Department of Homeland Security Daily Open Source Infrastructure Report

Monday, May 4, 2009

Complete DHS Daily Report for May 4, 2009

Daily Report

Top Stories

 According to the Anchorage Daily News, Trident Seafoods Corp. has agreed to pay the U.S. Environmental Protection Agency more than $112,000 for failing to properly report its storage of thousands of pounds of ammonia at three of its Alaska plants as well as at a Seattle plant. (See item 22)


22. April 30, Anchorage Daily News – (Alaska; Washington) Trident agrees to $112,000 fine. One of Alaska’s biggest seafood processors has agreed to pay more than $112,000 for failing to properly report its storage of a toxic gas at three of its Alaska plants as well as at a Seattle plant. Trident Seafoods Corp. agreed to pay the U.S. Environmental Protection Agency $61,354 for violating federal law by not reporting thousands of pounds of ammonia, implicated in many leaks and dangerous explosions, to emergency planners. The company also agreed to provide more than $51,000 in emergency equipment to accident responders in Kodiak and Akutan. The Alaska violations occurred at Trident’s Kodiak, Akutan and Petersburg plants in 2006, according to the federal consent order Trident signed in April. Ammonia is often used in refrigeration at food plants and on fishing boats, and leaks over the past few years have caused evacuations at Alaska fish plants. Source: http://www.adn.com/news/alaska/story/779612.html


 The Washington Post reports that two Montgomery County, Maryland teenagers have been charged with arson and conspiracy to commit murder in an alleged plot to kill the principal at their White Oak high school with a nail-filled bomb and then trigger a major explosion inside the school, authorities said on April 29. (See item 34)


34. April 30, Washington Post – (Maryland) 2 students charged with explosion, slaying plot. Two Montgomery County, Maryland teenagers have been charged with arson and conspiracy to commit murder in an alleged plot to kill the principal at their White Oak high school with a nail-filled bomb and then trigger a major explosion inside the school, authorities said April 29. The Springbrook High School students are suspected of having set three fires at the school, including one April 28 before the discovery of the plot that led to their arrests, police said. According to police, the students planned “in the near future” to throw the bomb into the principal’s office, and then puncture a gas pipe in the school’s auditorium and use an incendiary device to set off an explosion. The Montgomery Police Chief said investigators think the students “really had an intention of doing this.” “They were surely doing things that made one believe they were going to try,” he said. Over the past month, the students “constructed and experimented with several different incendiary devices,” said a police spokesman. They had also attempted to puncture pipes in the boys’ locker room to determine whether they were gas lines, he said. Each is charged with conspiracy to commit first-degree murder, three counts of first-degree arson and other offenses. They were scheduled to appear in court for bond hearings April 30. Source: http://www.washingtonpost.com/wp-dyn/content/article/2009/04/29/AR2009042902520.html?hpid=moreheadlines


Details

Banking and Finance Sector

14. May 1, Indiana Star – (Indiana) Feds charge 7 in $19.7M Central Indiana mortgage scam. Federal investigators say they have cracked a massive mortgage fraud scheme in Central Indiana: a sprawling web of forged documents, inflated property values and fraudulent loans adding up to nearly $20 million. Three people were charged on April 30 with wire fraud and money laundering, and four with conspiracy to commit wire fraud and money laundering. If convicted, each faces 15 to 30 years in prison and fines of $1 million. The scheme, involving 149 loans worth $19.7 million, led to the foreclosures of 97 Eastside homes in Windsor Village, where duplexes were sold at the inflated price of $120,000 each, only to be foreclosed when no payments were made. Many were later resold for $3,500 to $15,000 apiece. The scheme took place from 2003 to 2005, according to the U.S. attorney for the Southern District of Indiana. He called it the largest fraud case his department has handled in the past decade. Source: http://www.indystar.com/article/20090501/NEWS02/905010335


