The Best Cyprus Community

Skip to content


White House Executive Orders on Cyber security

Everything related to politics in Cyprus and the rest of the world.

White House Executive Orders on Cyber security

Postby Paphitis » Sat Dec 31, 2016 3:36 am

Basically, the USA has decided that it will expell the diplomatic offices of ANY country that is found to be engaging in Cyber hacking, Cyber warfare or any malicious activity against the USA, its institutions, internal affairs, and/or democratic porocesses.

It's decision does not only pertain to Russia.

For instance, if Iran or any other country engage in similar activities, the USA will act against that countries Diplomatic offices if the responsible criminal activity is beyond the reach of Law Enforcement.

The Executive Order also covers any malicious acts by foreign governments against any US Government Agency, and infrastructure such as telecommunications and Electricity Grids and water supply.

Excellent Executive Order. 8)

FACT SHEET: Actions in Response to Russian Malicious Cyber Activity and Harassment

https://www.whitehouse.gov/the-press-of ... tivity-and

Today, President Obama authorized a number of actions in response to the Russian government’s aggressive harassment of U.S. officials and cyber operations aimed at the U.S. election in 2016. Russia’s cyber activities were intended to influence the election, erode faith in U.S. democratic institutions, sow doubt about the integrity of our electoral process, and undermine confidence in the institutions of the U.S. government. These actions are unacceptable and will not be tolerated.


In response to the threat to U.S. national security posed by Russian interference in our elections, the President has approved an amendment to Executive Order 13964. As originally issued in April 2015, this Executive Order created a new, targeted authority for the U.S. government to respond more effectively to the most significant of cyber threats, particularly in situations where malicious cyber actors operate beyond the reach of existing authorities. The original Executive Order focused on cyber-enabled malicious activities that:

Harm or significantly compromise the provision of services by entities in a critical infrastructure sector;

Significantly disrupt the availability of a computer or network of computers (for example, through a distributed denial-of-service attack); or

Cause a significant misappropriation of funds or economic resources, trade secrets, personal identifiers, or financial information for commercial or competitive advantage or private financial gain (for example, by stealing large quantities of credit card information, trade secrets, or sensitive information).


The increasing use of cyber-enabled means to undermine democratic processes at home and abroad, as exemplified by Russia’s recent activities, has made clear that a tool explicitly targeting attempts to interfere with elections is also warranted. As such, the President has approved amending Executive Order 13964 to authorize sanctions on those who:

Tamper with, alter, or cause a misappropriation of information with the purpose or effect of interfering with or undermining election processes or institutions.
User avatar
Paphitis
Leading Contributor
Leading Contributor
 
Posts: 20971
Joined: Sun May 21, 2006 2:06 pm

Re: White House Executive Orders on Cyber security

Postby Paphitis » Sat Dec 31, 2016 3:44 am

Using this new authority, the President has sanctioned nine entities and individuals: two Russian intelligence services (the GRU and the FSB); four individual officers of the GRU; and three companies that provided material support to the GRU’s cyber operations.

The Main Intelligence Directorate (a.k.a. Glavnoe Razvedyvatel’noe Upravlenie) (a.k.a. GRU) is involved in external collection using human intelligence officers and a variety of technical tools, and is designated for tampering, altering, or causing a misappropriation of information with the purpose or effect of interfering with the 2016 U.S. election processes.

The Federal Security Service (a.k.a. Federalnaya Sluzhba Bezopasnosti) (a.k.a FSB) assisted the GRU in conducting the activities described above.

The three other entities include the Special Technology Center (a.k.a. STLC, Ltd. Special Technology Center St. Petersburg) assisted the GRU in conducting signals intelligence operations; Zorsecurity (a.k.a. Esage Lab) provided the GRU with technical research and development; and the Autonomous Noncommercial Organization “Professional Association of Designers of Data Processing Systems” (a.k.a. ANO PO KSI) provided specialized training to the GRU.

Sanctioned individuals include Igor Valentinovich Korobov, the current Chief of the GRU; Sergey Aleksandrovich Gizunov, Deputy Chief of the GRU; Igor Olegovich Kostyukov, a First Deputy Chief of the GRU; and Vladimir Stepanovich Alexseyev, also a First Deputy Chief of the GRU.


In addition, the Department of the Treasury is designating two Russian individuals, Evgeniy Bogachev and Aleksey Belan, under a pre-existing portion of the Executive Order for using cyber-enabled means to cause misappropriation of funds and personal identifying information.

Evgeniy Mikhailovich Bogachev is designated today for having engaged in significant malicious cyber-enabled misappropriation of financial information for private financial gain. Bogachev and his cybercriminal associates are responsible for the theft of over $100 million from U.S. financial institutions, Fortune 500 firms, universities, and government agencies.

Aleksey Alekseyevich Belan engaged in the significant malicious cyber-enabled misappropriation of personal identifiers for private financial gain. Belan compromised the computer networks of at least three major United States-based e-commerce companies.
User avatar
Paphitis
Leading Contributor
Leading Contributor
 
Posts: 20971
Joined: Sun May 21, 2006 2:06 pm

Re: White House Executive Orders on Cyber security

Postby Paphitis » Sat Dec 31, 2016 3:48 am

Responding to Russian Harassment of U.S. Personnel

Over the past two years, harassment of our diplomatic personnel in Russia by security personnel and police has increased significantly and gone far beyond international diplomatic norms of behavior. Other Western Embassies have reported similar concerns. In response to this harassment, the President has authorized the following actions:

Today the State Department declared 35 Russian government officials from the Russian Embassy in Washington and the Russian Consulate in San Francisco “persona non grata.” They were acting in a manner inconsistent with their diplomatic status. Those individuals and their families were given 72 hours to leave the United States.

In addition to this action, the Department of State has provided notice that as of noon on Friday, December 30, Russian access will be denied to two Russian government-owned compounds, one in Maryland and one in New York.


Yes Australian Embassy Staff have also reported harassment against its Consular staff in Moscow and St Petersburgh. To the point where Senior Diplomatic Staff no longer leave their compound and if they have to (go to the airport etc), travel in unmarked cars as incognito members of the public and without Diplomatic Protections from the police and Russian Security Apparatus which is a violation of International law.
User avatar
Paphitis
Leading Contributor
Leading Contributor
 
Posts: 20971
Joined: Sun May 21, 2006 2:06 pm

Re: White House Executive Orders on Cyber security

Postby Paphitis » Sat Dec 31, 2016 3:50 am

Raising Awareness About Russian Malicious Cyber Activity

The Department of Homeland Security and Federal Bureau of Investigation are releasing a Joint Analysis Report (JAR) that contains declassified technical information on Russian civilian and military intelligence services’ malicious cyber activity, to better help network defenders in the United States and abroad identify, detect, and disrupt Russia’s global campaign of malicious cyber activities.


The JAR includes information on computers around the world that Russian intelligence services have co-opted without the knowledge of their owners in order to conduct their malicious activity in a way that makes it difficult to trace back to Russia. In some cases, the cybersecurity community was aware of this infrastructure, in other cases, this information is newly declassified by the U.S. government.

The report also includes data that enables cybersecurity firms and other network defenders to identify certain malware that the Russian intelligence services use. Network defenders can use this information to identify and block Russian malware, forcing the Russian intelligence services to re-engineer their malware. This information is newly de-classified.

Finally, the JAR includes information on how Russian intelligence services typically conduct their activities. This information can help network defenders better identify new tactics or techniques that a malicious actor might deploy or detect and disrupt an ongoing intrusion.

This information will allow network defenders to take specific steps that can often block new activity or disrupt on-going intrusions by Russian intelligence services. DHS and FBI are encouraging security companies and private sector owners and operators to use this JAR and look back within their network traffic for signs of malicious activity. DHS and FBI are also encouraging security companies and private sector owners and operators to leverage these indicators in proactive defense efforts to block malicious cyber activity before it occurs. DHS has already added these indicators to their Automated Indicator Sharing service.

Cyber threats pose one of the most serious economic and national security challenges the United States faces today. For the last eight years, this Administration has pursued a comprehensive strategy to confront these threats. And as we have demonstrated by these actions today, we intend to continue to employ the full range of authorities and tools, including diplomatic engagement, trade policy tools, and law enforcement mechanisms, to counter the threat posed by malicious cyber actors, regardless of their country of origin, to protect the national security of the United States.


https://www.whitehouse.gov/the-press-of ... tivity-and
User avatar
Paphitis
Leading Contributor
Leading Contributor
 
Posts: 20971
Joined: Sun May 21, 2006 2:06 pm

Re: White House Executive Orders on Cyber security

Postby Paphitis » Sat Dec 31, 2016 4:03 am

Oh and last but not least:

Russian "Chef" expelled because Russian food sucks!

http://www.680news.com/2016/12/30/the-l ... diplomats/

:lol: :lol: :lol:

User avatar
Paphitis
Leading Contributor
Leading Contributor
 
Posts: 20971
Joined: Sun May 21, 2006 2:06 pm

Re: White House Executive Orders on Cyber security

Postby Paphitis » Sat Dec 31, 2016 4:27 am

The Kremlin said that a government plane will be sent to the US to evacuate the expelled diplomats and their families.


Wouldn't it be safer if they Chartered an American plane instead? :lol: :lol: :lol:

Rumours are, Russian Diplomats/Spies have taken out life insurance.
User avatar
Paphitis
Leading Contributor
Leading Contributor
 
Posts: 20971
Joined: Sun May 21, 2006 2:06 pm

Re: White House Executive Orders on Cyber security

Postby Paphitis » Sat Dec 31, 2016 9:26 am

Image

https://www.theguardian.com/technology/ ... ing-report

he US Department of Homeland Security (DHS) and FBI have released an analysis of the allegedly Russian government-sponsored hacking groups blamed for breaching several different parts of the Democratic party during the 2016 elections.

The 13-page document, released on Thursday and meant for information technology professionals, came as Barack Obama announced sanctions against Russia for interfering in the 2016 elections. The report was criticized by security experts, who said it lacked depth and came too late.
User avatar
Paphitis
Leading Contributor
Leading Contributor
 
Posts: 20971
Joined: Sun May 21, 2006 2:06 pm

Re: White House Executive Orders on Cyber security

Postby Paphitis » Sat Dec 31, 2016 9:27 am

And the 13 page report rerleased by Homeland security...

https://www.us-cert.gov/sites/default/f ... 6-1229.pdf

This Joint Analysis Report (JAR) is the result of analytic efforts between the Department of
Homeland Security (DHS) and the Federal Bureau of Investigation (FBI). This document
provides technical details regarding the tools and infrastructure used by the Russian civilian and
military intelligence Services (RIS) to compromise and exploit networks and endpoints
associated with the U.S. election, as well as a range of U.S. Government, political, and private
sector entities. The U.S. Government is referring to this malicious cyber activity by RIS as
GRIZZLY STEPPE.


To read more, hit the link above.
User avatar
Paphitis
Leading Contributor
Leading Contributor
 
Posts: 20971
Joined: Sun May 21, 2006 2:06 pm

Re: White House Executive Orders on Cyber security

Postby Robin Hood » Sat Dec 31, 2016 10:14 am

The report starts with the following statement .......

DISCLAIMER: This report is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service referenced in this advisory or otherwise. This document is distributed as TLP:WHITE: Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol, see https://www.us-cert.gov/tlp.


In other words ..... NOT TO BE TAKEN SERIOUSLY :lol: :lol: :lol:
Robin Hood
Regular Contributor
Regular Contributor
 
Posts: 2544
Joined: Mon May 18, 2009 7:18 pm
Location: Limassol

Re: White House Executive Orders on Cyber security

Postby Paphitis » Sat Dec 31, 2016 10:18 am

Robin Hood wrote:The report starts with the following statement .......

DISCLAIMER: This report is provided “as is” for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service referenced in this advisory or otherwise. This document is distributed as TLP:WHITE: Subject to standard copyright rules, TLP:WHITE information may be distributed without restriction. For more information on the Traffic Light Protocol, see https://www.us-cert.gov/tlp.


In other words ..... NOT TO BE TAKEN SERIOUSLY :lol: :lol: :lol:


Sorry, but that is the White light version. that is what they are saying. It could also mean that certain parts of it were manipulated to make it safe for public dissemination.

Anything beyond white light is classified. There are other versions of this document.

https://www.us-cert.gov/tlp

The Traffic Light Protocol (TLP) was created in order to facilitate greater sharing of information. TLP is a set of designations used to ensure that sensitive information is shared with the appropriate audience. It employs four colors to indicate expected sharing boundaries to be applied by the recipient(s). TLP only has four colors; any designations not listed in this standard are not considered valid by FIRST.
TLP provides a simple and intuitive schema for indicating when and how sensitive information can be shared, facilitating more frequent and effective collaboration. TLP is not a “control marking” or classification scheme. TLP was not designed to handle licensing terms, handling and encryption rules, and restrictions on action or instrumentation of information. TLP labels and their definitions are not intended to have any effect on freedom of information or “sunshine” laws in any jurisdiction.
TLP is optimized for ease of adoption, human readability and person-to-person sharing; it may be used in automated sharing exchanges, but is not optimized for that use.
TLP is distinct from the Chatham House Rule (when a meeting, or part thereof, is held under the Chatham House Rule, participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed.), but may be used in conjunction if it is deemed appropriate by participants in an information exchange.
The source is responsible for ensuring that recipients of TLP information understand and can follow TLP sharing guidance.
If a recipient needs to share the information more widely than indicated by the original TLP designation, they must obtain explicit permission from the original source.
User avatar
Paphitis
Leading Contributor
Leading Contributor
 
Posts: 20971
Joined: Sun May 21, 2006 2:06 pm

Next

Return to Politics and Elections

Who is online

Users browsing this forum: No registered users and 0 guests