Subscribe: CircleID: News Briefs
Added By: Feedage Forager Feedage Grade A rated
Language: English
amnesty international  apps  attack  circleid  companies  cost  devices  internet  mdash  messaging apps  messaging  privacy  private  security 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: CircleID: News Briefs

CircleID: News Briefs

Latest news postings on CircleID

Updated: 2016-10-27T02:15:00-08:00


Google Fiber Pauses Operations Until Further Notice



Access, the Alphabet internet division containing Google Fiber, is laying off about nine percent of its staff and "pausing" fiber operations while looking for alternate ways to deliver internet service to new cities. Craig Barratt who is stepping down from hist post as the CEO of Access, said: "Some of our efforts will remain unchanged, but others will be impacted. In terms of our existing footprint, in the cities where we've launched or are under construction, our work will continue. For most of our "potential Fiber cities" — those where we've been in exploratory discussions — we're going to pause our operations and offices while we refine our approaches."

Follow CircleID on Twitter

More under: Access Providers, Broadband

No Apparent Financial or Political Motivation Behind Dyn DDoS Attacks, Says Intelligence Firm


In an after-action analysis of the Mirai botnet attacks on Dyn, business intelligence firm, Flashpoint has assessed with "a moderate degree of confidence" that the perpetrators behind the attack were most likely not politically motivated, and most likely not nation-state actors.

No publicly available indicators of extortion: "Typically, financially motivated DDoS attacks will target business competitors, online gambling sites, or Bitcoin exchanges. Attackers can also use DDoS attacks or threats to extort money from businesses that would be affected by an outage. Despite various groups claiming responsibility for the attack, there have been no publicly available indicators of extortion — attempted or not — against Dyn DNS or any of the sites affected by the attack."

Discounting political motivations: "Dyn DNS is a central target whose outage would affect a wide variety of website and online services, and does not disproportionately affect any one political entity. Such a broad scope of targeting does not lend itself to a politically motivated attack. Additionally, the indicators that we do have point to specific communities that have historically been apolitical."

Follow CircleID on Twitter

More under: Cyberattack, DDoS, Security

U.S. Senator Inquiring Into Friday's Crippling Cyberattack



U.S. Sen. Mark R. Warner (D-VA), a member of the Senate Select Committee on Intelligence and co-founder of the bipartisan Senate Cybersecurity Caucus, has released a letter asking three federal agencies for information on the tools available that prevent cyber criminals from compromising consumer products, such as Internet of Things (IoT) devices. "The weak security of many of the new connected consumer devices provides an attractive target for attackers, leveraging the bandwidth and processing power of millions of devices, many of them with few privacy or security measures, to swamp internet sites and servers with an overwhelming volume of traffic," Sen. Warner says.

Prohibition of harmful devices: "Under the Federal Communications Commission's (FCC's) Open Internet rules, ISPs cannot prohibit the attachment of "non-harmful devices" to their networks. It seems entirely reasonable to conclude under the present circumstances, however, that devices with certain insecure attributes could be deemed harmful to the "network" – whether the ISP's own network or the networks to which it is connected. While remaining vigilant to ensure that such prohibitions do not serve as a pretext for anticompetitive or exclusionary behavior, I would encourage regulators to provide greater clarity to internet service providers in this area."

"Mirai’s efficacy depends, in large part, on the unacceptably low level of security... Juniper Research has projected that by the end of 2020, the number of IoT devices will grow from 13.4 to 38.5 billion – yet there is no requirement that devices incorporate even minimal levels of security. The internet's open architecture has been a catalyst for its growth ... The lack of gating functions, however, has potentially created a systemic risk to the resiliency of the internet."

Follow CircleID on Twitter

More under: Access Providers, Cyberattack, Cybercrime, DDoS, Internet of Things, Policy & Regulation

Amnesty International: Popular Mobile Apps Failing to Adopt Basic Privacy Protections



"Tech companies like Snapchat and Skype's owner Microsoft are failing to adopt basic privacy protections on their instant messaging services, putting users' human rights at risk," says Amnesty International in a new report. The organization's new 'Message Privacy Ranking' assesses the 11 companies with the most popular messaging apps on the way they use encryption to protect users' privacy and freedom of expression across their messaging apps.

Amnesty International has highlighted end-to end encryption as a minimum requirement for technology companies to ensure that private information in messaging apps stays private. The companies that ranked lowest on the scorecard do not have adequate levels of encryption in place on their messaging apps.

"If you think instant messaging services are private, you are in for a big surprise. The reality is that our communications are under constant threat from cybercriminals and spying by state authorities. Young people, the most prolific sharers of personal details and photos over apps like Snapchat, are especially at risk," said Sherif Elsayed-Ali, Head of Amnesty International's Technology and Human Rights Team.

Follow CircleID on Twitter

More under: Mobile, Policy & Regulation, Privacy, Security

U.S. Federal Government Response Too Slow to Friday's Internet Attack, Warns Cybersecurity Official


"We often refer to the Cuyahoga River in Cleveland that caught on fire over 20 times before we actually did something to introduce the Clean Water Act," says Allan Friedman, the director of cybersecurity initiatives for the Department of Commerce's National Telecommunications and Information Administration (NTIA), in conference call on Monday. "I don't know if you can count this [Friday's masive DDoS attack] as an internet on fire — I know a lot of the people who were affected called it an internet on fire — but it may take several of these before we are sufficiently motivated. ... Given the very uncomfortable nature of some of the policy responses and the very long lead time to implement them and bring new problems to market, I think now is the time to start." Government should start working to prevent future attacks immediately, Friedman warned. — "Baby Steps" / Tim Starks reporting in Politico, quoting Homeland Security Secretary Jeh Johnson: "The recovery from last week's attack that downed major websites like Twitter and Netflix appears to be complete. But preparing for the next huge distributed denial-of-service attack like the one that hit domain name system provider Dyn is still making baby steps. ... the department is working with law enforcement and the private sector to defend against Mirai and similar threats. And he pledged that DHS [Department of Homeland Security] would produce a strategic plan "in the coming weeks" to protect internet of things devices." — "Internet Under Siege: The Cost of Connectivity," Rachel Ansley reporting from the Atlantic Council: "In the rush to produce cost-effective connected devices, not enough focus has been placed on security measures. ... [Joshua] Corman [the director of the Atlantic Council’s Cyber Statecraft Initiative] described how the widespread dependence on connected technology is exceeding the ability to secure devices. 'In our race to adopt technologies for their immediate and obvious benefits, we seldom do the cost-benefit equation to notice the deferred cost in security risks these [devices] incur,' he said. Once the devices are sent to market, security is no longer accounted for. Corman claimed that if the default posture of these devices is insecure, they will continue to pose a greater and eventually unmanageable threat." Follow CircleID on TwitterMore under: Cyberattack, DDoS, Policy & Regulation, Security [...]

U.S. Department of Transportation Issues Federal Cybersecurity Guidance to Automotive Industry



U.S. Department of Transportation issues Federal guidance to the automotive industry for improving motor vehicle cybersecurity. The guidance covers cybersecurity best practices for all motor vehicles, individuals and organizations manufacturing and designing vehicle systems and software.

Cybersecurity Best Practices for Modern Vehicles / Page 5: "Vehicles are cyber-physical systems and cybersecurity vulnerabilities could impact safety of life. Therefore, NHTSA’s authority would be able to cover vehicle cybersecurity, even though it is not covered by an existing Federal Motor Vehicle Safety Standard at this time. Nevertheless, motor vehicle and motor vehicle equipment manufacturers are required by the National Traffic and Motor Vehicle Safety Act, as amended, to ensure that systems are designed free of unreasonable risks to motor vehicle safety, including those that may result due to existence of potential cybersecurity vulnerabilities."

Aftermarket Devices / Page 20: "The automotive industry should consider that consumers may bring aftermarket devices (e.g., insurance dongles) and personal equipment (e.g., cell phones) onto cars and connect them with vehicle systems through the interfaces that manufacturers provide (Bluetooth, USB, OBD-II port, etc.). The automotive industry should consider the incremental risks that could be presented by these devices and provide reasonable protections."

