Tag Archive for: Bruce

Russian Intelligence Agencies Relying on ‘Bruce Force’ to Hack America


Recently, the U.S. and British intelligence communities issued an advisory uncovering the “Brute Force” cyber techniques used by the Russian GRU intelligence agency against hundreds of Western government and private targets. These revelations come in the wake of months of successive cyberattacks against American and European targets, including the SolarWinds, which saw Russian and Chinese hackers gain access to U.S. government systems, and Colonial Pipeline, which interfered with the flow of fuel on America’s East Coast this past May.

According to the Intelligence Community, the GRU cyberattacks started from the middle of 2019 and are likely still ongoing, with the GRU’s 85th Main Special Service Center (GTsSS) unit 26165 identified as the main perpetrator behind the attacks. The goal of this cyber warfare campaign is to access protected and classified databases in order to purloin information, but also to pave the way for future breaches.  

The advisory is a joint product of the U.S. National Security Agency (NSA), the FBI, the Cybersecurity and Infrastructure Security Agency (CISA), and the British Government Communications Headquarters (GCHQ), the U.K.’s signals intelligence agency. 

Related: America needs new covert options for Great Power Competition

KGB Reloaded: Russian Intelligence

The Russian intelligence apparatus is composed of four main agencies.

The SVR (Sluzhba vneshney razvedki Rossiyskoy Federatsii) is the external intelligence agency that focuses on foreign intelligence collection and is often compared to America’s CIA. While not entirely accurate, the comparison is somewhat apt.

The FSB (Federal’naya sluzhba bezopasnosti Rossiyskoy Federatsii) is the internal security and counterintelligence service that focuses on domestic intelligence, and is roughly the equivalent of America’s FBI.

The GRU (Glavnoje Razvedyvatel’noje Upravlenije) is the military foreign intelligence service that commands the Spetsnaz special operations units and a very rough equivalent of the U.S. Defense Intelligence Agency (DIA) and the Joint Special Operations Command (JSOC).

Finally, the FSO (Federalnaya sluzhba okhrany) protects the Russian president but also…

Source…

Internet key to farm security, farmer Bruce Crafter says at Farm Security and Farmers Health Expo in Bendigo – Bendigo Advertiser


Bendigo Advertiser

Internet key to farm security, farmer Bruce Crafter says at Farm Security and Farmers Health Expo in Bendigo
Bendigo Advertiser
Though Mr Crafter was looking to invest in security cameras, he said he was mindful of the cost of the internet service the system would need to draw upon. “It's the affordability of that data,” the farmer said. “It's okay having it [security cameras

internet security news – read more

Bruce Schneier: Public-service technologists are needed to tame the IoT

The internet of things needs to be regulated and soon before it becomes even more of a tool to facilitate cyberattacks, and that means coming up with civic-minded technologists to help formulate government policies, security expert Bruce Schneier told an RSA Conference 2017 audience.

+More on Network World: RSA: Watch out for a new weapon – your own data | Hot products at RSA 2017 +

The problem is governments lack the technological expertise to understand the mindset of the makers of IoT devices and the markets in which they are sold.

To read this article in full or to leave a comment, please click here

Network World Tim Greene

What in the world is Bruce Schneier talking about?

I had a meeting last week with Bruce Schneier, the security expert, book author, blogger, fellow at the Berkman Center for Internet and Society and the CTO of Resilient Systems.

We were talking about the company, which helps businesses respond quickly after they’ve suffered network attacks, and afterward he autographed a copy of his new book for me. It’s called Data and Goliath and is about the data-gathering that goes on routinely about all of us and what uses it has been put to already and what uses it might be put to in the future.

To read this article in full or to leave a comment, please click here

Network World Tim Greene