Monday, January 14, 2013
Complete DHS Daily Report for January 14, 2013
• The Federal Aviation Administration required a safety review of all Boeing 787 Dreamliners after a series of safety incidents. – Atlantic Wire
7. January 11, Atlantic Wire – (National; International) FAA orders review of all Boeing 787 Dreamliners. The Federal Aviation Administration required a safety review of all Boeing 787 Dreamliners after a series of safety incidents. The notice includes a review of systems, assembly, manufacture, and design of the airliners. Source: http://www.theatlanticwire.com/business/2013/01/faa-orders-review-all-boeing-787-dreamliners/60870/
• Many residents of Niskayuna were affected by a water main break January 10. Traffic was detoured around the break and police advised people to only use 9-1-1 in case of emergencies, as they were overwhelmed with calls relating to the break. – WNYT 13 Albany
16. January 10, WNYT 13 Albany – (New York) Water main break in Niskayuna. Many residents of Niskayuna were affected by a water main break January 10. Traffic was detoured around the break and police advised people to only use 9-1-1 in case of emergencies, as they were overwhelmed with calls relating to the break. Source: http://wnyt.com/article/stories/S2892531.shtml?cat=300
• A New York City lab technician was implicated in the mishandling of DNA from over 800 rape cases from 2001 through 2011. – New York Times
24. January 10, New York Times – (New York) New York examines over 800 rape cases for possible mishandling of evidence. A New York City lab technician was implicated in the mishandling of DNA from over 800 rape cases from 2001 through 2011. There have been 26 cases thus far that indicate false findings were presented to investigators. Source: http://www.nytimes.com/2013/01/11/nyregion/new-york-reviewing-over-800-rape-cases-for-possible-mishandling-of-dna-evidence.html?_r=2&
• A U.S. Senator announced that a group with a possible al-Qa’ida affiliation was behind a phone hacking scheme that resulted in New York businesses paying hundreds of thousands of dollars for long-distance phone calls the group was making overseas. – Softpedia See item 29 below in the Communications Sector
Banking and Finance Sector
3. January 11, NextGov – (National) FBI posts Google map of bank heist photos so locals can finger the perps. The FBI launched a Web site that maps the locations of bank robberies and provides wanted posters, weapons used, and other descriptions to help law enforcement and citizens identify suspects. Source: http://www.nextgov.com/cloud-computing/2013/01/fbi-posts-google-map-bank-heist-photos-so-locals-can-finger-perps/60619/
4. January 10, U.S. Attorney’s Office, Central District of California – (National) Five arrested in Orange County-based ‘Builder Bailout’ mortgage fraud scheme that fraudulently purchased condos. Five individuals were arrested for their alleged part in a country-wide real estate scheme based in Orange County, California, that used straw buyers to purchase condominiums in exchange for kickbacks, many of which went into default and cost lending institutions at least $6.2 million. Source: http://www.fbi.gov/losangeles/press-releases/2013/five-arrested-in-orange-county-based-builder-bailout-mortgage-fraud-scheme-that-fraudulently-purchased-condos
5. January 10, Global Security Newswire – (International) U.S. warns foreign exchange houses are helping Iran skirt sanctions. A notice from the U.S. Department of the Treasury’s Foreign Assets Control Office warned banks to be alert for money transfers sent by foreign exchange houses and trading companies being used by Iran to work around sanctions. Source: http://www.nextgov.com/defense/2013/01/us-warns-foreign-exchange-houses-are-helping-iran-skirt-sanctions/60602/
6. January 7, Associated Press – (Georgia) Ex-TCU football player pleads guilty to mail fraud. A man pleaded guilty to running a foreign currency exchange scheme where he defrauded investors of $15.8 million while running a trading business in Peachtree City. Source: http://www.mysanantonio.com/news/texas/article/Ex-TCU-football-player-pleads-guilty-to-mail-fraud-4172782.php
Information Technology Sector
25. January 11, Computerworld – (International) Google revs up Chrome, crushes bugs. Google released the newest version of its Chrome browser, Chrome 24, January 10, making improvements and patching 24 vulnerabilities, 11 of which were rated as ‘high.’ Source: http://www.computerworld.com/s/article/9235597/Google_revs_up_Chrome_crushes_bugs
26. January 11, Softpedia – (International) Java 7 zero-day exploit used to distribute Reveton ransomware. Trend Micro researchers found that the recently uncovered Java 7 zero-day exploit is being used to Reveton ransomware. The U.S. Computer Emergency Readiness Team (US-CERT) also issued an advisory about the zero-day and recommended that users disable Java until a patch is available. Source: http://news.softpedia.com/news/Java-7-Zero-Day-Exploit-Used-to-Distribute-Reveton-Ransomware-320400.shtml
27. January 10, IDG News Service – (International) Foxit Reader vulnerable to critical remote code execution flaw. A critical vulnerability in the Foxit Reader PDF viewer application can be exploited to allow remote system access. The developers of Foxit announced that they have identified the cause and are working on a patch that should be available within a week. Source: http://www.networkworld.com/news/2013/011113-foxit-reader-vulnerable-to-critical-265711.html?source=nww_rss
28. January 11, Oakland Tribune – (California) KTVU van window smashed, $20,000 worth of equipment stolen. About $20,000 worth of technical equipment was stolen January 10 from a KTVU 2 Oakland van when thieves broke in while the crew was covering a story in Oakland. Due to the high frequency of crimes against news reporters in the area, some stations are sending security guards while their crews go out on assignments. Source: http://www.insidebayarea.com/breaking-news/ci_22351112/police-ktvu-van-window-smashed-20-000-worth
29. January 11, Softpedia – (New York) Phone hacking ring targeting New York businesses possibly linked to Al Qaeda. A U.S. Senator announced that a group with a possible al-Qa’ida affiliation was behind a phone hacking scheme that resulted in New York businesses paying hundreds of thousands of dollars for long-distance phone calls the group was making overseas. A vulnerability in voicemail allowed hackers to break in and utilize their systems without the companies’ knowledge. Source: http://news.softpedia.com/news/Phone-Hacking-Ring-Targeting-New-York-Businesses-Possibly-Linked-to-Al-Qaeda-320490.shtml
Department of Homeland Security (DHS)
DHS Daily Open Source Infrastructure Report Contact Information
About the reports - The DHS Daily Open Source Infrastructure Report is a daily [Monday through Friday] summary of open-source published information concerning significant critical infrastructure issues. The DHS Daily Open Source Infrastructure Report is archived for ten days on the Department of Homeland Security Web site: http://www.dhs.gov/IPDailyReport
Content and Suggestions: Send mail to email@example.com or contact the DHS Daily Report Team at (703)387-2314
Subscribe to the Distribution List: Visit the DHS Daily Open Source Infrastructure Report and follow instructions to Get e-mail updates when this information changes.
Removal from Distribution List: Send mail to firstname.lastname@example.org.
To report physical infrastructure incidents or to request information, please contact the National Infrastructure
Coordinating Center at email@example.com or (202) 282-9201.
To report cyber infrastructure incidents or to request information, please contact US-CERT at firstname.lastname@example.org or visit their Web page at www.us-cert.go v.
Department of Homeland Security Disclaimer
The DHS Daily Open Source Infrastructure Report is a non-commercial publication intended to educate and inform personnel engaged in infrastructure protection. Further reproduction or redistribution is subject to original copyright restrictions. DHS provides no warranty of ownership of the copyright, or accuracy with respect to the original source material.