Friday, March 16, 2007

The Information Sharing Environment (ISE)

March 2007

Intelligence community embraces Web 2.0 tools.

The Information Sharing Environment (ISE) that the country’s 2004 terrorism prevention act mandated is beginning to take shape in a loose policy framework established by the Office of the Director of National Intelligence. But intelligence experts say social−networking technologies for sharing intelligence information−−wikis, blogs and mashups, for example−−are developing faster than the policies governing their use. The gap is real, said Ambassador Thomas McNamara, who leads 25 employees at ODNI headquarters and works with the Information Sharing Council, a representative board of federal departments that hold intelligence assets. “The technology is sitting there waiting to be used, but a whole series of decisions have to be made at the policy level.” In November 2006, McNamara released a long−awaited implementation plan for the ISE that reveals how the government will implement the intelligence−sharing provision of the 2004 law. McNamara said that information sharing is fairly well−established within intelligence agencies but less so among agencies. “What we’re doing is adding the next level,” he said. That requires creating standards for broader cooperation and managing access to various levels of classified information. The ISE’s information technology architecture will conform to the Office of Management and Budget’s federal enterprise architecture, McNamara said.
Source: http://www.fcw.com/article97883−03−12−07

Tuesday, March 13, 2007

Apple Patches Airport Extreme

March2007

Apple issues AirPort Extreme patch.

Apple has issued a fix for its wireless networking solution, AirPort Extreme, to complement a similar patch delivered earlier this year. The update, released Thursday, March 8, corrects a vulnerability involving an out_of_bounds memory read error that could occur when processing wireless frames. "An attacker in local proximity may be able to trigger a system crash by sending a maliciously crafted frame to an affected system," according to an Apple advisory. The flaw impacts the Core Duo version of Mac mini, MacBook and MacBook Prop computers that run on a wireless connection. Core 2 Duo versions are not affected.
Apple advisory: http://docs.info.apple.com/article.html?artnum=305031
Source: http://scmagazine.com/us/news/article/642893/apple_issues_ai rport_extreme_patch/

VA Control Storage Devices

March 2007

VA to control, restrict use of mobile storage devices.

In the next month, the Department of Veterans Affairs (VA) will let employees plug into its network only those mobile storage devices issued by the chief information officer’s office. Robert Howard, the department’s CIO, said Tuesday, March 6, he will issue only 1G and 2G thumb drives and will not allow anything larger onto the network unless he approves it. The
mobile storage devices also must be certified under the National Institute of Standards and Technology’s Federal Information Processing Standard 140_2, he added. Besides controlling thumb drives, Howard aims to have a standard configuration for smart phones and personal digital assistants, eliminate unencrypted messages that travel on the VA’s network and reduce
the number of virtual private networks by the end of fiscal 2007. The department also is relying more on public_key infrastructure (PKI) and Microsoft’s rights management system (RMS) in its Outlook e_mail system to do a better job of securing e_mail and documents.
Source: http://www.fcw.com/article97837_03_06_07_Web

Maynor Reveals Apple Flaw

March 2007
Maynor reveals missing Apple flaw.
Security researcher David Maynor got some measure of vindication at the
Black Hat DC Conference this year. Six monthsafter the security researcher
and his colleague Jon Ellch claimed that Mac OS X wireless drivers were vulnerable to attack, Maynor on Wednesday, February 28, revealed the code he used to exploit a native flaw in the platform as well as e_mails showing he notified Apple as to the danger. Maynor said the flaw was in the driver for the Broadcom wireless chip.

The flaw affected not only Mac OS X, but any platform that used drivers based
on the Broadcom reference driver, he said. While MacBooks and PowerBooks
were affected, so were Dell laptops running Windows XP. Apple fixed the flaw
on September 21, but did not give Maynor or Ellch credit. The flaw could have
allowed a remote attacker to compromise a vulnerable MacBook or PowerBook
remotely via an overly long service set identifier.
Source: http://www.securityfocus.com/news/11445

Monday, March 05, 2007

10 Ways Hackers Breach Security

March 2007

1. Stealing Passwords

2. Trojan Horses

3. Exploiting Defaults

4. Man-in-the-Middle Attacks

5. Wireless Attacks

6. Doing their Homework

7. Monitoring Vulnerability Research

8. Being Patient and Persistent

9. Confidence Games

10. Already Being on the Inside

There are many possible ways that a hacker can gain access to a seemingly secured environment. It is the responsibility of everyone within an organization to support security efforts and to watch for abnormal events.We need to secure IT environments to the best of our abilities and budgets while watching for the inevitable breach attempt. In this continuing arms race, vigilance is required, persistence is necessary, and knowledge is invaluable.

Tks J. Michael Stewart
Source: www.globalknowledge.com

Energy Policy Act of 2005

March 2007

As many of you are aware, the US Government made a legal change when President Bush signed the Energy Policy Act of 2005. This act changes the dates on which Daylight Savings Time is observed -- to start from the second Sunday in March (previously, the first Sunday in April) to the first Sunday in November (previously, the last Sunday in October).

Presidio wanted to take this time to make sure that you were aware of these upcoming changes as some network devices will require workarounds and others will require code upgrades.

The following website gives info on workarounds, code upgrades, and list out when third party upgrades are necessary such as when you have software loaded on a server running a Microsoft operating system.
http://www.cisco.com/en/US/tech/tk648/tk362/
technologies_tech_note09186a00807ca437.shtml

Daylight Savings Time changes on various Microsoft products
http://www.microsoft.com/windows/timezone/dst2007.mspx