Systemax’s CompUSA will enter the Houston market soon with its first store as it seeks to expand the chain, a Systemax spokesman confirmed late Wednesday. The move into Houston is a major shift for CompUSA, which has focused on opening stores in existing markets in Florida - it recently added West Kendall and Pembroke Pines locations - and Chicago, where it has three outlets. Houston was once home to several CompUSA stores.
The ITDS Board has submitted its annual report on the International Trade Data System to Congress, as required by the 2006 SAFE Port Act.1 The report includes updates on the status of ITDS implementation and the status of the Automated Commercial Environment (ACE) within U.S. Customs and Border Protection, among other issues.
U.S. Customs and Border Protection has issued a CSMS message stating that the ACE contact list has been edited to reflect the new email address for the CBP Technology Service Desk. The new email address is CBP.TECHNOLOGY.SERVICE.DESK@CBP.DHS.GOV.(CSMS 09-000345, dated 11/05/09, available at http://apps.cbp.gov/csms/viewmssg.asp?Recid=17738&page=&srch_argv=09-000345&srchtype=all&btype=&sortby=&sby)
At the November 4, 2009 COAC meeting, a Treasury official announced that the International Trade Data System annual report to Congress has been issued. According to Treasury, the report contains recommendations that could help mitigate the effect of ACE delays on ITDS program. For example, the report recommends that CBP could begin to collect ITDS information for other agencies through the Automated Broker Interface, and then make the data available through the ACE data warehouse. See future issues of ITT for additional details of COAC meeting and ITDS report. (Report, dated September 2009, available at http://www.itds.gov/xp/itds/whats_new/)
CBP has issued a CSMS message stating that the CBP Technology Service Desk email address has been changed to CBP.TECHNOLOGY.SERVICE.DESK@CBP.DHS.GOV. Effective November 2, 2009, all of ACE-related inquiries should be sent to the new email address for support. (CSMS 09-000339, dated 10/30/09, available at http://apps.cbp.gov/csms/viewmssg.asp?Recid=17732&page=&srch_argv=09-000339&srchtype=all&btype=&sortby=&sby)
At the American Conference Institute's recent conference on Import Compliance and Enforcement, U.S. Customs and Border Protection officials gave a presentation entitled "Single Issue Audits and Focused Assessments: How Audit Programs are Evolving and What You Need to Know to Prepare."
On October 22, 2009, a House Homeland Security Committee Subcommittee1 held a hearing entitled "Cargo Security at Land Ports of Entry: Are We Meeting the Challenge?"
The nature of U.S. government data targeted for “exfiltration” by Chinese hackers suggests they're working on behalf of the Chinese government, not cybercriminals, said a report commissioned by the U.S.-China Economic and Security Review Commission. Researched and written by Northrop Grumman, the report said Chinese military strategists have “come to view information dominance as the precursor for overall success in a conflict.” The strategy drives the People’s Liberation Army to develop “more comprehensive computer network exploitation techniques” that can be used to create “blind spots.” Those are parts of a system that can be exploited at “predetermined times or as the tactical situation warranted.” Such attacks will be “widely employed in the earliest phases of a conflict, and possibly preemptively against an enemy’s information systems.” The PLA is reaching out to commercial industry, academic and “possibly select elements of China’s hacker community” to staff its cyber-intrusion missions, the report said. It cited “limited cases of apparent collaboration between more elite individual hackers and the [government’s] civilian security services.” China is using “disciplined, standardized operations, sophisticated techniques, access to high-end software development resources, a deep knowledge of the targeted networks and an ability to sustain activities inside targeted networks, sometimes over a period of months,” the report said. Analysis of intrusions suggests that Chinese black-hat hackers involved in illegal activities are being tapped to develop customized tools for zero-day exploits. “The depth of resources necessary to sustain the scope” of intrusions is beyond the ability of “virtually all organized cybercriminal enterprises and is difficult at best without some type of state-sponsorship.” Data historically targeted have “no inherent monetary value to cybercriminals,” such as credit card numbers, the report said. If stolen data are being brokered through a third party to interested countries, regardless of who is doing the hacking, the activity can be considered state-sponsored, it said. Targeted data to date could help a country’s defense industry, space program, some high technology industries, “foreign policymakers interested in U.S. leadership thinking on key China issues,” and foreign military planners looking for U.S. weaknesses that could be exploited in a crisis, the report said. China would probably use its abilities to attack certain nodes on the military’s nonclassified NIPRNET and unclassified Defense Department and civilian contractor networks in the U.S. and allied Asia-Pacific countries, with the intent of delaying U.S. deployments and harming effectiveness of troops already deployed. The only difference between exploitation of a network and attack is the intent of the hacker, the report said. If China is responsible for just some of the current exploitation efforts, it may already have a “mature and operationally proficient” capability in computer network operations.
CBP has issued the following CSMS messages regarding 10+2: