Free Republic 3rd Quarter Fundraising Target: $85,000 Receipts & Pledges to-date: $21,898
25%  
Woo hoo!! And the first 25% is in!! Thank you all very much!!

Keyword: cyberattacks

Brevity: Headers | « Text »
  • Sochi 2014 Winter Olympics Security Will Be Beefed Up...

    04/21/2013 4:11:43 PM PDT · by Cindy · 44 replies
    TELEGRAPH.co.uk ^ | 10:10AM BST 16 Apr 2013 | By Telegraph Sport, and agencies
    SNIPPET: "Sochi 2014 Winter Olympics security will be beefed up following Boston Marathon explosions, officials say Russian sports officials said they will beef up security at forthcoming sports events and the Sochi 2014 Winter Olympic Games in the wake of deadly explosions at Boston's marathon that killed three people, and injured over 140 others." "Sochi 2014 Winter Olympics security will be beefed up following Boston Marathon explosions, officials say" SNIPPET: "The World Athletics Championship takes place in Moscow on Aug 10-18, and the event is seen as a dress rehearsal for the 2014 Winter Games in the Black Sea resort...
  • Cyber terrorism is 'biggest threat to aircraft'

    12/28/2013 9:38:48 AM PST · by Innovative · 5 replies
    UK Telegraph ^ | Dec 27, 2013 | Nick Collins
    The threat of cyber terrorism poses a major risk to aircrafts' systems every time they enter an airport, a senior Boeing executive has said. Boeing was the focus of a cyber security scare in 2008 when an analyst claimed the firm’s flagship 787 Dreamliner passenger jet had a serious weakness in its on-board computer networks which could allow passengers to take control of the aircraft. A report by US authorities found that a network in the cabin designed to give passengers Internet access could be used to access the aircraft’s control, navigation and communication systems. Boeing claimed the problem had...
  • Obama orders US to draw up overseas target list for cyber-attacks

    06/07/2013 3:43:44 PM PDT · by RummyChick · 85 replies
    Guardian ^ | 6/7 | Greenwald
    Barack Obama has ordered his senior national security and intelligence officials to draw up a list of potential overseas targets for US cyber-attacks, a top secret presidential directive obtained by the Guardian reveals. The 18-page Presidential Policy Directive 20, issued in October last year but never published, states that what it calls Offensive Cyber Effects Operations (OCEO) "can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging".
  • Giving China the 'Key to the Front Door'

    10/03/2007 3:52:21 PM PDT · by Tolerance Sucks Rocks · 2 replies · 409+ views
    The Loft (GOPUSA blog) ^ | October 3, 2007 | Bobby Eberle
    Several months ago, the Pentagon's network and e-mail system fell victim to computer hacking. After an internal investigation, Pentagon officials declared that the hack was perpetrated by the Chinese military. In particular, officials said the attack "was by China's People's Liberation Army (PLA) and that it led to the shutdown of a computer system serving the office of Defense Secretary Robert Gates." Now, a Chinese company with ties to the country's military, former Iraqi dictator Saddam Hussein, and the Taliban will gain access to U.S. defense-network technology under a proposed merger.According to a story in the Washington Times, Huawei Technologies...
  • In Hours, Thieves Took $45 Million in A.T.M. Scheme

    05/10/2013 4:27:55 PM PDT · by dennisw · 17 replies
    nytimes ^ | May 9, 2013 | By MARC SANTORA
    It was a brazen bank heist, but a 21st-century version in which the criminals never wore ski masks, threatened a teller or set foot in a vault. In two precision operations that involved people in more than two dozen countries acting in close coordination and with surgical precision, thieves stole $45 million from thousands of A.T.M.'s in a matter of hours. In New York City alone, the thieves responsible for A.T.M. withdrawals struck 2,904 machines over 10 hours starting on Feb. 19, withdrawing $2.4 million. The operation included sophisticated computer experts operating in the shadowy world of Internet hacking, manipulating...
  • Pentagon: Chinese government waging cyberattacks

    05/06/2013 4:05:16 PM PDT · by Olog-hai · 2 replies
    Associated Press ^ | May 6, 2013 2:08 PM EDT | Lolita C. Baldor
    The Pentagon for the first time used its annual report on China to directly assert that Beijing’s government and military have conducted computer-based attacks against the U.S., including efforts to steal information from federal agencies. In a new report on the Chinese military, the Defense Department goes a small step further than it has gone in the past, when it said that cyber-attacks originated in China and may be linked to Beijing’s use of civilian experts in clandestine attacks against American companies. But over the past year, U.S. government officials and private cyber-security experts have increasingly stepped up accusations that...
  • Hagel: Cyberattacks 'Greatest Threat To Our Security'

    04/16/2013 12:50:50 PM PDT · by Nachum · 20 replies
    Free Beacon ^ | 4/16/13 | staff
    House Appropriations Chairman Hal Rogers (R-Ky.) told Defense Secretary Chuck Hagel that the military should be doing more to reduce the number of Chinese cyber attacks. “I think we have to take action with China to stop the PLA from bombarding us hourly with these hack attacks,” Rogers said. “They’ve stolen all sorts of weaponry from us and research, even the F-35. And I would hope that the department would be much more aggressive on the cybersecurity front.” Hagel responded by noting the increased funding for cyber security in the 2014 defense budget and then called it “the greatest threat...
  • Website Shows Cyberattacks as They Happen

    03/09/2013 8:52:30 PM PST · by LibWhacker · 15 replies
    3/8/13 | Marshall Honorof
    The Internet can be a dangerous place, and now you can see just how dangerous it gets — in real time, no less. Deutsche Telekom, a German telecommunications company, has developed a website that allows users to monitor cyberattacks as they happen. The almost unpronounceable Sicherheitstacho.eu (loosely translated as "security tachometer") displays events as they happen, giving the time of the attack, country of origin and the intended target. While watching the site can be quite hypnotic, its relevance for the everyday user is limited (unless your website or network is currently under attack, in which case, the site still...
  • Firms see smartphones as weak link in cybersecurity

    03/04/2013 9:14:27 AM PST · by Olog-hai · 40 replies
    EurActiv ^ | 04 March 2013 | Jeremy Fleming
    The explosion in smartphone use is leaving businesses vulnerable to cyberattacks since almost half of their employees’ mobile phones can become a target, according to new research. The 2012 Cyber Security Risk Report—published by Hewlett-Packard at the recent RSA security conference in San Francisco—found that mobile phone vulnerabilities rose significantly (68%) from 2011 to 2012, mirroring the growth of mobile applications and the use of smartphones. Of the mobile applications tested by HP, 48% of them were found to be vulnerable to unauthorized access. The European Council and Parliament are to consider a Commission-proposed cybersecurity strategy in the coming months....
  • Significant Cyberattack Incidents

    02/26/2013 11:14:58 PM PST · by neverdem · 9 replies
    Real Clear Politics ^ | 02.26.13 | NA
    Last week, the American computer security firm Mandiant released a detailed study shedding light on the secret cybercorps of the Chinese government. The “Shanghai Group,” or Unit 61398 of the People’s Liberation Army, is believed to operate out of a nondescript 12-story building (above) on the outskirts of Shanghai. Over the past six years, Mandiant claims to have tracked thousands of attacks on American industry, business, government and military targets originating from that area. Given the ubiquity of information technology, the threat of cyberattacks will continue to grow. The scope of these assaults can range from accessing confidential information and...
  • Lawmaker: Cyberattacks against US getting worse

    02/10/2013 10:32:22 PM PST · by Olog-hai · 1 replies
    Associated Press ^ | Feb 10, 2013 2:12 PM EST
    The U.S. is vulnerable to cyberattacks that could shut down financial services or destroy information that companies need for daily operations, the chairman of the House Intelligence Committee said Sunday. Rep. Mike Rogers says 95 percent of private sector networks are vulnerable and most have already been hit. … Rogers tells CBS’ Face the Nation that the U.S. government has, essentially “set up lawn chairs, told the burglars where the silver is … and opened the case of beer and watched them do it.” …
  • Prepare For The Coming Cyber Wars: US Government To Launch Pre-Emptive Cyber Strikes (Prepping)

    02/06/2013 11:18:26 AM PST · by blam · 17 replies
    SHTF Plan - Off Grid Survival ^ | 2-6-2013 | Robert Richardson
    Prepare For The Coming Cyber Wars: US Government To Launch Pre-Emptive Cyber Strikes Robert Richardson February 5th, 2013 Off Grid Survival For years we have warned our readers about the dangers that a full scale cyber-attack could have on our infrastructure; now those dangers are even higher as the Federal Government prepares to launch Pre-emptive cyber strikes against rogue nations. According to the New York Times, President Barack Obama has just concluded a secret legal review of the administration’s new cyber war guidelines. The guidelines give President Obama the power to order pre-emptive cyber strikes to protect national security interests....
  • Threat of mass cyberattacks on U.S. banks is real, McAfee warns

