Tuesday, June 20, 2023

411 on the 702

Presented by SentinelOne: Delivered every Monday by 10 a.m., Weekly Cybersecurity examines the latest news in cybersecurity policy and politics.
Jun 20, 2023 View in browser
 
POLITICO's Weekly Cybersecurity newsletter logo

By Joseph Gedeon

Presented by

SentinelOne

With help from Maggie Miller

Driving the Day

  It’s been a couple months in the making, but the House Intel committee is about to get a taste of the Trump-Russia investigation. And there could be some discussion of Section 702 surveillance powers set to sunset at year-end.

HAPPY TUESDAY, and welcome to Morning Cybersecurity! We at MC hope you had a restful long weekend. I hate to break it to you (and to myself) but now we’re back to business.

Got tips, feedback or other commentary? Send them to Joseph at jgedeon@politico.com. You can also follow @POLITICOPro and @MorningCybersec on Twitter. Full team contact info is below.

A message from SentinelOne:

The SentinelOne Singularity Platform and Security DataLake is the only FedRAMP Authorized solution empowering centralized security operations in a world of big-data, decentralized IT. SentinelOne DELIVERS Industry leading, autonomous protection, detection, and response across attack surfaces. Unmatched cross-platform security analytics and intelligence with scalable, cost-effective long-term data retention. Expert-level, US-based personnel for deep-dive, comprehensive analysis, and active threat hunting. SentinelOne brings the most innovative and impactful cyber technology solutions to our federal government customers.

 
Today's Agenda

The House Select Intelligence Committee is holding a closed-door hearing on the FBI’s Trump-Russia investigation with former special counsel John Durham. 3 p.m.

 

GET READY FOR GLOBAL TECH DAY: Join POLITICO Live as we launch our first Global Tech Day alongside London Tech Week on Thursday, June 15. Register now for continuing updates and to be a part of this momentous and program-packed day! From the blockchain, to AI, and autonomous vehicles, technology is changing how power is exercised around the world, so who will write the rules? REGISTER HERE.

 
 

Want to receive this newsletter every weekday? Subscribe to POLITICO Pro. You’ll also receive daily policy news and other intelligence you need to act on the day’s biggest stories.

On the Hill

SPYING UNDER CROSSFIRE — Former special counsel John Durham will appear in front of both the House Select Intelligence and House Judiciary committees today to discuss his scathing, five-year-in-the-making report into the investigation into Trump’s 2016 campaign ties to Russian agents. And lawmakers may find the opportunity during the closed-door meeting to bring up the much-debated Section 702.

— In his own words: While Durham doesn’t explicitly mention Section 702 — which allows the government to snoop on electronic communications of foreigners but has also been misused by the FBI for domestic surveillance — in his 300-plus page report, there’s certainly reference to it with pressing implications.

The report says it “considered but did not include proposals that would curtail the scope or reach of FISA or the FBI’s investigative activities … in a time of aggressive and hostile terrorist groups and foreign powers.”

— The 702 Trump ties: Durham’s conclusion that the FBI bungled the Trump-Russia probe is causing both law enforcement and the intelligence communities to hold their collective breath in anticipation of lawmakers deciding how hard they need to knock on 702’s door. The report reignited suspicion on the Republican side that the FBI is politically motivated, leading the agency to stress in its own response that all the senior executives involved in the investigation “have left the FBI as the result of termination, resignation or retirement.”

And as John reported last week, lawmakers aren’t likely to re-up 702 without substantial reforms.

— A gift and a curse: The White House has been pushing to convince lawmakers to renew 702 with very minimal changes come December in the name of national security. One example the administration points to is its key role in identifying the hacking group behind the 2021 Colonial Pipeline ransomware attack.

Still, it’s going to take a lot more than that to convince lawmakers on both sides of the aisle who aren’t too pleased with the other examples of overreach to keep it as is.

“I think the full committee is exactly on the same page of ‘let’s reauthorize but with meaningful reforms,’” ranking member Jim Himes (D-Conn.) told Morning Cyber. “And I haven’t heard anybody say we should reauthorize without reform.”

 

A message from SentinelOne:

Advertisement Image

 
The International Scene

TRAINING UP THE CYBER CORPS — Cyber diplomats wrapped up several days of training in Estonia last week in an exercise aimed at upping cyber expertise and cooperation globally.

The fourth Tallinn Cyber Summer School took place across five days and involved 60 diplomats from 43 countries across Latin America, Asia, Africa and other regions.

The all-star caliber program also featured Christopher Painter, a former State Department cyber ambassador under the Trump and Obama administrations.

“Cyberspace is not just a technical realm but is a geopolitical one involving national security, economic policy and, ultimately, diplomacy,” Painter said. “It’s amazing to see how much this area has grown in just over 10 years and the Tallinn school is a great introduction.”

— People all over the world: Tanel Sepp, Estonia’s ambassador at large for cyber diplomacy whose office hosted the event, told Maggie. “The intention was really to bring together rather junior diplomats who are dealing with cyber issues” and provide knowledge to help with their countries’ cyber defense.

— Hot topics: The raison d'être of the school ranged from the war in Ukraine and how cyberattacks endanger human rights to attributing cyberattacks to the government.

AT THE AGENCIES

BIDEN IN THE GOLDEN STATE — If a tech bubble bursts in San Francisco but no one is around to hear it, did it really make a sound? That’s a question President Joe Biden is not looking to answer, as he wrangles a number of tech-bros and girls to discuss the opportunities and risks rooted in AI regulation in sunny California later today.

Topics will also include the impacts on jobs, education, children, and bias and prejudice.

“Generative AI tools have increased significantly in the past several months and we don’t want to solve yesterday’s problem,” the White House said in a statement.

The roundtable of experts will include Sal Khan, Tristan Harris, Fei-Fei Li, Rob Reich and others.

When in San Francisco, am I right?

 

STEP INSIDE THE WEST WING: What's really happening in West Wing offices? Find out who's up, who's down, and who really has the president’s ear in our West Wing Playbook newsletter, the insider's guide to the Biden White House and Cabinet. For buzzy nuggets and details that you won't find anywhere else, subscribe today.

 
 
Cyber Warfare

CYBER SCHOOL — Class is soon to be in session for ArmyCyber, which signed its first-ever educational partnership with Dakota State University to train budding professionals in the art of cybersecurity.

The five-year plan is set to launch today as part of the Pentagon’s effort to meet demand within a national security scene rife with rising digital threats. A 2022 Government Accountability Office report found that military personnel would leave soon after completing cybersecurity training, which may take a year and costs DOD “hundreds of thousands of dollars.”

It’s also a way for students to see themselves in civilian roles within the military, as well as “on the front lines with jobs that haven’t been created yet,” DSU president José-Marie Griffiths said.

— Congressional support: Ranking member of the Senate Armed Services subcommittee on cybersecurity Mike Rounds (R-S.D.) and Rep. Dusty Johnson (R-S.D.) attended the on-campus event in Madison, S.D., on Monday alongside Gov. Kristi Noem and U.S. Army Cyber Command’s Lt. Gen. Maria Barrett.

Vulnerabilities

MALWARE IN EAST ASIA — Remote workers should be aware of a new sophisticated custom malware sweeping through East Asia seen for the first time in the open.

— Complex code: A new report by Bitdefender is dubbing the custom-developed virus “RDStealer” as it monitors and infects Remote Desktop Protocol clients through a DLL sideloading implant. It’s written in the Go programming language, meaning it can subdue operating systems across the spectrum. The malware is so elaborate the level of disguise “surpasses anything witnessed thus far,” the report reads.

— The details: The attacks are primarily honing in on stealing credentials, private keys, certificates and other sensitive data. The culprits haven’t yet been identified but are behaving in a similar manner to state-sponsored, China-based threat actors.

The research points to the threat actor being active since 2020, but transitioning to custom-developed attacks in late 2021 or early 2022. It’s also a part of a growing trend by hackers to transition toward custom malware as an evasive maneuver to avoid detection.

OT:ICEFALL FINALE — Forescout Vedere Labs is wrapping up its yearlong project looking at design vulnerabilities in operational technology with a closing report today that blames many of the issues they’ve encountered on vendors of the technology not implementing designs that would build security into the systems.

Tweet of the Day

The price of admission.

https://twitter.com/arekfurt/status/1669220856944369669

Quick Bytes

ON TWITTER FIRST — A zero-day vulnerability in the MOVEit hack was exposed on Twitter on June 15, reports Bloomberg’s Katrina Manson.

API ROLLBACK FOR DATA — The BlackCat hacking group is said to have stolen 80GB of data from Reddit, and is demanding a rollback of planned API pricing and a $4.5 million payout for the data. Get the details from Mia Sato’s piece in The Verge.

RANSOMWARE KILLS — When a ransomware attack hits just one hospital, its network of nearby medical providers can be compromised as well. Listen to this report by NPR cybersecurity reporter Jenna McLaughlin on a new study out of the University of California San Diego.

A message from SentinelOne:

Today’s Federal Agencies are challenged by a growing list of adversaries operating in an increasingly complex cyber threat landscape. With staffing, expertise, and budget constraints, they are faced with managing multiple, disjointed security tools and increasing operational costs. At SentinelOne, we are uniquely positioned to help Agencies tackle these problems and combat our most aggressive and malicious adversaries.

The SentinelOne Singularity Platform delivers a single, unified console to manage the full breadth of AI-powered cybersecurity protection, detection, and response technologies for all-surface protection.

Our platform runs on the industry’s first and only unified, M-21-31 Security Data Lake that fuses SentinelOne and 3rd Party security data, threat hunting, deep-dive analytics, and autonomous enforcement into a single unified console.

Authorized through the FedRAMP program, the SentinelOne Platform and Security Data Lake are architected to surpass the stringent operational and security requirements, protecting our nation’s most critical and sensitive data and information.

 
 

Follow us on Twitter

Heidi Vogt @HeidiVogt

Maggie Miller @magmill95

John Sakellariadis @johnnysaks130

Joseph Gedeon @JGedeon1

 

Follow us

Follow us on Facebook Follow us on Twitter Follow us on Instagram Listen on Apple Podcast
 

To change your alert settings, please log in at https://www.politico.com/_login?base=https%3A%2F%2Fwww.politico.com/settings

This email was sent to edwardlorilla1986.paxforex@blogger.com by: POLITICO, LLC 1000 Wilson Blvd. Arlington, VA, 22209, USA

Please click here and follow the steps to unsubscribe.

No comments:

Post a Comment

Is The Lithium Market Back?

At various stages during the last 24 months, we saw... ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏  ͏...