source: fifthdomain.com

The Army cyber protection teams need simple tools with better training capabilities, the teams’ project manager told Fifth Domain.

In an interview Oct. 15 at the 2019 Association of the United States Army conference, Col. Chad Harris, project manager for Defensive Cyber Operations at the Army Program Executive Office Enterprise Information Systems, shared what his teams are looking for in the new tools that it adds.

“This goes back to tools that are intuitive [and] are easy to use and easy to train on,” said Harris.

Harris said he “continuously” talks to industry about these needs.

“When you give us a tool, make sure you’re looking at is this thing user friendly,” Harris said. “Does it have automation involved and does it make it easy for that soldier to pick it up and learn it in a short period of time? Does it have a training package that goes along with it that allows us to quickly deploy the tool?”

 

Part of the need for easy-to-use tools stems from the cyber workforce shortage, he added — a problem throughout the private and public sector that is also affecting the work of the cyber protection teams.

“Their time is valuable,” Harris said. “So the training has got to be targeted. They’ve got to be able to train quickly and they’ve got to be able to train wherever they need to train at.”

He also said that new tools need to come with a training package. Harris said that the training needs to be “tailorable” and “specific” to the needs of each individual — not require 40 hours per week in the classroom.

“We’ve got to be able to train virtually; we’ve got to be able to train live,” Harris said. “And we’ve got to have those training sessions off hours. And we’ve also got to have that training available or that help available for them 24/7, 365 [days a year].”

 source: sciencedaily.com

If you could travel back in time 3.5 billion years, what would Mars look like? The picture is evolving among scientists working with NASA's Curiosity rover.

Imagine ponds dotting the floor of Gale Crater, the 100-mile-wide (150-kilometer-wide) ancient basin that Curiosity is exploring. Streams might have laced the crater's walls, running toward its base. Watch history in fast forward, and you'd see these waterways overflow then dry up, a cycle that probably repeated itself numerous times over millions of years.

That is the landscape described by Curiosity scientists in a Nature Geoscience paper published today. The authors interpret rocks enriched in mineral salts discovered by the rover as evidence of shallow briny ponds that went through episodes of overflow and drying. The deposits serve as a watermark created by climate fluctuations as the Martian environment transitioned from a wetter one to the freezing desert it is today.

Scientists would like to understand how long this transition took and when exactly it occurred. This latest clue may be a sign of findings to come as Curiosity heads toward a region called the "sulfate-bearing unit," which is expected to have formed in an even drier environment. It represents a stark difference from lower down the mountain, where Curiosity discovered evidence of persistent freshwater lakes.

Gale Crater is the ancient remnant of a massive impact. Sediment carried by water and wind eventually filled in the crater floor, layer by layer. After the sediment hardened, wind carved the layered rock into the towering Mount Sharp, which Curiosity is climbing today. Now exposed on the mountain's slopes, each layer reveals a different era of Martian history and holds clues about the prevailing environment at the time.

 source: nakedsecurity.sophos.com

More than 350 ethical hackers got together in cities across Australia on Friday for a hackathon in which they worked to “cyber trace a missing face”, in the first-ever standalone capture-the-flag (CtF) event devoted to finding missing persons.

Similar CtFs have been held before, alongside conferences such as DEF CON and B-Sides, but this was the first such event focused entirely around a missing persons hackathon.

Organizers called the results “astounding,” ABC News reports.

During the six hours the competing teams hammered away at the task of searching for clues that could potentially solve 12 of the country’s most frustrating cold cases. 100 leads were generated every 10 minutes.

The National Missing Persons Hackathon was run by the AustCyber Canberra Innovation Node, which partnered with the Australian Federal Police, the National Missing Persons Coordination Centre and Trace Labs: a nonprofit with a mission of crowdsourcing open-source intelligence (OSINT) and training people on OSINT tradecraft.

OSINT is data collected from publicly available sources. That includes Google searches, for example. The missing persons hackathon is the sunny side of that coin. Last week, we saw a much darker side to OSINT when we heard about a Japanese pop star who was attacked by a stalker who zoomed in on the reflections in her eyes from selfies, then searched for matching images on Google Maps to find out where she lives.

 source: theatlantic.com

New reports suggest that drone activity at the southern border is spreading to nearby cities, erasing the line between police procedures and immigration enforcement.

Where, exactly, does the border end?

A collaboration between journalism students and the Electronic Frontier Foundation, a civil-liberties group, probes this deceptively simple question. Ask a mapmaker, a geographer, or an average American, and the United States’s southern land border is a thin line extending from Texas to California. But ask law enforcement, and the answer is much more complicated. The same surveillance technologies that Customs and Border Protection and Immigration and Customs Enforcement use to secure the border are also used by local police miles away. The result is a vast dragnet, the surface area of which keeps growing as the special authority granted to agents in certain areas of the border quietly expands. 

Using online and archival searches, public-information requests, and state and local freedom-of-information laws, students at the University of Nevada’s Reynolds School of Journalism and their professor, Gi Woong Yun, partnered with Dave Maass, a principal investigator at EFF, to create an “Atlas of Surveillance”: a map of advanced technology used by police departments along the border.

The variety of devices being used near the border is astounding. In southwestern communities near the U.S.-Mexico border, the team recorded nearly 230 instances of local police deploying advanced technology: facial-recognition software, cellphone-tracking “sting ray” towers, real-time crime centers, license-plate cameras, gunshot-detecting acoustic-surveillance devices, drones, and spy planes. These devices reveal where people travel, as well as whom they call, text, and visit. The tools can also identify people without their knowledge or consent.