Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $14,911
18%  
Woo hoo!! And we're now over 18%!! Thank you all very much!! God bless.

Keyword: cyberattacks

Brevity: Headers | « Text »
  • US Gov. Software Creates 'Fake People' on Social Networks to Promote Propaganda

    02/19/2011 5:21:33 PM PST · by Tolerance Sucks Rocks · 110 replies
    The Examiner ^ | February 18, 2011 | Sean Kerrigan
    The US government is offering private intelligence companies contracts to create software to manage "fake people" on social media sites and create the illusion of consensus on controversial issues. The contract calls for the development of "Persona Management Software" which would help the user create and manage a variety of distinct fake profiles online. The job listing was discussed in recently leaked emails from the private security firm HBGary after an attack by internet activist last week.Click here to view the government contract (PDF)According to the contract, the software would "protect the identity of government agencies" by employing a number...
  • WikiLeaks releases nearly impossible to stop

    12/08/2010 8:14:23 AM PST · by SmithL · 32 replies · 1+ views
    San Francisco Chronicle ^ | 12/8/10 | Andrew Ross
    Sen. Dianne Feinstein wants to prosecute Julian Assange for espionage. The founder of WikiLeaks "intentionally harmed the U.S. government," says Feinstein, who chairs the Senate Intelligence Committee. By releasing 250,000 State Department cables, he also violated the 1917 Espionage Act by transmitting "information which the possessor has reason to believe could be used to the injury of the United States or to the advantage of any foreign nation," Feinstein, D-Calif., charged in a Wall Street Journal opinion piece Tuesday. To John Perry Barlow, co-founder of San Francisco's Electronic Frontier Foundation, "The first serious infowar is now engaged. The field of...
  • A laundry list of power industry incidents to learn from (cyber terror attacks)

    09/25/2010 12:53:32 PM PDT · by SmartInsight · 3 replies
    Network Work ^ | Sept. 22, 2010 | M. E. Kabay
    In this seventh article in a series focusing on the need for improved information assurance and cyber situational awareness in the electric power industry, we continue a survey of government and industry consensus about the need for increased security of SCADA systems in the power industry. Cyberterror Impact, Defense Under Scrutiny The DHS Daily Open Source Infrastructure Report for Aug. 4, 2004 included the following item summarizing work by Jon Swartz of USA TODAY: A coordinated cyberattack against the U.S. could topple parts of the Internet, silence communications and commerce, and paralyze federal agencies and businesses, government officials and security...
  • Groundbreaking cyber espionage report to be released

    04/06/2010 4:12:47 AM PDT · by decimon · 5 replies · 288+ views
    University of Toronto ^ | Apr 6, 2010 | Unknown
    TORONTO, ON – The Information Warfare Monitor (Citizen Lab, Munk School of Global Affairs, University of Toronto and the SecDev Group, Ottawa) and the Shadowserver Foundation announce the release of Shadows in the Cloud: An investigation into cyber espionage 2.0. The report documents a complex ecosystem of cyber espionage that systematically targeted and compromised computer systems in India, the Offices of the Dalai Lama, the United Nations, and several other countries. Members of the research team are holding a news conference at 11 a.m. on Tuesday, April 6, to discuss their latest findings and to answer questions from the media....
  • Welcome to the cybertrenches

    04/03/2010 3:27:35 AM PDT · by Scanian · 7 replies · 343+ views
    NY Post ^ | April 3, 2010 | ARTHUR HERMAN
    Google's woes in China are a warning shot in the new Cold War of our time -- the fight for dominance of cyberspace. It's a conflict the United States can't afford to lose. Start by realizing that Google's decision to leave China was about far more than censorship. For the past year, Chinese government hackers have been trying push their way into Google's operating system. In recent attacks, they may have abused Google to access computers of some 200 US companies. That is, hacking Google gives China access not just to personal data about Chinese dissidents but any number of...
  • Training the next Cyber Warriors

    03/27/2010 4:09:03 AM PDT · by sodpoodle · 2 replies · 150+ views
    Fox news ^ | March 26, 2010 | Adam Housley
    By some estimates we will need nearly 60,000 newly trained cyber defense warriors (as they are called), just in the next 3 years to help stop the threats to U.S. interests, companies and friends around the globe. That number is staggering when you realize that much of the hacking that exists today is unknown. For example, for every hacker like Francois who clearly wants to be known, there are hundreds who want to do just the opposite....they just want to sneak in, get the info and then sneak out......never detected.
  • Dismantling of Saudi-CIA Web site illustrates need for clearer cyberwar policies

    03/19/2010 4:46:35 PM PDT · by Cindy · 10 replies · 199+ views
    WASHINGTON POST.com ^ | Friday, March 19, 2010 | By Ellen Nakashima
    "Dismantling of Saudi-CIA Web site illustrates need for clearer cyberwar policies" By Ellen Nakashima Washington Post Staff Writer Friday, March 19, 2010; A01 SNIPPET: "By early 2008, top U.S. military officials had become convinced that extremists planning attacks on American forces in Iraq were making use of a Web site set up by the Saudi government and the CIA to uncover terrorist plots in the kingdom. "We knew we were going to be forced to shut this thing down," recalled one former civilian official, describing tense internal discussions in which military commanders argued that the site was putting Americans at...
  • Nuke hack attack puts military on high alert (Fake report over govt systems Okinawa nuked)