15. April 30, Financial Advisor – (California) Beverly Hills fund scam nets $38M. The Securities and Exchange Commission has shut down two Beverly Hills hedge funds that allegedly used a web of lies to raise $38 million from 20 investors. The funds lost millions of dollars over the years and had less than $650,000 in assets at the end of 2008, but the key figure in the scheme doctored the funds’ account statements, bragging of more than $800 million in assets and annual returns of between 15 percent and 60 percent, according to the SEC. He convinced one prospect to invest in the funds by falsely claiming the funds’ investors included a member of the Milken Family Foundation and the CEO of Oracle Corp., according to the SEC. The lies also included claims that the funds held positions in companies such as Apple, Microsoft Corp. and Wal-Mart Stores, according to the SEC. The funds, Ruderman Capital Partners and Ruderman Capital Partners A, has been taking investors funds since at least 2002, according to SEC, with two investors putting $1 million into the funds as recently as January, money that was used by the mastermind to make a “Ponzi-like” payment to an investor who requested a $750,000 withdrawal. The scheme collapsed in April when the mastermind’s attorney sent a letter to investors stating that “there is currently very little value in the assets held by the [funds],” according to the SEC. As of March 31, 2009, the funds had total remaining assets of about $387,000, according to the SEC complaint. Source: http://www.fa-mag.com/fa-news/4122-beverly-hills-fund-scam-nets-38m.html


16. April 30, MarketWatch – (National) Senate rejects bill to modify troubled homeowner loans. A controversial provision that would allow bankruptcy judges to modify mortgages for troubled homeowners was rejected by the Senate on April 30. The provision, known as “cram-down,” failed on a vote of 51-45. A similar measure was approved by the House earlier this year. Citigroup Inc. endorsed a version of the measure earlier this year that would have allowed bankruptcy judges to modify loans that existed prior to the measure becoming law. However, since then most other financial institutions have lobbied furiously on Capitol Hill to make sure it was not adopted. The provision, would have allowed bankruptcy judges to rewrite the terms of a mortgage contract by changing interest rates or extending the loan payment periods. The rejection is a setback for the U.S. Presidential Administration, which endorsed it. A similar measure was removed from a $700 billion bank bailout bill approved by Congress in October with the expectation by many Senators that lawmakers would return to approve it at a later date. The American Bankers Association, which had lobbied heavily on Capitol Hill against the measure, was satisfied with the result. Source: http://www.marketwatch.com/news/story/senate-rejects-controversial-cramdown-measure/story.aspx?guid={2CFA8AA2-A7FD-4606-B945-A0323284741F}&dist=msr_1


17. April 30, Computerworld – (International) New standard for encrypting card data in the works; backers include Heartland. The same organization that led the development of security standards for payment-card magnetic stripe data and PIN-based transactions will soon begin work on a new specification for encrypting cardholder data while it is in transit between systems during the transaction process. And among the companies in the forefront of the effort is Heartland Payment Systems Inc., the Princeton, New Jersey-based payment processing firm that announced in January what some analysts think could end up being the largest data breach involving credit-card information thus far. The Accredited Standards Committee X9, which is accredited by the American National Standards Institute, is set to launch an initiative formally known as the Sensitive Card Data Protection Between Device and Acquiring System program. ASC X9 develops and maintains numerous standards for the financial services industry in the United States, and participants said the week of April 27 that the goal of the new effort is to develop a data encryption standard to protect information from the moment a card is swiped at a payment register to the end of the transaction chain at a so-called acquiring bank. The need for such “end-to-end” protection has become increasingly apparent within the payment card industry in the wake of the continuing breaches at companies such as Heartland and RBS WorldPay Inc., another payment processor that disclosed a system intrusion last December. But while proprietary tools are available from a few vendors for achieving that type of protection, there currently is no standard approach, said the director of security engineering at ACI Worldwide Inc., a vendor of payment processing software in New York. Source: http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9132420&intsrc=news_ts_head


Information Technology


39. May 1, eWeek – (International) Facebook targeted in spam scam. The popular social networking site Facebook successfully fought off an attack from a piece of malware on April 30, the second attack this week. Facebook, which claims 200 million users, said the phishing scam tricked users into clicking on a link in the messages inbox that took them to a false Facebook Website here cyber-criminals were able to access their login information. The company said on April 30 it was able to shut down the two malicious links at the core of the attack, fbstarter.com and fbaction.net. Facebook said it is also in the process of removing messages that refer to the link, which tricks users with the message “Look at this!” as well as resetting passwords for affected members. The April 29 attack, a similar worm, directed users to the site BAction.net. In the wake of the attacks, Facebook and brand protection firm MarkMonitor announced that Facebook is using MarkMonitor’s AntiFraud Solutions to supplement Facebook’s own in-house security efforts in protecting users against malware attacks. Facebook, which already uses MarkMonitor AntiFraud Solutions to help combat phishing attacks, is expanding its use of MarkMonitor to further protect Facebook and its users from ongoing malware attacks. A Facebook threat analyst said the company’s deep commitment to the safety of its millions of users requires a strong, proactive security strategy, best-of-breed technology and active engagement with industry leaders. “MarkMonitor demonstrated that it understood the complexity of the phishing issue we were facing so it was a natural next step for us to bolster our own security systems with their anti-malware solution,” he said. Source: http://www.eweek.com/c/a/Midmarket/Facebook-Targeted-in-Spam-Scam-603252/


40. May 1, American Free Press – (International) Cyber crooks churning out trick flu emails. Cyber crooks are capitalizing on influenza fears with torrents of email promising “swine flu” news but delivering malware or dubious offers for potency drugs or penis enlargement. An alert posted on April 30 at the U.S. Food and Drug Administration also warns that scammers have launched websites hawking bogus products “that claim to prevent, treat, or cure” the H1N1 flu virus. The FDA said it is “informing offending websites that they must take prompt action to correct and/or remove promotions of these fraudulent products or face immediate enforcement action.” “Zombie” computers infected with a dreaded Conficker virus that became an online scourge this year are among machines being used to spew flu spam crafted to trick email recipients, according to computer security firm Trend Micro. “The thing making it worse is the misinformation out there about swine flu,” a Trend Micro threats research manager said April 30. “These guys have picked up on all the fears people have. With all the hysteria of swine flu, some people click on these emails.” Subject boxes of spam email feature lines such as “Swine Flu Outbreak!” and “Madonna Catches Swine Flu!” in order to grab people’s interest, a tactic referred to by hackers as “social engineering.” Source: http://www.google.com/hostednews/afp/article/ALeqM5jS9HKAwJcLh5wRxYV1KGlBog3ygQ


41. April 30, HS Daily Wire – (National) Experts: U.S. military’s cyberwar rules “ill-formed.” An experts panel criticized U.S. plans for cyberwarfare as “ill-formed,” “undeveloped,” and “highly uncertain”; as a result, many nuances of cyberwar have remained poorly understood, even as the military actively prepares for it. The U.S. government has yet to form a coherent policy for engaging in warfare that involves attacks on a country’s electrical power grids and other critical infrastructure, according to a non-profit group of scientists and policy advisers. They called on policy makers to actively forge rules for how and when the military goes about mounting offensive and defensive acts of cyber warfare. “The current policy and legal framework for guiding and regulating the U.S. use of cyberattack is ill-formed, undeveloped, and highly uncertain,” the report, published by the National Academy of Sciences, states. “Secrecy has impeded widespread understanding and debate about the nature and implications of U.S. cyberattack.” The many nuances of cyberwar have remained poorly understood, even as the military actively prepares for it. They include the high degree of anonymity of those who carry out such attacks, making it hard to identify those who perpetrate them. Such attacks also result in much more uncertain outcomes than traditional warfare, making it hard to predict success and collateral damage. Source: http://www.hsdailywire.com/single.php?id=7889

Communications Sector

42. April 30, HS Daily Wire – (International) Making quantum cryptography’s promise a reality. Quantum cryptography, in theory, is a completely secure means of communication. It is now much closer to being used practically as researchers from Toshiba and Cambridge University’s Cavendish Laboratory have developed high speed detectors capable of receiving information with much higher key rates, thereby able to receive more information faster. The journal paper, “Practical Gigahertz Quantum Key Distribution Based on Avalanche Photodiodes,” as part of New Journal of Physics’ “Focus Quantum Cryptography: Theory and Practice” issue, details how quantum communication can be made possible without having to use cryogenic cooling or complicated optical setups, making it much more likely to become commercially viable soon. Source: http://www.hsdailywire.com/single.php?id=7883 See also: http://www.iop.org/EJ/abstract/1367-2630/11/4/045005

No comments: