The U.S. Department of Defense is failing to adequately maintain its main reference list of vital defense technologies that should be banned from export, despite rules requiring its use and upkeep, according to a new report from the Government Accountability Office (GAO). The Militarily Critical Technologies List (MCTL) is “outdated and updates have ceased,” the GAO found in a report released this week. The list was intended as the DOD’s main resource for tracking sensitive technology and preventing its export to foreign nations or entities. But the government agencies charged with using the list say it is too broad and out-of-date to be of much use and have long since abandoned it. Now budget cuts to the program that maintains the list are forcing export control officials in the government to use alternative information sources and informal “networks of experts” to tell them what technologies are in need of protection, […]
Hardware
For Industrial, Medical Systems: Bugs Run In The Family
On the surface, the kinds of industrial control systems that run a power plant or factory floor are very different from, say, a drug infusion pump sitting bedside in a hospital intensive care unit. But two security researchers say that many of these systems have two important things in common: they’re manufactured by the same company, and contain many of the same critical software security problems. In a presentation at gathering of industrial control security experts in Florida, researchers Billy Rios and Terry McCorkle said an informal audit of medical devices from major manufacturers, including Philips showed that medical devices have many of the same kinds of software security holes found in industrial control system (ICS) software from the same firms. The research suggests that lax coding practices may be institutionalized within the firms, amplifying their effects. Rios (@xssniper), a security researcher at Google, and McCorkle (@0psys), the CTO of SpearPoint […]
The Good News for Newtown Investigators: Destroying Hard Drives is Harder than You Think
Adam Lanza knew what he was doing. The 20 year-old man, who has been named as the killer of 27 people, including 20 children, six elementary school staff members and his own mother, deliberately destroyed the hard drives to personal computers he used before leaving his home to launch his attack on t the Sandy Hook Elementary School in Newtown, Connecticut. The hard drives are believed to contain valuable clues to Lanza’s online activities and could help establish a motive for the otherwise senseless crime. According to reports from various news outlets, Lanza removed the hard drives and “smashed” them using what’s described as a hammer or possibly a screw driver. The drives are described as “broken into pieces.” A report on CBS quoted an unnamed source that was “working with the drives” as saying that they were “so badly damaged that authorities face a significant challenge in retrieving any data […]