    12/13/2012 11:13:39 PM PST · by Olog-hai · 4 replies
    cnet.com ^ | December 13, 2012 7:28 PM PST | Dara Kerr
    The wave of distributed denial of service attacks that hit U.S. banks in October was next to nothing compared to what could happen if cybercriminals actually carry through with their plans for next year. According to a report released today by McAfee Labs, an impending attack on U.S. financial institutions—dubbed Project Blitzkrieg—isn’t only a possibility, it’s a “credible threat.” “McAfee Labs believes that Project Blitzkrieg is a credible threat to the financial industry and appears to be moving forward as planned,” the report reads. “Although Project Blitzkrieg hasn’t yet infected thousands of victims and we cannot directly confirm any cases...
  • European renewable power grid rocked by cyber-attack

    12/10/2012 10:11:32 AM PST · by Olog-hai · 2 replies
    EurActiv ^ | 10 December 2012 | Arthur Neslen
    A German power utility specialising in renewable energy was hit by a serious cyber-attack two weeks ago that lasted five days, knocking its internet communications systems offline, in the first confirmed digital assault against a European grid operator. “It was a DOS (‘Denial Of Service’) attack with a botnet behind it,” Boris Schucht, the CEO of 50Hertz told EurActiv on the fringes of a Brussels renewables conference. “It blocked our internet domains so that in the first hours, all email and connectivity via the internet was blocked.” DOS attacks involve thousands of requests being sent to a server each second...
  • US: Hackers in Iran responsible for cyberattacks

    10/12/2012 12:08:01 PM PDT · by detective · 3 replies
    Yahoo News ^ | October 11, 2012 | LOLITA C. BALDOR
    WASHINGTON (AP) — U.S. authorities believe that Iranian-based hackers were responsible for cyberattacks that devastated Persian Gulf oil and gas companies, a former U.S. government official said. Just hours later, Defense Secretary Leon Panetta said the cyberthreat from Iran has grown, and he declared that the Pentagon is prepared to take action if American is threatened by a computer-based assault. The former official, who is familiar with the investigation, said U.S. authorities believe the cyberattacks were likely supported by the Tehran government and came in retaliation for the latest round of American sanctions against Iran.
  • Anti-Jihad Ads Considered Constitutional

    10/01/2012 2:02:13 PM PDT · by Cindy · 67 replies
    COLLEGIAN.csufresno.edu - Top Opinion Story ^ | September 24, 2012 | Liana Whitehead
    SNIPPET: "New York City is the center of a public uproar as Internet blogger Pamela Gellar rises with an “anti-jihad” ad campaign." SNIPPET: "Gellar and her group are protesting the Jihad, which in definition is the religious duty of Muslims. According to the Dictionary of Islam, jihad is defined as “A religious war with those who are unbelievers in the mission of Muhammad . . . enjoined especially for the purpose of advancing Islam and repelling evil from Muslims.” The literal meaning of jihad, according to the British Broadcasting Network, “is struggle or effort, and it means much more than...
  • Hezbollah Raises Latin American Profile

    09/18/2012 9:27:36 PM PDT · by neverdem · 43 replies
    Commentary ^ | 09.15.2012 | Michael Rubin
    @mrubin1971Two news stories from recent weeks, if true, should raise a red flag in the United States that Iran is preparing to use Hezbollah to strike at U.S. interests in Latin America, if not in the United States itself.First, this story from the Lebanese news portal Naharnet and sourced in part to Israeli radio. The Naharnet story was taken down shortly after it appeared: Hezbollah is using a training base established by Iran in northern Nicaragua near the border with Honduras, the Israeli radio reported on Thursday [September 6]. “The area is cordoned off and there are around 30 members...
  • September 2001 - September 2012

    09/01/2012 1:56:13 AM PDT · by Cindy · 46 replies
    TRUTHUSA.com ^ | September 1, 2012 | n/a
    Brief thoughts/quotes from the last 11 years. "Looking away, not caring, or hoping for the best are not viable options in fighting terrorism (in general) and the global jihad (specifically). Terrorism must be fought head on 24/7 and preventing terrorism is far better than just reacting to one terror-related event after another." -Cindy (July 1, 2011) ~ "WHAT DID I LEARN from the terrorist attack on September 11, 2001? OPINION: I have learned that more Americans love America than the lame-stream media will ever let on. I have learned that America's military is the finest in the world. I have...
  • Jihadis Online: A Few Thoughts

    07/24/2012 3:24:56 AM PDT · by Cindy · 45 replies
    Society For Internet Research ^ | JULY 5, 2011 | S.O.F.I.R.
    SNIPPET: "I. When considering the matter of jihadis online, remember that most of what we think we know is based on analyses of the comments made by an handful of vocal activists. The vast majority of jihadis online, be they on forums or social networking sites[i], say nothing. Skillful translations and insightful analyses by definition tell us little about this potentially lethal yet silent majority."
  • Olympics- Cyber attack seen as emerging threat for London 2012

    07/28/2009 1:52:49 AM PDT · by Cindy · 47 replies · 883+ views
    REUTERS.com ^ | Tue Jul 21, 2009 10:48am EDT | Avril Ormsby
    LONDON, July 21 (Reuters) - Olympic organisers are "very alive" to the threat of a cyber attack on the London 2012 Olympics, made more challenging because of its evolving nature, senior Interior Ministry officials said on Tuesday. Ticketing systems, the transport network and hotel bookings as well as security are among potential targets. Olympic security officials are also planning for the possible diversion of aircraft to protect airspace around the venues from terrorist attacks, the officials said. The greatest threat to security at the Games is international terrorism, the government's latest "Safety and Security Strategy" report said.
  • Google Removes 640 Videos from YouTube Promoting Terrorism

    06/18/2012 11:32:24 PM PDT · by Cindy · 28 replies
    TELEGRAPH.co.uk ^ | 7:11AM BST 18 Jun 2012 | n/a
    SNIPPET: "Google removed 640 videos from YouTube in the second half of last year amid fears they promoted terrorism. The Association of Chief Police Officers (Acpo) made a request for five user accounts to be closed for allegedly promoting terrorism. Google agreed and deleted the 640 videos."
  • U.S. senators: Al Qaeda calls for 'electronic jihad'

    05/27/2012 1:08:39 AM PDT · by Innovative · 11 replies
    CNN ^ | May 23, 2012 | CNN Wire Staff
    An al Qaeda video calling for "electronic jihad" illustrates the urgent need for cybersecurity standards for the most critical networks in the United States, a group of senators said. The video calls for cyberattacks against networks such as the electric grid and compares vulnerabilities in the United States' critical cyber networks to the vulnerabilities in the country's aviation system before 9/11, according to a statement Tuesday from the Senate Committee on Homeland Security and Governmental Affairs. "This is the clearest evidence we've seen that Al Qaeda and other terrorist groups want to attack the cyber systems of our critical infrastructure,"...
  • Cybersecurity bill passes despite concerns about personal data protection

    04/27/2012 3:00:32 AM PDT · by carriage_hill · 3 replies
    CNN News ^ | April 26th, 2012, 07:37 PM ET | By Deirdre Walsh
    Ignoring a veto threat from the White House, the House passed legislation Thursday designed to protect communications networks from cyberattacks. The vote was 248-168. But even as the House bill moves forward, privacy concerns about granting government agencies access to personal information transmitted on the Internet could prove to be a major obstacle to any new cybersecurity law. House Intelligence Committee Chairman Mike Rogers, R-Michigan and a former FBI agent, said he spent the last year working on the bill because the national security risk to the United States posed by cyberattacks is one, "we are just not prepared to...
  • Al-Qaida's online forums go dark  

    04/02/2012 4:31:33 PM PDT · by Cindy · 47 replies
    UPI ^ | Published: April 2, 2012 at 2:37 PM | n/a
    SNIPPET: "WASHINGTON, April 2 (UPI) -- A blackout of al-Qaida's main Web sites is in its 11th day, and officials think the forums may have been brought down in a cyberattack. While no one has claimed credit for disabling the sites..." SNIPPET: "The loss of information typically confuses and frustrates the readers of the Web sites. "It leaves the rank-and-file to guess which messages and which messengers are genuine al-Qaida, and provides undercover operators with new opportunities to disrupt the movement," said A. Aaron Weisburd, senior fellow at the Homeland Security Policy Institute."
  • Internet is a powerful catalyst for jihad: Dutch security service

    02/16/2012 12:31:58 AM PST · by Cindy · 25 replies
    DUTCH NEWS.nl ^ | February 14, 2012 | n/a
    The internet has become a powerful catalyst for international violent jihad, according to a new report from the Dutch security service AIVD.
  • U.S. Expels Venezuelan Consul in Miami

    01/08/2012 4:01:57 PM PST · by Eleutheria5 · 31 replies
    Arutz Sheva ^ | 9/1/12
    The United States has ordered the expulsion of Venezuela’s consul general in Miami, AFP reported on Sunday. The expulsion comes amid reports linking the diplomat to an alleged Iranian plot to target sensitive U.S. facilities with cyber attacks. According to the report, the Venezuelan embassy in Washington was notified on Friday that Livia Acosta Noguera, the consul general in Miami, had been declared persona non grata and had until Tuesday to leave the country...
  • When things go wrong keep it quiet? What the hell were these people thinking?

