Senate cybersecurity bill mirrors Russian Internet agenda

FILE – This Sept. 30, 2011 file photo shows a reflection of the Department of Homeland Security logo in the eyeglasses of a cybersecurity analyst at the watch and warning center of the Department of Homeland Security’s secretive cyber defense facility in Idaho Falls, Idaho. The center is tasked with protecting the nation’s power, water and chemical plants, electrical grid and other facilities from cyber attacks. (AP Photo/Mark J. Terrill, File)
Language within the embattled Cybersecurity Act of 2012 parallels that of a proposal made by Russia and China to the U.N. in 2011, which argued for international regulation of the Internet to fight cybercrime.
In September 2011, Russia, China, Tajikistan and Uzbekistan urged U.N. Secretary General Ban Ki-moon to lead discussion on the “International Code of Conduct for Information Security.”
The proposal called for international cooperation on defeating cybercrime and political dissension, as well as a truce in the use of cyberweapons.
States that agreed to the code would also agree to “bolster bilateral, regional and international cooperation, promote the United Nations’ important role in formulation of international norms, peaceful settlement of international disputes, and improvement of international cooperation in the field of information security, and enhance coordination among relevant international organizations.”
The proposal — hailed by the Chinese government as “the first relatively comprehensive and systematic document in the world … to formulate international rules to standardize information and cyberspace behavior” — was created in anticipation of an international telecommunications conference to be held in December 2012 in Dubai, the World Conference on International Telecommunications (WCIT-12).
It was heavily criticized by U.S. policymakers, however, as political cover for internal crackdown of political dissidents.
It also prompted a House committee to pass a resolution led by California Republican Rep. Mary Bono Mack opposing the notion of international regulation of the Internet. Florida Republican Sen. Marco Rubio introduced a similar measure in the Senate at the end of June.

Read more: http://dailycaller.com/2012/07/31/senate-cybersecurity-bill-mirrors-russian-internet-agenda/#ixzz22IowaHdK 

New CISPA in the Senate ready for a vote

RT

July 31, 2012
Congress is debating a new cybersecurity bill that has garnered the support of the White House. Does that mean it will ease the fears from Capitol Hill while still respecting concerns of privacy though? Aaron Swartz of Demand Progress joins RT’s Liz Wahl to talk about the latest efforts regarding the newest cybersecurity legislation being considered.

Indian Officials Get Training from Hackers who cracked CERN’s IT system

cracked+CERN's+IT+system

Two Argentina-based cyber security experts – Chris Russo and Fernando Viacanel, who claimed to have cracked the security code of IT systems involved in the discovery of ‘God Particle’, today conducted training sessions for Indian government officials.
Both the hackers are partners of IT security firm E2 Labs and their company in arrangement with industry chamber Assocham has plans to conduct series of technology exchange programmes on cyber security.Russo said that three times he has been able to find vulnerability in IT system of European Organisation for Nuclear Research (CERN) that has been involved in discovery of ‘God Particle’ or Higgs Boson.


Programme was attended by officials from Cabinet secretariat, National Technical Research Organisation, Airforce, C-DAC, Income Tax Department, Assam’s AMTRON along with representatives from private sector entities, Aircel and Cisco.


“Talents required to be cyber security experts are mostly available in people with an average age of below 30. This should be also recognised by government”, Senior Director Assocham Ajay Sharma said.
Chris Russo also going to Present “Black Arts of Automated and Remote Exploitation” at The Hackers Conference, will be held in New Delhi on July 29 2012.


His talk will be about the bundle exploit packs, also known as BEPs. His presentation will shows and demonstrates the mechanisms, including passive and active detection systems, drive by download and drive by cache techniques, geolocation libraries implemented, Obfuscation and encryption techniques, and the selection on the fly of the most convenient exploit for each case. How this systems are used, for malware spreading such as botnets, PPI binaries and Rouge AVs, generating profits for their owners for more than $500 dollars daily.


The audience should benefit by understanding the threats, risks and market behind the automated remote exploitation techniques and the entire economic system behind it. His talk will also allow the users to take preventive measures in order to stop these threats or reduce the risk associated with it.


The Hackers Conference 2012 is expected to be the first open gathering of Blackhat hackers in India who will debate latest security issues with the top itelligence echolons in India. The conference has sent special invites to Blackhat hackers to come and demonstrate their talent and help the security agencies bridge the knowledge gaps existing today.


You can Register yourself here, to attend THC2012.