Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $9,068
11%  
Woo hoo!! And we're now over 11%!! Thank you all very much!! God bless.

Keyword: cyberespionage

Brevity: Headers | « Text »
  • Forget Collusion. Can Mueller Prove Russia Committed Cyberespionage? If not, what’s the point?

    12/11/2017 10:29:57 AM PST · by billorites · 36 replies
    National Review ^ | December 11, 2017 | Andrew C. McCarthy
    The rationale for Robert Mueller’s appointment as special counsel is that Russia conducted a cyberespionage attack — hacking — to interfere in the 2016 presidential campaign, and that the Trump campaign may somehow have “colluded” in this offense. Mueller has been at this for six months, and the FBI for a year before that. So isn’t it about time we asked: Could Mueller prove that Russia did it? Forget Trump. What about Russia? We have paid too much attention to the so-called collusion component of the probe — speculation about Trump-campaign coordination in Russia’s perfidy. There appears to be no proof...
  • Assessing China’s Proposal for International Cooperation on Cyberspace

    03/15/2017 9:43:02 AM PDT · by Sean_Anthony · 2 replies
    Canada Free Press ^ | 03/14/17 | Joseph Klein
    When President Trump and President Xi Jinping meet for the first time next month, exploring avenues for further constructive cyberspace cooperation between China and the United States should be amongst the issues they discuss The arcane issue of cybersecurity has received front page media attention of late. Most recently, WikiLeaks published documents which purport to show, according to WikiLeaks, “the scope and direction of the CIA’s global covert hacking program.” The program is comprised of a “malware arsenal and dozens of ‘zero day’ weaponized exploits against a wide range of U.S. and European company products…which are turned into covert microphones.”...
  • Hitting Back At Hackers: Why "Strikeback" Is Doomed To Fail

    04/10/2013 4:17:51 AM PDT · by Sir Napsalot · 13 replies
    ReadWrite ^ | 4-9-2013 | Corey Nachreiner
    (snip) Considering this deluge of aggressive and costly security breaches, it’s no wonder that some people are getting frustrated enough to contemplate striking back directly against our attackers. While giving cyber criminals a taste of their own medicine certainly sounds appealing, most forms of so-called "Strikeback" have no place in private business. ...... What’s Wrong With Strikeback?Unfortunately, direct strikeback measures have huge inherent risks:. Targeting: The biggest problem with strikeback is that the Internet provides anonymity, making it very hard to know who’s really behind an attack. It's all too likely that strikebacks could impact innocent victims. For example, attackers...
  • Iran Spy Network 30,000 Strong

    01/03/2013 3:07:06 AM PST · by Cindy · 18 replies
    THE WASHINGTON FREE BEACON ^ | January 3, 2013 4:59 am | Bill Gertz
    "IRAN SPY NETWORK 30,000 STRONG Pentagon report: Iranian intelligence linked to spying, terror attacks" SNIPPET: "Iran’s intelligence service includes 30,000 people who are engaged in covert and clandestine activities that range from spying to stealing technology to terrorist bombings and assassination, according to a Pentagon report." SNIPPET: "“MOIS provides financial, material, technological, or other support services to Hamas, Hezbollah, and al Qaeda in Iraq (AQI), all designated terrorist organizations under U.S. Executive Order 13224,” the report said. The spy service operates in all areas where Iran has interests, including Afghanistan, Iraq, Kuwait, Lebanon, Central Asia, Africa, Austria, Azerbaijan, Croatia, France,...
  • German Islamists Target Youth on the Internet

    11/02/2012 2:38:29 PM PDT · by Cindy · 27 replies
    SPIEGEL.de - SPIEGEL Online ^ | November 1, 2012 | by Christoph Sydow
      "German Islamists Target Youth on the Internet" By Christoph Sydow 11/01/2012 "Translated from the German by Christopher Sultan." PHOTO CAPTION: "A growing community of German-speaking Islamists has developed on the Internet. Aiming to find new recruits, they glorify jihad and call for attacks on Germany. A new study warns that such online propaganda might foster a new generation of terrorists." SNIPPET: "International terrorist groups like al-Qaida recognized the importance of the Internet for recruiting new supporters early on." SNIPPET: "Intelligence services can also take advantage of the anonymity of Internet forums to deliberately plant false information or obtain insider...
  • Anti-Jihad Ads Considered Constitutional

    10/01/2012 2:02:13 PM PDT · by Cindy · 67 replies
    COLLEGIAN.csufresno.edu - Top Opinion Story ^ | September 24, 2012 | Liana Whitehead
    SNIPPET: "New York City is the center of a public uproar as Internet blogger Pamela Gellar rises with an “anti-jihad” ad campaign." SNIPPET: "Gellar and her group are protesting the Jihad, which in definition is the religious duty of Muslims. According to the Dictionary of Islam, jihad is defined as “A religious war with those who are unbelievers in the mission of Muhammad . . . enjoined especially for the purpose of advancing Islam and repelling evil from Muslims.” The literal meaning of jihad, according to the British Broadcasting Network, “is struggle or effort, and it means much more than...
  • Don't Use Chinese Telecom Equipment, Says Congressional Committee

    10/08/2012 3:05:12 PM PDT · by Racehorse · 14 replies
    DailyFinance ^ | 8 October 2012 | Dan Radovsky
    The House Intelligence committee isn't going so far as to say the Chinese government is trying to turn us into a nation of Manchurian Candidates by using Chinese-made smartphones. What it is saying, after a yearlong investigation, is that two Chinese telecommunications equipment makers, Huawei Technologies and ZTE, may, under the direction of the Chinese government, make the equipment they sell purposely vulnerable to cyber-security leaks. "We simply cannot trust such vital systems to companies with known ties to the Chinese state, a country that is the largest perpetrator of cyber espionage against the U.S.," said committee chairman Mike Rogers...
  • September 2001 - September 2012

    09/01/2012 1:56:13 AM PDT · by Cindy · 46 replies
    TRUTHUSA.com ^ | September 1, 2012 | n/a
    Brief thoughts/quotes from the last 11 years. "Looking away, not caring, or hoping for the best are not viable options in fighting terrorism (in general) and the global jihad (specifically). Terrorism must be fought head on 24/7 and preventing terrorism is far better than just reacting to one terror-related event after another." -Cindy (July 1, 2011) ~ "WHAT DID I LEARN from the terrorist attack on September 11, 2001? OPINION: I have learned that more Americans love America than the lame-stream media will ever let on. I have learned that America's military is the finest in the world. I have...
  • Jihadis Online: A Few Thoughts

    07/24/2012 3:24:56 AM PDT · by Cindy · 45 replies
    Society For Internet Research ^ | JULY 5, 2011 | S.O.F.I.R.
    SNIPPET: "I. When considering the matter of jihadis online, remember that most of what we think we know is based on analyses of the comments made by an handful of vocal activists. The vast majority of jihadis online, be they on forums or social networking sites[i], say nothing. Skillful translations and insightful analyses by definition tell us little about this potentially lethal yet silent majority."
  • Officials Warn of 'Phishing' Scams Targeting Troops

    05/11/2010 6:33:58 PM PDT · by Cindy · 7 replies · 236+ views
    DEFENSE.gov (AMERICAN FORCES PRESS SERVICE) ^ | May 10, 2010 | By Lisa Daniel
    Note: The following text is a quote: Officials Warn of ‘Phishing’ Scams Targeting Troops By Lisa Daniel American Forces Press Service WASHINGTON, May 10, 2010 – U.S. Strategic Command officials are urging renewed vigilance against Internet-based identity theft after detecting a widespread “phishing” expedition against servicemembers. Phishing is a term used to describe deceiving people into divulging personal information such as passwords or account numbers over the Internet. Beginning as early as May 2009 and lasting as late as March 2010, numerous fraudulent e-mails were sent to financial customers of USAA and Navy Federal Credit Union, Stratcom officials said in...
  • Groundbreaking cyber espionage report to be released

    04/06/2010 4:12:47 AM PDT · by decimon · 5 replies · 288+ views
    University of Toronto ^ | Apr 6, 2010 | Unknown
    TORONTO, ON – The Information Warfare Monitor (Citizen Lab, Munk School of Global Affairs, University of Toronto and the SecDev Group, Ottawa) and the Shadowserver Foundation announce the release of Shadows in the Cloud: An investigation into cyber espionage 2.0. The report documents a complex ecosystem of cyber espionage that systematically targeted and compromised computer systems in India, the Offices of the Dalai Lama, the United Nations, and several other countries. Members of the research team are holding a news conference at 11 a.m. on Tuesday, April 6, to discuss their latest findings and to answer questions from the media....
  • Poisoned PDF pill used to attack US military contractors-- Yet more cyber-espionage shenanigans