Follow CircleID on Twitter

More under: Cyberattack, Internet of Things, Malware, Mobile, Security

Substantial DDoS Attack Disrupts Twitter, Netflix, Visa and other Major Sites


AREAS AFFECTED BY THE OUTAGE / 21 OCT 2016 – Source: Level3 Outage Map Major internet sites were disrupted for several hours this morning as internet infrastructure provider Dyn reported it was under a cyberattack, mainly affecting traffic on the U.S. East Coast. Twitter, Spotify, Airbnb, Reddit, Visa and various media sites were among organizations whose services were reported to be down on Friday morning. Amazon also disclosed an outage that lasted several hours on Friday morning. — Doug Madory, director of internet analysis at Dyn, in an email said: Dyn received a global DDoS attack on its Managed DNS infrastructure in the east coast of the United States. DNS traffic resolved from east coast name server locations experienced a service interruption during the attack. Updates will be posted as information becomes available. Services were restored to normal as of 13:20 UTC. — Update: As of around 12 PM ET, Dyn reported that it is investigating another DDoS attack, and is continuing to attempt to “mitigate” the attack. Box, Twitter and other sites appear to be down again. The White House press secretary has also said that the Department of Homeland Security is investigating the attacks. — Update from Dyn: "Our engineers continue to investigate and mitigate several attacks aimed against the Dyn Managed DNS infrastructure." — Gillian Christensen of the U.S. Department of Homeland Security says the agency is "investigating all potential causes." — "The attack on DYN comes just hours after DYN researcher Doug Madory presented a talk on DDoS attacks in Dallas, Texas at a meeting of the North American Network Operators Group (NANOG)," says Brian Krebs whose own site recently underwent historic DDoS attack. "Madory's talk ... delved deeper into research that he and I teamed up on to produce the data behind the story DDoS Mitigation Firm Has History of Hijacks. ... I have no data to indicate that the attack on Dyn is related to extortion, to Mirai or to any of the companies or individuals Madory referenced in his talk this week in Dallas. But Dyn is known for publishing detailed writeups on outages at other major Internet service providers. Here's hoping the company does not deviate from that practice and soon publishes a postmortem on its own attack." — Update, 3:50 p.m. ET / Brian Krebs reports: "Security firm Flashpoint is now reporting that they have seen indications that a Mirai-based botnet [see earlier report on Mirai] is indeed involved in the attack on Dyn today. Separately, I have heard from a trusted source who’s been tracking this activity and saw chatter in the cybercrime underground yesterday discussing a plan to attack Dyn." — "This was not your everyday DDoS attack," Kyle York, Dyn’s chief strategist. Nicole Perlroth reporting in the New York Times: "Dave Allen, the general counsel at Dyn, said tens of millions of internet addresses, or so-called I.P. addresses, were being used to send a fire hose of internet traffic at the company's servers. He confirmed that a large portion of that traffic was coming from internet-connected devices that had been co-opted by type of malware, called Mirai." ... Dale Drew, chief security officer at Level 3: "Roughly 10 percent of all devices co-opted by Mirai were being used to attack Dyn's servers." — Update, 7:53 p.m. ET / Dyn issues Preliminary Findings Report with additional detail: "On Friday October 21, 2016 at approximately 11:10 UTC, Dyn came under attack by a large Distributed Denial of Service (DDoS) attack against our Managed DNS infrastructure in the US-East region. Customers affected may have seen regional resolution failures in US-East and intermittent spikes in latency globally. Dyn’s engineers were able to successfully mitigate the attack at approximately 13:20 UTC, and shortly after, the attack subsided. At roughly 15:50 UT[...]

Over 3.2 Million Debit Cards May Have Been Compromised, Says National Payment Corporation of India


A total of 3.2 million debit cards across 19 banks may have been compromised as a result of a suspected malware attack. The breach, possibly largest of its kind in India, was confirmed by the National Payment Corporation of India (NPCI) in a statement today. The problem was brought to NPCI's attention via complaints from banks informing the agency that their customers' cards were used fraudulently, mainly in China and USA, while customers were in India, according to the statement.

"How the breach could have occurred," Alex Mathew reporting in Bloomberg: "The breach that has apparently given hackers access to the PIN codes of several bank customers is likely to be on account of a malware attack. This attack is believed to have originated at an ATM. The actual modus operandi of the hackers will only become clear once the forensic audit is released in November… First, the hacker would have had to gain physical access to an ATM. The malware was then likely injected by connecting a laptop or another special device to a port on the cash disbursing machine, said Tiwari, a consultant at Centre For Internet & Society in Bengaluru. Once the malware is injected, it automatically spreads across the network..."

Follow CircleID on Twitter

More under: Cybercrime, Malware, Security

European Court Declares Dynamic IP Addresses are Subject to Privacy Protection Rules


The Advocate General, top advisor to the European Court of Justice, has issued an opinion today about Internet anonymity, Electronic Privacy Information Center reports. "He found that dynamic IP addresses are personal data subject to data protection law. The opinion concerns the case of German pirate party politician and privacy activist Patrick Breyer who is suing the German government over logging visits to government websites. ... The opinion is not legally binding but 'is usually a good indication of how the court will eventually rule'." The issued opinion in full: Case C-582/14, Patrick Breyer v Bundesrepublik Deutschland.