    10/15/2011 9:36:58 AM PDT · by jmaroneps37 · 20 replies
    coachisright.com ^ | OCTOBER 15TH, 2011 | Jim Emerson, staff writer
    For the last two weeks Air Force computer specialists have been battling a computer infection of ground based computers that control drones operating over the Mideast. The administration specialists at Creech AFB, Nevada wanted to keep the incident quiet till they could eliminate the virus by themselves. Instead of asking for help the command was overwhelmed by a virus that couldn’t be easily removed. Because of the time wasted it may take a while before the extent of the infection is known and what systems have been compromised. Keylogger The virus affecting the ground stations was a “keylogger” virus. A...
  • Miniter: Hacked! When will we start to defend America's computers

    06/23/2011 8:06:37 PM PDT · by nuconvert · 17 replies
    Gazette ^ | June 23, 2011 | Richard Miniter
    When the Stuxnet computer worm severely damaged Iran’s nuclear program, many Americans cheered. We should also fear cyberattacks coming at us. The International Monetary Fund in Washington, D.C., was hacked this past week. The top suspect? China. The week before, the White House. More than 100 senior Obama administration officials found that their private gmail accounts were targeted by China-based hackers, an administration spokesman told The Wall Street Journal. The FBI and the Department of Homeland Security are investigating. The attacks have been traced to Jinan, home to China’s army cyberunit. The various recent hacking attacks are not isolated events....
  • North Korea recruits hackers at school

    06/20/2011 8:22:09 PM PDT · by Bad~Rodeo · 6 replies
    Aljazeera ^ | 20 Jun 2011 | Sangwon Yoon
    A child becomes computer literate at primary school. Meanwhile, North Korea's most prodigious young students are identified and trained in advanced cyberwarfare techniques As South Korea blames North Korea for a recent slew of cyberattacks, two defectors share their experiences, as a hacker and trainer of "cyberwarriors" in the reclusive communist country, with Al Jazeera shedding some light into the inner workings of the North's cyberwarfare programme. In the process, Kim Heung-kwang and Jang Se-yul also warn of the regime's concentrated efforts to bolster its cyberwarfare capabilities. The hackers' professor Kim Heung-kwang was a computer science professor in North...
  • Hackers could attack planes

    04/03/2011 2:24:58 PM PDT · by MamaDearest · 18 replies
    adelaide now ^ | April 4, 2011 | Alex Dickinson
    MALICIOUS hacking software that could force a passenger jet to nosedive has been developed. Security representatives at the Asia-Pacific Aviation Security conference, which included representatives from Qantas and Virgin Airlines, said that cyber attacks were the second biggest risk to the aviation industry after natural disasters. Ty Miller, of Australian security firm Pure Hacking, said the risk was no longer "something out of a movie" but had become more likely with the dawn of the Stuxnet virus. An unknown attacker last year used the software to sabotage one of Iran's uranium enrichment plants. "The stereotypical Die Hard 2 airport attack...
  • Hacker group vows 'cyberwar' on US government, business [ The result will be Internet Regulations]

    03/08/2011 7:25:03 PM PST · by NoLibZone · 23 replies
    MSNBC ^ | March 8 2011 | Michael Isikoff
    Actions to retaliate for treatment of WikiLeaks, Manning, spokesman for Anonymous says. DALLAS — A leader of the computer hackers group known as Anonymous is threatening new attacks on major U.S. corporations and government officials as part of at an escalating “cyberwar” against the citadels of American power. “It’s a guerilla cyberwar — that’s what I call it,” said Barrett Brown, 29, who calls himself a senior strategist and “propagandist” for Anonymous. He added: “It’s sort of an unconventional, asymmetrical act of warfare that we’ve involved in. And we didn’t necessarily start it. I mean, this fire has been burning.”...
  • US Gov. Software Creates 'Fake People' on Social Networks to Promote Propaganda

    02/19/2011 5:21:33 PM PST · by Tolerance Sucks Rocks · 110 replies
    The Examiner ^ | February 18, 2011 | Sean Kerrigan
    The US government is offering private intelligence companies contracts to create software to manage "fake people" on social media sites and create the illusion of consensus on controversial issues. The contract calls for the development of "Persona Management Software" which would help the user create and manage a variety of distinct fake profiles online. The job listing was discussed in recently leaked emails from the private security firm HBGary after an attack by internet activist last week.Click here to view the government contract (PDF)According to the contract, the software would "protect the identity of government agencies" by employing a number...
  • WikiLeaks releases nearly impossible to stop

    12/08/2010 8:14:23 AM PST · by SmithL · 32 replies · 1+ views
    San Francisco Chronicle ^ | 12/8/10 | Andrew Ross
    Sen. Dianne Feinstein wants to prosecute Julian Assange for espionage. The founder of WikiLeaks "intentionally harmed the U.S. government," says Feinstein, who chairs the Senate Intelligence Committee. By releasing 250,000 State Department cables, he also violated the 1917 Espionage Act by transmitting "information which the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation," Feinstein, D-Calif., charged in a Wall Street Journal opinion piece Tuesday. To John Perry Barlow, co-founder of San Francisco's Electronic Frontier Foundation, "The first serious infowar is now engaged. The field of...
  • A laundry list of power industry incidents to learn from (cyber terror attacks)

    09/25/2010 12:53:32 PM PDT · by SmartInsight · 3 replies
    Network Work ^ | Sept. 22, 2010 | M. E. Kabay
    In this seventh article in a series focusing on the need for improved information assurance and cyber situational awareness in the electric power industry, we continue a survey of government and industry consensus about the need for increased security of SCADA systems in the power industry. Cyberterror Impact, Defense Under Scrutiny The DHS Daily Open Source Infrastructure Report for Aug. 4, 2004 included the following item summarizing work by Jon Swartz of USA TODAY: A coordinated cyberattack against the U.S. could topple parts of the Internet, silence communications and commerce, and paralyze federal agencies and businesses, government officials and security...
  • Groundbreaking cyber espionage report to be released

    04/06/2010 4:12:47 AM PDT · by decimon · 5 replies · 288+ views
    University of Toronto ^ | Apr 6, 2010 | Unknown
    TORONTO, ON – The Information Warfare Monitor (Citizen Lab, Munk School of Global Affairs, University of Toronto and the SecDev Group, Ottawa) and the Shadowserver Foundation announce the release of Shadows in the Cloud: An investigation into cyber espionage 2.0. The report documents a complex ecosystem of cyber espionage that systematically targeted and compromised computer systems in India, the Offices of the Dalai Lama, the United Nations, and several other countries. Members of the research team are holding a news conference at 11 a.m. on Tuesday, April 6, to discuss their latest findings and to answer questions from the media....
  • Welcome to the cybertrenches

    04/03/2010 3:27:35 AM PDT · by Scanian · 7 replies · 343+ views
    NY Post ^ | April 3, 2010 | ARTHUR HERMAN
    Google's woes in China are a warning shot in the new Cold War of our time -- the fight for dominance of cyberspace. It's a conflict the United States can't afford to lose. Start by realizing that Google's decision to leave China was about far more than censorship. For the past year, Chinese government hackers have been trying push their way into Google's operating system. In recent attacks, they may have abused Google to access computers of some 200 US companies. That is, hacking Google gives China access not just to personal data about Chinese dissidents but any number of...
  • Training the next Cyber Warriors

    03/27/2010 4:09:03 AM PDT · by sodpoodle · 2 replies · 150+ views
    Fox news ^ | March 26, 2010 | Adam Housley
    By some estimates we will need nearly 60,000 newly trained cyber defense warriors (as they are called), just in the next 3 years to help stop the threats to U.S. interests, companies and friends around the globe. That number is staggering when you realize that much of the hacking that exists today is unknown. For example, for every hacker like Francois who clearly wants to be known, there are hundreds who want to do just the opposite....they just want to sneak in, get the info and then sneak out......never detected.
  • Dismantling of Saudi-CIA Web site illustrates need for clearer cyberwar policies

    03/19/2010 4:46:35 PM PDT · by Cindy · 10 replies · 199+ views
    WASHINGTON POST.com ^ | Friday, March 19, 2010 | By Ellen Nakashima
    "Dismantling of Saudi-CIA Web site illustrates need for clearer cyberwar policies" By Ellen Nakashima Washington Post Staff Writer Friday, March 19, 2010; A01 SNIPPET: "By early 2008, top U.S. military officials had become convinced that extremists planning attacks on American forces in Iraq were making use of a Web site set up by the Saudi government and the CIA to uncover terrorist plots in the kingdom. "We knew we were going to be forced to shut this thing down," recalled one former civilian official, describing tense internal discussions in which military commanders argued that the site was putting Americans at...
  • Nuke hack attack puts military on high alert (Fake report over govt systems Okinawa nuked)

    03/09/2010 12:42:45 AM PST · by tlb · 20 replies · 352+ views
    WorldNetDaily ^ | March 08, 2010 | Mike Maloof
    WASHINGTON, D.C. – A message that North Korea had conducted a nuclear attack on the Japanese island of Okinawa turned out to be false, but the fact it was delivered via U.S. military communications has prompted a high alert, according to U.S. officials who asked to remain anonymous. U.S. military channels were hacked either by the Chinese or North Koreans, the source said. Access to such communications – even unclassified military systems – suggests a serious breach of technology security. "Today, March 06, 2010 at 11.46 AM local time (UTC/GMT -5 hours),US seismographic stations recorded seismic activity in the area...
  • Cybersecurity: Progress Made but Challenges Remain...

    03/06/2010 1:30:35 PM PST · by Cindy · 2 replies · 154+ views
    Note: This is a SNIPPET only. Quote: GAO U.S. GOVERNMENT ACCOUNTABILITY OFFICE http://gao.gov/products/GAO-10-338 "Cybersecurity: Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National Initiative" GAO-10-338 March 5, 2010 SNIPPET: "Summary In response to the ongoing threats to federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cybersecurity Initiative (CNCI) in 2008. This initiative consists of a set of projects aimed at reducing vulnerabilities, protecting against intrusions, and anticipating future threats. GAO was asked to determine (1) what actions have been taken to develop interagency mechanisms to plan and coordinate CNCI activities and...
  • Cyber warriors gather as online battles rage

    03/01/2010 12:59:04 AM PST · by xtinct · 28 replies · 1,807+ views
    Space War ^ | 2/28/10 | Staff Writers
    US national security leaders and top cyber warriors from around the world are gathering here to plot defenses against criminals and spies that increasingly plague the Internet. Homeland Security Secretary Janet Napolitano and White House Cyber Security Coordinator Howard Schmidt will take part in this week's RSA conference along with computer defense companies and technology icons such as Apple co-founder Steve Wozniak and Craigslist creator Craig Newmark. "We have before us more data moving into the cloud and more sophisticated cyber criminals," said Qualys chief executive Philippe Courtot, who is among the keynote speakers at the premier event that kicks...
  • Cyberattacks Reportedly Traced to Computers in Chinese Schools

    02/18/2010 9:39:30 PM PST · by Cindy · 6 replies · 460+ views
    FOX NEWS.com ^ | Updated February 18, 2010 | n/a
    Updated February 18, 2010 Cyberattacks Reportedly Traced to Computers in Chinese Schools" FOXNews.com SNIPPET: "The recent cyberattacks on Google and other American companies have been traced by investigators to computers at two schools in China, including one with ties to the Chinese military, according to a New York Times report citing unnamed inside sources. The Times report also says that the attacks began much earlier than first thought, as far back as April..."
  • Google to enlist NSA to help it ward off cyberattacks (BS! Google records, pass to NSA)

    02/04/2010 10:16:44 AM PST · by max americana · 21 replies · 478+ views
    Washington (com)Post ^ | Feb 4, 2010 | Ellen Nakashima
    The world's largest Internet search company and the world's most powerful electronic surveillance organization are teaming up in the name of cybersecurity. Under an agreement that is being finalized, the National Security Agency would help Google analyze a major corporate espionage attack that the firm said originated in China and targeted its computer networks, according to cybersecurity experts familiar with the matter. The objective is to better defend Google -- and its users -- from future attack. Google and the NSA declined to comment on the partnership. But sources with knowledge of the arrangement, speaking on the condition of anonymity,...
  • US oil industry hit by cyberattacks: Was China involved?

    01/28/2010 7:34:17 AM PST · by Cheap_Hessian · 233+ views
    The Christian Science Monitor ^ | January 25, 2010 | Mark Clayton
    MONITOR EXCLUSIVE: Breaches show how sophisticated industrial espionage is becoming. The big question: Who’s behind them? Houston At least three US oil companies were the target of a series of previously undisclosed cyberattacks that may have originated in China and that experts say highlight a new level of sophistication in the growing global war of Internet espionage. The oil and gas industry breaches, the mere existence of which has been a closely guarded secret of oil companies and federal authorities, were focused on one of the crown jewels of the industry: valuable “bid data” detailing the quantity, value, and location...
  • S. Korea heightens alert against cyberattacks