    01/18/2010 12:42:25 PM PST · by Ernest_at_the_Beach · 4 replies · 419+ views
    The Register ^ | 18th January 2010 16:45 GMT | John Leyden
    Unidentified hackers are running an ongoing cyber-espionage attack targeting US military contractors Booby-trapped PDF files, posing as messages from the US Department of Defense, were emailed to US defence contractors last week. The document refers to a real conference due to be held in Las Vegas in March. Opening the malicious PDF file attached to the spoofed emails triggers an attempt to exploit an Adobe Reader vulnerability only patched by the software firm last Tuesday (12 January). The infection of vulnerable systems opens up a backdoor that connects to a server hosted in Taiwan, though the hackers who set up...
  • THE CYBERSPY THREAT: FOREIGN HACKERS TARGET MILITARY

    04/27/2009 2:32:20 AM PDT · by Scanian · 5 replies · 882+ views
    NY Post ^ | April 27, 2009 | Peter Brookes
    AMERICA needs to pay a heckuva a lot more atten tion to the cyberthreat. Now. Sure, the Pentagon is refuting a Wall Street Journal report last week that hackers pinched loads of data on the military's newest, high-tech fighter aircraft from contractors' computer networks via the Internet. But even if the F-35 Joint Strike Fighter program wasn't actually penetrated by cyberspies, it's still a chilling wake-up call for the United States. The computer systems of the F-35 Lightning were penetrated "repeatedly," according to the newspaper, allowing cyber cat burglars to "copy and siphon off several terabytes of data related to...
  • Computer Spies Breach Fighter-Jet Project

    04/20/2009 10:16:52 PM PDT · by rdl6989 · 21 replies · 1,566+ views
    foxnews.com ^ | April 21, 2009
    WASHINGTON — Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project — the Defense Department's costliest weapons program ever — according to current and former government officials familiar with the attacks. Similar incidents have also breached the Air Force's air-traffic-control system in recent months, these people say. In the case of the fighter-jet program, the intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say, potentially making it easier to defend against the craft. The latest intrusions provide new evidence that a battle is heating up...
  • GhostNet spy network phishes international victims (CHINA can listen to you thur your pc)

    03/30/2009 4:28:48 PM PDT · by rgr · 2 replies · 490+ views
    scmagazineus.com ^ | 03/30/09 | scmagazineus.com
    A cyberespionage network, known as GhostNet, possibly operating out of China, is making use of malicious websites and phishing emails to take control of hundreds of sensitive government machines across 103 countries, researchers revealed this weekend. A pair of Canadian researchers at the Munk Center for International Studies at the University of Toronto said GhostNet struck "high-value targets," such as foreign embassies and ministries, and even a NATO network. So far, some 1,300 computers have been infected by servers that trace back to China. The researchers, Ron Deibert and Rafal Rohozinski, released their 53-page report Sunday after 10 months of...
  • Chinese hack into Indian embassies, steal Dalai Lama's documents (worldwide Hack attack)

    03/28/2009 10:03:16 PM PDT · by Perdogg · 21 replies · 1,588+ views
    A China-based cyber spy network has hacked into government and private systems in 103 countries, including those of many Indian embassies and the Dalai Lama, an Internet research group said here Saturday. The Information Warfare Monitor (IWM), which carried out an extensive 10-month research on cyber spy activities emanating from China, said the hacked systems include the computers of Indian embassies and offices of the Dalai Lama.
  • China accused of 'cyber espionage'

    11/25/2008 4:08:25 AM PST · by Cindy · 8 replies · 376+ views
    ONE NEWS NOW.com ^ | 11/25/2008 6:00:00 AM | Chad Groening
    China accused of 'cyber espionage' Chad Groening - OneNewsNow - 11/25/2008 6:00:00 AM ARTICLE SNIPPET: "According to an annual report from the U.S.-China Economic and Security Review Commission, the Beijing regime is speeding up its online espionage attacks and has been able to steal "vast amounts" of sensitive data from U.S. computer networks. Targets include the U.S. government, businesses, and defense contractors. The annual report also says China's space programs and satellite imagery are helping Beijing better target U.S. military forces." ARTICLE SNIPPET: "McGuire also believes president-elect Barack Obama needs to recognize that communist China is an enemy. "This is...
  • Are We Selling China The Rope?-(wow cnn no less)

    12/05/2007 2:47:52 AM PST · by Flavius · 6 replies · 270+ views
    cnn ^ | 12/5/2007 | trading center
    National Security: China continues to develop its cyberwarfare capabilities and hacks into the computer systems of foreign governments and corporations. So why are we considering a deal to show them how? The London Times over the weekend reported that Jonathan Evans, the head of MI5, Britain's domestic spy agency, sent a letter last week to 300 British executives and security chiefs at major corporations warning them they were under attack from "Chinese state organizations" over the Internet. These attacks involved Chinese "trojans" or software designed to hack into computer systems and feed back confidential data. It is the latest example...