Follow CircleID on Twitter

More under: Internet Protocol, IP Addressing, Law, Privacy

US Banks Face New Demands by Regulators for Higher Cyber Risk Management Standards


U.S. bank regulators on Wednesday outlined cyber security standards meant to protect financial markets and consumers from online attacks against the nation's leading financial firms," Patrick Rucker reporting in Reuters: "Leading banks will be expected to use the most sophisticated anti-hacking tools on the market and to be able to recover from any attack within two hours… Banks with assets of $50 billion or more must satisfy the new rules that will be finalized in the months ahead."

"Agencies Issue Advanced Notice of Proposed Rulemaking on Enhanced Cyber Risk Management Standards," states the press release issued today by Federal Reserve: "The Federal Reserve Board, the Federal Deposit Insurance Corporation, and the Office of the Comptroller of the Currency are considering applying the enhanced standards to depository institutions and depository institution holding companies with total consolidated assets of $50 billion or more, the U.S. operations of foreign banking organizations with total U.S. assets of $50 billion or more, and financial market infrastructure companies and nonbank financial companies supervised by the Board. The proposed enhanced standards would not apply to community banks. The standards would be tiered, with an additional set of higher standards for systems that provide key functionality to the financial sector. For these sector-critical systems, the agencies are considering requiring firms to substantially mitigate the risk of a disruption or failure due to a cyber event."

Follow CircleID on Twitter

More under: Cyberattack, Policy & Regulation, Security

FBI, Czech Police Arrest Russian in Connection With US Hacking Attacks


(image) A screenshot from a video released by Czech police showing a man identified only as a Russian hacking suspect being taken into custody at a restaurant in Prague. CBS NEWS / 19 OCT 2026

FBI in a joint operation with the Czech police, arrested a Russian citizen in Prague on Wednesday in connection with attempted cyber-attacks against the United States. FBI says the man was suspected of conducting criminal activities targeting U.S. interests, but have not give any more details. The arrest is not related to the Russian hacks of the Democratic National Committee and other political organizations or the ongoing probe of Russian interference in the U.S. election, federal law enforcement officials said. Czech courts will decide whether to extradite the man to the United States. –Katie Mettler further reports in the Washington Post

Update / 19 Oct 2016: LinkedIn and other sources report the arrestee is suspect in a major 2012 LinkedIn hack involving theft of nearly 6.5 million user credentials. Statement by LinkedIn spokesperson: "Following the 2012 breach of LinkedIn member information, we have remained actively involved with the FBI's case to pursue those responsible. We are thankful for the hard work and dedication of the FBI in its efforts to locate and capture the parties believed to be responsible for this criminal activity."

Follow CircleID on Twitter

More under: Cyberattack, Cybercrime

Syria's Undersea Cable Repairs Will Take Down 60% of Nation's Internet for Close to 10 days


Syrian Telecom has announced that 60 percent of the country's Internet will be down for close to ten days, starting Wednesday. According to the statement, the outage is due to undersea cable repairs on international service lines. The announcement comes several days after a Russian ship purported to be equipped with cable-cutting technology was spotted moving in a northern track towards Syria. Syrian Telecom says it is working with international operators to secure international alternative paths as part of the plan to bring Internet back up and to normal speeds.

Follow CircleID on Twitter

More under: Access Providers

Google Announces Nomulus, Open Source Top-Level Domain Name Registry


Google today announced the release of Nomulus, a new open source cloud-based registry platform that runs Google's top level domains (TLDs) and now available to everyone. — Ben McIlwain, Google's Software Engineer writes: "The project that became Nomulus began in 2011 when the Internet Corporation for Assigned Names and Numbers (ICANN) announced the biggest ever expansion of Internet namespace, aimed at improving choice and spurring innovation for Internet users. Google applied to operate a number of new generic TLDs, and built Nomulus to help run them." — "Nomulus can manage any number of TLDs in a single shared instance and supports the full range of TLD functionality required by ICANN, including the Extensible Provisioning Protocol (EPP), WHOIS, reporting, and trademark protection. It is written in Java and is released under the Apache 2.0 license." –McIlwain — "Donuts collaborates as pressure on registry providers mounts," writes Andrew Allemann in Domain Name Wire: "Donuts, which currently uses Rightside's backend technical services for its roughly 200 domain names, has been contributing to the project for the past 20 months, it revealed today. ... All of this means that Donuts could theoretically drop Rightside (NASDAQ:NAME) and move to Nomulus. But Donuts CEO Paul Stahura said the company has not committed to moving the backend for its top level domain names to Nomulus." — In a press today from Donuts, Paul Stahura said: "the option to evaluate and contribute to the Google Nomulus project presented a unique opportunity. ... Donuts must continually explore compelling technologies and ensure our back-end operations are cost-efficient and flexible. Collaborating with Google on this groundbreaking project is an opportunity to do exactly that." According to the company, Donuts' contributions to Nomulus project included technical specifications for the Domains Protected Marks List (DPML), Early Access Period (EAP) and tiered pricing. Follow CircleID on TwitterMore under: DNS, Registry Services, Top-Level Domains [...]

DNC Emails Hacked Using Fake Gmail Login Forms



A new report from SecureWorks Counter Threat Unit has revealed a hacking group operating from the Russian Federation, implemented spearphishing techniques involving use of look-alike Google login pages to gain access to DNC emails and other data. According the the report, hackers targeted the staff working for or associated with Hillary Clinton's presidential campaign and the Democratic National Committee (DNC), including individuals managing Clinton's communications, travel, campaign finances, and advising her on policy.

Examination of DNS Records shows that the domain's MX records - i.e. the mail server used by the domain - point to, the mail server used by Google Apps. Hakcers exploited the Hillary for America campaign's use of Gmail and leveraged campaign employees' expectation of the standard Gmail login page to access their email account."

First malicious URLs targeting email addresses were created in mid-March 2016; the last URL was created in mid-May. Overall, 213 URLs targeting 108 email addresses on the domain were created during the period.

Through open-source research, researchers identified owners of 66 of the targeted email addresses. No open-source footprint were found for the remaining 42 addresses, which would indicate they were acquired from another source.

The targeted email owners held a wide range of responsibilities within the Hillary for America campaign, extending from senior figures to junior employees and the group mailboxes for various regional offices. Targeted senior figures managed communications and media affairs, policy, speech writing, finance, and travel, while junior figures arranged schedules and travel for Hillary Clinton's campaign trail.

Follow CircleID on Twitter

More under: Cyberattack, Email

WikiLeaks: Ecuador Has Cut Off Assange's Internet Access


WikiLeaks has accused Ecuador for cutting off Internet access of its founder, Julian Assange. The activist organization first reported the incident via Twitter last night stating that Assange's internet link has been intentionally severed by a state party. In a follow up tweet a few hours ago, WikiLeaks reported: "Ecuador cut off Assange's internet access Saturday, 5pm GMT, shortly after publication of Clinton's Goldman Sachs speechs." — "The WikiLeaks founder has been living at the Ecuadorean Embassy in London for more than four years. ... Assange sought refuge there after Sweden issued a warrant for his arrest to question him over allegations of sex crimes. He has said that if sent to Sweden, he fears he would be handed over to the U.S. and could face trial over the release of classified U.S. material on WikiLeaks." NPR / 17 Oct 2016 — Update / 18 Oct 2016: Peter Van Buren, former officer, US State Department's Foreign Service in an RT interview: "It is unlikely that Ecuador, supporting whistleblower Julian Assange, deprived him from the opportunity to use internet. ... At the same time, imagining the reasons a third party might have cut that internet access are fairly easy to do. Assange has embarrassed the US government. The US government has made claims that he is working with the Russians, and that the Russians with Assange are trying to disrupt or interfere in America's election. And we've seen reports over the weekend that the US is planning some form of retaliation in cyberspace. It is not unlikely that that retaliation may include poking the bear in the nose, perhaps starting with cutting off Assange's internet access." — Update / 18 Oct 2016: Ecuador has released a statement confirming it has restricted Assange's access to the Internet. The full official letter below – Official Communiqué Ecuador granted political asylum to Julian Assange in 2012 based on his legitimate fears of political persecution because of his journalistic activities as the editor of WikiLeaks. In recent weeks, WikiLeaks has published a wealth of documents, impacting on the U.S. election campaign. This decision was taken exclusively by that organization. The Government of Ecuador respects the principle of non-intervention in the internal affairs of other states. It does not interfere in external electoral processes, nor does it favor any particular candidate. Accordingly, Ecuador has exercised its sovereign right to temporarily restrict access to some of its private communications network within its Embassy in the United Kingdom. This temporary restriction does not prevent the WikiLeaks organization from carrying out its journalistic activities. Ecuador, in accordance with its tradition of defending human rights and protecting the victims of political persecution, reaffirms the asylum granted to Julian Assange and reiterates its intention to safeguard his life and physical integrity until he reaches a safe place. Ecuador’s foreign policy responds to sovereign decisions alone and does not yield to pressure from other states.Follow CircleID on TwitterMore under: Access Providers, Censorship [...]

