US retailers set up center for cyber intelligence sharing

Posted on 15 May 2014.
The US Retail Industry Leaders Association (RILA), along with several of America’s most recognized retail brands, launched the Retail Cyber Intelligence Sharing Center (R-CISC).
The R-CISC is an independent organization, the centerpiece of which is a Retail Information Sharing and Analysis Center (Retail-ISAC). Among those companies participating with and supportive of the R-CISC are American Eagle Outfitters, Gap, J.C. Penney, Lowe’s, Nike, Safeway, Target, VF and Walgreens.

Through the R-CISC, retailers are sharing cyber threat information among themselves and, via analysts, with public and private stakeholders, such as the US Department of Homeland Security, US Secret Service and the Federal Bureau of Investigation. The R-CISC will also provide advanced training and education and research resources for retailers. Continue reading

Six hurt, suspect dead in Georgia FedEx facility shooting

Police officers from Cobb County Police, and Marietta and Kennesaw departments stage near the entrance of the Federal Express Ground building after a man opened fire inside the building before turning the gun on himself in Kennesaw, Georgia, April 29, 2014. REUTERS-Kelly J. Huff-Marietta Daily Journal

1 of 13. Police officers from Cobb County Police, and Marietta and Kennesaw departments stage near the entrance of the Federal Express Ground building after a man opened fire inside the building before turning the gun on himself in Kennesaw, Georgia, April 29, 2014.

Credit: Reuters/Kelly J. Huff/Marietta Daily Journal

(Reuters) – A FedEx Corp package handler armed with a shotgun opened fire at a shipping facility in suburban Atlanta early on Tuesday, injuring six people before killing himself, apparently with his own weapon, police and hospital officials said. Continue reading

Intimidating new Internet fraud reported in AC

New type of malicious computer virus known as ‘ransomware’

There is a relatively unknown malicious computer virus going around the Internet posing as an official message from the Department of Homeland Security’s “ICE Cyber Crime Center.”

The ransomware is part of what is known as the the Troj/Reveton-Ransomware family and it displays a lock screen that requires the user to pay a ransom before they will be allowed to access their Windows desktop, applications or files. Continue reading

The Diplomatic Brain Drain in Afghanistan

BY Gordon Lubol 

APRIL 13, 2014 – 08:04 PM

Afghans are expected to settle on a new president by this summer and the U.S. and the new government in Kabul will begin to forge a relationship in the postwar period. But at this critical juncture there will be a diplomatic brain drain that will undermine U.S. policy goals there, say officials in and out of the U.S. government.

With President Hamid Karzai leaving office after a stormy relationship with Washington for more than 12 years, many current and former U.S. officials see a unique opportunity to redefine the relationship with Kabul.

But that may be difficult. By summer, after a possible runoff election chooses Karzai’s successor, most of the mid-level and senior U.S. civilians with deep Afghanistan experience who would have the knowledge to help foster strong relations with the new government will be long gone. And, officials familiar with the matter said, they will be replaced by diplomats expected to have far less experience. Continue reading

US intelligence under fire over Ukraine

Intelligence official calls reports ‘highly inaccurate’

Author: By John Crawley CNN

image

Published On: Mar 05 2014 09:38:19 PM EST Updated On: Mar 05 2014 10:25:05 PM EST

REUTERS/Mikhail Maslovsky   WASHINGTON (CNN) –

The nation’s top intelligence office denies suggestions the United States was caught off guard by Russia’s military intervention in Ukraine, calling reports to that effect “highly inaccurate.”

Shawn Turner, a spokesman for Director of National Intelligence James Clapper, said in a statement Wednesday that the intelligence community has “frequently warned of worrisome trends with respect to Russia’s foreign policy” since Vladimir Putin returned to the presidency in 2012.

Continue reading

A Running List of What We Know the NSA Can Do. So Far.

Friday, January 17, 2014 – 09:20 AM

By Jody Avirgan : Associate Producer, The Brian Lehrer Show

ListenAddDownloadEmbed

image

National Security Agency (NSA) (Chris Hardie/flickr)

Update: Shane Harris, Senior Writer at Foreign Policy and author of The Watchers, joined Brian Lehrer to discuss the list and provide context. Audio available to stream and download above.

The trove of documents leaked by Edward Snowden has revealed the elaborate tricks the NSA can use to monitor communications and data around the world. Here, a running list of things we now know the NSA can do, based on media reports and other publicly available documents — so far. If we missed any, let us know in the comments page or by tweeting @brianlehrer.

  • It can track the numbers of both parties on a phone call, as well location, time and duration. (More)
  • It can hack Chinese phones and text messages. (More)
  • It can set up fake internet cafes. (More)
  • It can spy on foreign leaders’ cell phones. (More)

Continue reading

NSA gives Israel raw intercepts containing US citizens’data

image september 12, 2013 by Joseph Fitsanakis

By JOSEPH FITSANAKIS | intelNews.org |
The United States National Security Agency (NSA) shares raw intercepted data with Israeli intelligence without first deleting information pertaining to American citizens, according to a leaked document. British newspaper The Guardian published on Wednesday an informal memorandum of understanding between the NSA and the Israel SIGINT National Unit (ISNU). The five-page document was supplied to the newspaper by Edward Snowden, a technical contractor for the NSA who defected to Russia this past summer. It outlines an agreement reached in 2009 between the NSA and the ISNU, under which the American side provides the Israelis with raw intercepts, which often contain telephone and email data belonging to American citizens. The memorandum describes this type intelligence sharing as a “routine” aspect of a broader “SIGINT relationship between the two organizations”.

Continue reading