memory cards and a hard drive containing information. The prosecutor told the court that Houghton, who is unmarried and holds joint British and Dutch nationality, began working for the security service in September 2007. The files in Houghton’s possession were of the highest security classified rating.

Houghton was charged with two counts that he breached the Official Secrets Act in that he stole property belonging to the British security service and that he disclosed information relating to security or intelligence.

London Evening Standard

Lessons Learned From Data Theft

Interesting article posted up at Processor. Carl Herberger of EvolveIP explains the layered approach to information security as bringing together several comprehensive policies and manual procedures to a variety of point security solutions, filtering systems, and monitoring strategies to protect IT resources and data.

As data loss prevention becomes increasingly important, it becomes more likely that a re-assessment and redeployment of security perimeter resources will occur. Implementation of DLP tools may boost the detection of data theft. Creating multiple layers can be useful not only in preventing theft but also in spotting it when it happens.

Processor

Lessons Learned from Aurora

As Operation Aurora highlighted, advanced persistent threats (APT) are an increasingly common form of complex and directed attacks that use insidious techniques for gaining access to privileged systems and maintaining that access until all of the attackers’ goals and objectives have been met. Operation Aurora employed an APT technique that proved extremely successful in targeting, exploiting, accessing, and exfiltrating highly valuable intellectual property from its victims. This paper details Operation Aurora and provides some insight into what was learned and how to prevent such attacks from being successful in the future.

http://www.net-security.org/malware_news.php?id=1223

On Wednesday March 17th at 1PM EST, NetWitness and Forrester are hosting a webinar to investigate what qualifies as an APT, the latest APT methods, network forensics studies of true APT attacks on commercial and government organizations, and countermeasures to protect your enterprise and assets from these most insidious and persistent adversaries. Register