Montenegro Election Day Disrupted by Several Cyberattacks


The Ministry for Information Society and Telecommunications of Montenegro has confirmed several key websites were targeted by cyberattacks on Sunday (16 October), the day of the country's parliamentary elections. Attacks targeted several media and government websites including news service CDM, radio station Antena M, and the website of the ruling political party, Democratic Party of Socialists of Montenegro. Officials have informed reporters that many of the attacks have been endured and service for most government sites are returning to normal. The ministry has not responded to any requests for comments on individual or groups responsible for the attacks.

Follow CircleID on Twitter

More under: Cyberattack, DDoS

UK Security Agencies Have Unlawfully Collected Data for 17 Years, Says Court


"British security agencies have secretly and unlawfully collected massive volumes of confidential personal data, including financial information, on citizens for more than a decade, top judges have ruled," according to a report published today in The Guardian. "The ruling said the regime governing the collection of bulk communications data (BCD) — the who, where, when and what of personal phone and web communications — failed to comply with article 8 protecting the right to privacy of the European convention of human rights (ECHR) between 1998, when it started, and 4 November 2015, when it was made public."

Follow CircleID on Twitter

More under: Law, Privacy

Lawsuit Against IANA Transition Dropped


"Four US states attorneys general have quietly thrown in the towel in their attempt to have the IANA transition blocked," reports Kevin Murphy this morning in Domain Incite. "The AGs of Texas, Nevada, Arizona and Oklahoma unilaterally dropped their Texas lawsuit against the US government on Friday, court records show… That basically means the case is over."

Follow CircleID on Twitter

More under: ICANN, Internet Governance

Putin Shrugs Off US Retaliation Threat Over Alleged DNC Hack


"Vladimir Putin on Sunday shrugged off new US threats to retaliate against alleged Russian hackers, saying such statements only confirmed that Washington used cyber-attacks for political ends," Reuters reports. "Speaking after a summit of developing economies in India, the Russian president also said he believed that the hacking allegations [see earlier report] were mainly election campaign rhetoric by the White House, and that he hoped bilateral ties could improve after the US elections."

Follow CircleID on Twitter

More under: Cyberattack

Notorious Russian Ship Yanter Suspected of Cutting Syria's Undersea Internet Cables


THE RUSSIAN NAVY’S PROJECT 22010 MINI-SUB HOST SHIP YANTAR / Currently parked off the Syrian coast. Source: MarineTraffic A Russian ship, suspected by intelligence and military officials to be capable of cutting undersea Internet cables, is spotted near the coast of Syria. According to reports, presence of the ship (named Yanter), coincides with what researchers say is a marked uptick in the instability of Internet traffic in Syria. — Could be just a coincidence but: "It's possible that the Internet outages in Syria and Yantar's presence in the neighborhood are merely a coincidence. But the Internet in Syria has a history of going down at times that the regime of Bashar al-Assad has plotted military offensives, raising the possibility that Russia may be assisting in a communications blackout as its military forces pound rebel positions in the beleaguered city of Aleppo." Shane Harris reporting in the Daily Beast — Is Yantar messing with a submarine cable in the eastern Med? Dyn's Director of Internet Analysis, Doug Madory provided additional information on the situation this morning via email: "Russian vessel Yantar is currently parked off the Syrian coast. ... I have noticed a recent uptick in routing instability affecting Syria. ... My contact in Syria said that it is coming from problems on a submarine cable. ... Is the Yantar messing with a submarine cable in the eastern Med? The experts in the industry that I know say it is impossible to tap a submarine cable while it is underwater. There are a lot of coincidences here however. The Yantar is supposedly for scientific research purposes. Guess it recently decided to conduct some research off the coast of Syria." — Also noteworthy, reported last year: "America's intelligence community appears to believe the vessel [Yantar] is collecting data from underwater cables and spying on the US nuclear submarine fleet." RT / 4 Sep 2015 "Just last month, the Russian spy ship Yantar, equipped with two self-propelled deep-sea submersible craft, cruised slowly off the East Coast of the United States on its way to Cuba - where one major cable lands near the American naval station at Guantánamo Bay." New York Times / 26 Oct 2015 Follow CircleID on TwitterMore under: Access Providers, Broadband [...]