    01/26/2010 11:45:16 PM PST · by Cindy · 2 replies · 361+ views
    (AFP) via NEWS.ASIAONE.com ^ | Wed, Jan 27, 2010 | n/a
    SNIPPET: SEOUL, Jan 27, 2010 (AFP) - South Korea's spy agency said Wednesday it had issued an alert against cyberattacks aimed at stealing data from government networks. The National Intelligence Service (NIS) did not say whether North Korea was responsible. Open Radio for North Korea, a Seoul-based group specialising in the North, said the latest attack was led by Pyongyang, which runs elite hacker units. The NIS said its alert was heightened "from normal to concern" on Monday after a massive inflow of overseas hacking attacks. The attacks were aimed at stealing data from government and other state networks, it...
  • Debate heats up over cybersecurity regulations for electric utilities

    11/03/2009 12:59:14 PM PST · by Cindy · 3 replies · 281+ views
    NextGov.com ^ | 10/27/2009 | BY JILL R. AITORO
    Representatives from the electrical industry sharply criticized on Tuesday a proposal in the House to extend federal regulation to include local power plants in major cities to protect them and the national power grid from cyberattacks. Under the 1935 Federal Power Act, the Federal Energy Regulatory Commission enforces security standards for most of the nation's power plants, including facilities and control networks -- known as bulk power systems -- that connect power systems. But the commission does not have regulatory jurisdiction over electrical systems outside the continental United States and to local distribution facilities, which include some in large cities...
  • Cyber criminals target Australian networks

    10/30/2009 10:10:38 PM PDT · by Cindy · 2 replies · 418+ views
    ABC.net.au ^ | Updated Thu Oct 29, 2009 8:45am AEDT | By national security correspondent Matt Brown
    Related Story: Australia 'must prepare for cyber attack' SNIPPET: "More evidence is emerging of sophisticated attacks by criminals and foreign governments on Australia's computer networks. Government officials from the spy organisation ASIO, as well as federal police and computer security experts, have joined forces with the top-secret Defence Signals Directorate since July. The Cyber Security Operations Centre has found attacks on company information, apparently conducted by organised crime, which turn out to have national security implications."
  • Project Grey Goose and University at Albany SUNY to investigate major Power Grid blackouts...

    10/18/2009 5:53:37 PM PDT · by Cindy · 7 replies · 555+ views
    INTELFUSION.net ^ | October 16th, 2009 at 10:40 am | Written by Jeffreycarr
    "Project Grey Goose and University at Albany SUNY to investigate major Power Grid blackouts caused by hackers" SNIPPET: "This is an open call for volunteers who wish to participate in a joint Project Grey Goose / University at Albany SUNY open source intelligence investigation into power grid blackouts caused by hacker attacks. The scope is global and includes the U.S. Interested parties should contact me from their work email address with an expression of interest, a brief bio, and your experience, if any, in SCADA systems in general or the power grid in particular. All respondents will be kept confidential....
  • MI5 hiring Asian teenagers to fight cyber terror

    09/21/2009 7:03:25 PM PDT · by Cindy · 4 replies · 544+ views
    HINDUSTAN TIMES.com ^ | Last Updated: 02:44 IST(21/9/2009) | n/a
    “MI5 hiring Asian teenagers to fight cyber terror” London, September 21, 2009 First Published: 00:09 IST(21/9/2009) Last Updated: 02:44 IST(21/9/2009) SNIPPET: “MI5 head Jonathan Evans has told his staff that the recruits were essential to combat cyber terrorism which has been traced to China, Russia and Pakistan — the hackers have also intercepted messages from terrorists in Belmarsh maximum security prison, the newspaper said. In a report to Lord West, the Security Minister, Evans has revealed that during the summer over 1,000 hits were made on computers in Whitehall. Other targets have been air traffic control, power stations and the...
  • Bill in Process to Give President 'Emergency' Power of the Web

    08/28/2009 11:49:31 AM PDT · by ClassicLiberal · 13 replies · 642+ views
    We Recommend ^ | August 28, 2009 | Mike
    CNET Reports: ”Internet companies and civil liberties groups were alarmed this spring when a U.S. Senate bill proposed handing the White House the power to disconnect private-sector computers from the Internet.[…] CNET News has obtained a copy of the 55-page draft of S.773 (excerpt), which still appears to permit the president to seize temporary control of private-sector networks during a so-called cybersecurity emergency. The new version would allow the president to “declare a cybersecurity emergency” relating to “non-governmental” computer networks and do what’s necessary to respond to the threat. Other sections of the proposal include a federal certification program for...