. | . |
US senators call for cybersecurity czar Washington (AFP) April 1, 2009 Two US senators introduced legislation on Wednesday aimed at creating a powerful national cybersecurity advisor who would report directly to the president. Senator Jay Rockefeller, a Democrat from West Virginia, and Senator Olympia Snowe, a Republican from Maine, said the goal of the bill was to reduce US "vulnerability to cyber crime, global cyber espionage, and cyber attacks." The legislation called for the creation of a post of national cybersecurity advisor to "serve as the lead official on all cyber matters, coordinating with the intelligence community, as well as the civilian agencies." "Currently, the US has systems in place to protect our nation's secrets and our government networks against cyber espionage," Rockefeller and Snowe said in a statement. "However, another great vulnerability our country faces is the threat to our private sector critical infrastructure -- banking, utilities, air/rail/auto traffic control, telecommunications -- from disruptive cyber attacks that could literally shut down our way of life. "The increasingly connected nature of our lives only amplifies our vulnerability to cyber attacks and we must act now," Rockefeller said. "Our enemies are real, they are sophisticated, they are determined and they will not rest," he continued. "Congress must bring new high-level governmental attention to develop a fully integrated, thoroughly coordinated, public-private partnership to our cybersecurity efforts in the 21st century." Snowe said "America's vulnerability to massive cyber crime, global cyber espionage, and cyber attacks has emerged as one of the most urgent national security problems facing our country today. "This legislation will ensure we have many of the tools to target, isolate and effectively combat cyber attacks in America," she said. US President Barack Obama announced a sweeping 60-day review in February of US efforts to protect the government's information technology systems from security and economic threats. A congressional panel warned in November that China had developed a sophisticated cyber warfare program and stepped up its capacity to penetrate US computer networks to extract sensitive information. And a December report by the Commission on Cybersecurity for the 44th Presidency listed the issue as "among the most serious economic and national security challenges we will face in the 21st century." Last month, a top US cybersecurity official quit complaining that US cyber protection efforts are being dominated by the super-secret National Security Agency (NSA). Rod Beckstrom, director of the National Cyber Security Center, complained that the NCSC had been effectively sidelined by the NSA and warned against putting the surveillance agency in charge of national cybersecurity.
earlier related report Conficker did just what the "white hats" tracking it expected -- the virus evolved to better resist extermination and make its masters tougher to find. "There are still millions of personal computers out there that are, unknown to their owners, at risk of being controlled in the future by persons unknown," said Trend Micro threat researcher Paul Ferguson. "The threat is still there. These guys are smart; they are not going to pull any obvious strings when there are so many eyeballs on the problem." A task force assembled by Microsoft has been working to stamp out the worm, referred to as Conficker or DownAdUp, and the US software colossus has placed a bounty of 250,000 dollars on the heads of those responsible for the threat. "It is pretty sophisticated and state-of-the-art," Ferguson said. "It definitely looks like the puppet masters are located in Eastern Europe." The worm was programmed to evolve on Wednesday to become harder to stop. It began doing just that when infected machines got cues, some from websites with Greenwich Mean Time and others based on local clocks. The malicious software evolved from East to West, beginning in the first time zones to greet April Fools' Day. Conficker had been programmed to reach out to 250 websites daily to download commands from its masters, but on Wednesday it began generating daily lists of 50,000 websites and reaching randomly 500 of those. The hackers behind the worm have yet to give the virus any specific orders. An estimated one to two million computers worldwide are infected with Conficker. The worm, a self-replicating program, takes advantage of networks or computers that haven't kept up to date with security patches for Windows RPC Server Service. It can infect machines from the Internet or by hiding on USB memory sticks carrying data from one computer to another. Malware could be triggered to steal data or turn control of infected computers over to hackers amassing "zombie" machines into "botnet" armies. "We're still watching to see what it's doing," said Ferguson, a member of the Conficker task force. "A lot of us have our fingers crossed that people are getting rid of this." Microsoft has modified its free Malicious Software Removal Tool to detect and remove Conficker. Security firms, including Trend Micro, Symantec and F-Secure, provide Conficker removal services at their websites. The tell-tale signs that a computer is infected includes the worm blocking efforts to connect with websites of security firms providing online tools for removing the virus. Conficker task force members have found a way to disable the block by typing in a few commands into computers. The US Department of Homeland Security (DHS) released a tool on Monday to detect whether a computer is infected by Conficker. The agency said the worm detector was developed by the US Computer Emergency Readiness Team (US-CERT). "Our experts at US-CERT are working around the clock to increase our capabilities to address the cyber risk to our nation's critical networks and systems, both from this threat and all others," US-CERT director Mischel Kwon said when the tool was released. US-CERT recommended that Windows users apply Microsoft security patch MS08-067 to help protect against the worm. "Life goes on," Ferguson said as the sun set on April Fools' Day in California. "This system could still go off. Time will tell." While Conficker has been in the spotlight, computer security specialists are finding 10,000 new samples of malicious software daily and hundreds of websites are spewing spam, some of it tainted with viruses, according to Ferguson. "There are plenty of threats out there," he said. Share This Article With Planet Earth
Related Links The latest in Military Technology for the 21st century at SpaceWar.com
China calls cyber espionage accusations 'lies' Beijing (AFP) March 31, 2009 China Tuesday dismissed allegations that it was engaged in computer espionage worldwide as "lies" fabricated by people aiming to tarnish the rise of the Asian giant. |
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement |