Status updates from the ‘Open Cases Reports’ …
Taobao, a massive online marketplace that is China’s equivalent to Ebay, was recently audited by China’s industrial regulators—they found that in some cases, over half the items being sold were counterfeit. …
More at EPOCH TIMES.
This seminar will build on our previous seminars by providing an update of the work being undertaken by various groups to combat the threat with presentations from many of the UK’s leading domain experts. Delegates new to this issue will get a greater insight into the problem and how to access current information and support to reduce the risk to their businesses while delegates with prior knowledge of the problem will learn about the most recent developments in the threat and support to mitigate against it.
More @ ESCO.
“Long ago, the story goes, Greek soldiers tried for 10 years to conquer the city of Troy. Eventually, they departed, leaving behind a large wooden horse, apparently as a gift. …
Nowadays, some 3,000 years on, a Trojan is a seemingly innocuous piece of software that actually contains malicious code. Security companies are constantly developing new tests to check for these threats. But there is another variety of Trojan—the “hardware Trojan”—that has only started to gain attention, and it could prove much harder to thwart. …”
More at IEEE Spectrum.
“Tip of the hat to the folks over at the National Defense Magazine for posting an intriguing piece about the unappreciated national security benefits of recycling electronic waste. …”
The final version of DoDI 5000.02, Operation of the Defense Acquisition System, including an updated Enclosure 3 (Systems Engineering) was released on Jan. 7, 2015, replacing the interim version released on Nov. 25, 2013. Links to the DoD news release, the USD(AT&L) memo announcing its release, and the instruction are below:
DoD News Article “DoD Releases Updated Instruction for Acquisitions System”
USD(AT&L) Memo, Department of Defense Instruction 5000.02, Jan. 7, 2015
DoDI 5000.02, Operation of the Defense Acquisition System
The 7 January memo and news article include the following statement by Frank Kendall, undersecretary of defense for acquisition, technology and logistics …
“I have also already initiated work on a new enclosure that will deal with the increasingly serious problem of designing for and managing cybersecurity in our programs. We must do a better job of protecting our systems and everything associated with them from cyber threats.”
[See DoDI 5000.02, Enclosure 3, Section 13b on the relationship of “anti-counterfeiting practices” to “Program Protection”.]