    03/09/2010 12:42:45 AM PST · by tlb · 20 replies · 352+ views
    WorldNetDaily ^ | March 08, 2010 | Mike Maloof
    WASHINGTON, D.C. – A message that North Korea had conducted a nuclear attack on the Japanese island of Okinawa turned out to be false, but the fact it was delivered via U.S. military communications has prompted a high alert, according to U.S. officials who asked to remain anonymous. U.S. military channels were hacked either by the Chinese or North Koreans, the source said. Access to such communications – even unclassified military systems – suggests a serious breach of technology security. "Today, March 06, 2010 at 11.46 AM local time (UTC/GMT -5 hours),US seismographic stations recorded seismic activity in the area...
  • Cybersecurity: Progress Made but Challenges Remain...

    03/06/2010 1:30:35 PM PST · by Cindy · 2 replies · 154+ views
    Note: This is a SNIPPET only. Quote: GAO U.S. GOVERNMENT ACCOUNTABILITY OFFICE http://gao.gov/products/GAO-10-338 "Cybersecurity: Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National Initiative" GAO-10-338 March 5, 2010 SNIPPET: "Summary In response to the ongoing threats to federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cybersecurity Initiative (CNCI) in 2008. This initiative consists of a set of projects aimed at reducing vulnerabilities, protecting against intrusions, and anticipating future threats. GAO was asked to determine (1) what actions have been taken to develop interagency mechanisms to plan and coordinate CNCI activities and...
  • Cyber warriors gather as online battles rage

    03/01/2010 12:59:04 AM PST · by xtinct · 28 replies · 1,807+ views
    Space War ^ | 2/28/10 | Staff Writers
    US national security leaders and top cyber warriors from around the world are gathering here to plot defenses against criminals and spies that increasingly plague the Internet. Homeland Security Secretary Janet Napolitano and White House Cyber Security Coordinator Howard Schmidt will take part in this week's RSA conference along with computer defense companies and technology icons such as Apple co-founder Steve Wozniak and Craigslist creator Craig Newmark. "We have before us more data moving into the cloud and more sophisticated cyber criminals," said Qualys chief executive Philippe Courtot, who is among the keynote speakers at the premier event that kicks...
  • Cyberattacks Reportedly Traced to Computers in Chinese Schools

    02/18/2010 9:39:30 PM PST · by Cindy · 6 replies · 460+ views
    FOX NEWS.com ^ | Updated February 18, 2010 | n/a
    Updated February 18, 2010 Cyberattacks Reportedly Traced to Computers in Chinese Schools" FOXNews.com SNIPPET: "The recent cyberattacks on Google and other American companies have been traced by investigators to computers at two schools in China, including one with ties to the Chinese military, according to a New York Times report citing unnamed inside sources. The Times report also says that the attacks began much earlier than first thought, as far back as April..."
  • Google to enlist NSA to help it ward off cyberattacks (BS! Google records, pass to NSA)

    02/04/2010 10:16:44 AM PST · by max americana · 21 replies · 478+ views
    Washington (com)Post ^ | Feb 4, 2010 | Ellen Nakashima
    The world's largest Internet search company and the world's most powerful electronic surveillance organization are teaming up in the name of cybersecurity. Under an agreement that is being finalized, the National Security Agency would help Google analyze a major corporate espionage attack that the firm said originated in China and targeted its computer networks, according to cybersecurity experts familiar with the matter. The objective is to better defend Google -- and its users -- from future attack. Google and the NSA declined to comment on the partnership. But sources with knowledge of the arrangement, speaking on the condition of anonymity,...
  • US oil industry hit by cyberattacks: Was China involved?

    01/28/2010 7:34:17 AM PST · by Cheap_Hessian · 233+ views
    The Christian Science Monitor ^ | January 25, 2010 | Mark Clayton
    MONITOR EXCLUSIVE: Breaches show how sophisticated industrial espionage is becoming. The big question: Who’s behind them? Houston At least three US oil companies were the target of a series of previously undisclosed cyberattacks that may have originated in China and that experts say highlight a new level of sophistication in the growing global war of Internet espionage. The oil and gas industry breaches, the mere existence of which has been a closely guarded secret of oil companies and federal authorities, were focused on one of the crown jewels of the industry: valuable “bid data” detailing the quantity, value, and location...
  • S. Korea heightens alert against cyberattacks

    01/26/2010 11:45:16 PM PST · by Cindy · 2 replies · 361+ views
    (AFP) via NEWS.ASIAONE.com ^ | Wed, Jan 27, 2010 | n/a
    SNIPPET: SEOUL, Jan 27, 2010 (AFP) - South Korea's spy agency said Wednesday it had issued an alert against cyberattacks aimed at stealing data from government networks. The National Intelligence Service (NIS) did not say whether North Korea was responsible. Open Radio for North Korea, a Seoul-based group specialising in the North, said the latest attack was led by Pyongyang, which runs elite hacker units. The NIS said its alert was heightened "from normal to concern" on Monday after a massive inflow of overseas hacking attacks. The attacks were aimed at stealing data from government and other state networks, it...
  • Debate heats up over cybersecurity regulations for electric utilities

    11/03/2009 12:59:14 PM PST · by Cindy · 3 replies · 281+ views
    NextGov.com ^ | 10/27/2009 | BY JILL R. AITORO
    Representatives from the electrical industry sharply criticized on Tuesday a proposal in the House to extend federal regulation to include local power plants in major cities to protect them and the national power grid from cyberattacks. Under the 1935 Federal Power Act, the Federal Energy Regulatory Commission enforces security standards for most of the nation's power plants, including facilities and control networks -- known as bulk power systems -- that connect power systems. But the commission does not have regulatory jurisdiction over electrical systems outside the continental United States and to local distribution facilities, which include some in large cities...
  • Cyber criminals target Australian networks

    10/30/2009 10:10:38 PM PDT · by Cindy · 2 replies · 418+ views
    ABC.net.au ^ | Updated Thu Oct 29, 2009 8:45am AEDT | By national security correspondent Matt Brown
    Related Story: Australia 'must prepare for cyber attack' SNIPPET: "More evidence is emerging of sophisticated attacks by criminals and foreign governments on Australia's computer networks. Government officials from the spy organisation ASIO, as well as federal police and computer security experts, have joined forces with the top-secret Defence Signals Directorate since July. The Cyber Security Operations Centre has found attacks on company information, apparently conducted by organised crime, which turn out to have national security implications."
  • Project Grey Goose and University at Albany SUNY to investigate major Power Grid blackouts...

    10/18/2009 5:53:37 PM PDT · by Cindy · 7 replies · 555+ views
    INTELFUSION.net ^ | October 16th, 2009 at 10:40 am | Written by Jeffreycarr
    "Project Grey Goose and University at Albany SUNY to investigate major Power Grid blackouts caused by hackers" SNIPPET: "This is an open call for volunteers who wish to participate in a joint Project Grey Goose / University at Albany SUNY open source intelligence investigation into power grid blackouts caused by hacker attacks. The scope is global and includes the U.S. Interested parties should contact me from their work email address with an expression of interest, a brief bio, and your experience, if any, in SCADA systems in general or the power grid in particular. All respondents will be kept confidential....
  • MI5 hiring Asian teenagers to fight cyber terror

    09/21/2009 7:03:25 PM PDT · by Cindy · 5 replies · 544+ views
    HINDUSTAN TIMES.com ^ | Last Updated: 02:44 IST(21/9/2009) | n/a
    “MI5 hiring Asian teenagers to fight cyber terror” London, September 21, 2009 First Published: 00:09 IST(21/9/2009) Last Updated: 02:44 IST(21/9/2009) SNIPPET: “MI5 head Jonathan Evans has told his staff that the recruits were essential to combat cyber terrorism which has been traced to China, Russia and Pakistan — the hackers have also intercepted messages from terrorists in Belmarsh maximum security prison, the newspaper said. In a report to Lord West, the Security Minister, Evans has revealed that during the summer over 1,000 hits were made on computers in Whitehall. Other targets have been air traffic control, power stations and the...
  • Bill in Process to Give President 'Emergency' Power of the Web

    08/28/2009 11:49:31 AM PDT · by ClassicLiberal · 13 replies · 642+ views
    We Recommend ^ | August 28, 2009 | Mike
    CNET Reports: ”Internet companies and civil liberties groups were alarmed this spring when a U.S. Senate bill proposed handing the White House the power to disconnect private-sector computers from the Internet.[…] CNET News has obtained a copy of the 55-page draft of S.773 (excerpt), which still appears to permit the president to seize temporary control of private-sector networks during a so-called cybersecurity emergency. The new version would allow the president to “declare a cybersecurity emergency” relating to “non-governmental” computer networks and do what’s necessary to respond to the threat. Other sections of the proposal include a federal certification program for...
  • New attack cracks common Wi-Fi encryption in a minute

    08/28/2009 10:58:25 AM PDT · by ShadowAce · 42 replies · 1,331+ views
    Network World ^ | 27 August 2009 | Robert McMillan
    Computer scientists in Japan say they've developed a way to break the WPA encryption system used in wireless routers in about one minute. The attack gives hackers a way to read encrypted traffic sent between computers and certain types of routers that use the WPA (Wi-Fi Protected Access) encryption system. The attack was developed by Toshihiro Ohigashi of Hiroshima University and Masakatu Morii of Kobe University, who plan to discuss further details at a technical conference set for Sept. 25 in Hiroshima. Last November, security researchers first showed how WPA could be broken, but the Japanese researchers have taken the...