Free Republic 4th Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $75,627
Woo hoo!! And now less than $12.4k to go!! Thank you all very much!!

Keyword: cyberwar

Brevity: Headers | « Text »
  • Obama held hostage: How Iran’s using the nuke deal as license to go wild

    11/07/2015 4:47:23 PM PST · by E. Pluribus Unum · 16 replies
    New York Post ^ | November 7, 2015 | Post Editorial Board
    President Obama and Secretary of State John Kerry were convinced their one-sided nuclear deal would lead to better relations with Iran, but it’s already doing the reverse.Tehran has taken two more Americans hostage just this month — and followed up with a massive cyberattack on the US government, especially the State Department’s Office of Iranian Affairs.The kicker: Iran is holding the nuke deal hostage — threatening to junk it if Obama tries to punish the country for its fresh outrages.
  • Malaysia arrests man for hacking U.S. security data to supply targets for Islamic State

    10/16/2015 9:07:05 AM PDT · by mojito · 7 replies
    Reuters ^ | 10/16/2015 | Yantoultra Ngui
    Malaysia has arrested a man on charges of hacking into the personal information of more than a thousand U.S. security officials and handing the database to the Islamic State militant group in Syria so it could target the individuals. The 20-year-old from Kosovo, who entered Malaysia in August 2014 to study computer science and forensics at a private institute in the capital, Kuala Lumpur, will be extradited to the United States, police said in a statement on Thursday night. "Early investigation found the suspect communicated with one of the right hand man (leader) of IS terrorist group in Syria to...
  • John McCain: Security leaks coming from highest levels of White House

    06/06/2012 9:14:49 AM PDT · by SeekAndFind · 72 replies
    The Hill ^ | 06/06/2012 | By Meghashyam Mali
    Sen. John McCain (R-Ariz.) on Wednesday blasted the Obama administration over the disclosure of classified intelligence operations, leaks he said came from the highest levels at the White House. This is the most highly classified information and its now been leaked by the administration at the highest levels at the White House and thats not acceptable, McCain said on CBS "This Morning." On Tuesday, McCain said the Senate Armed Services Committee would hold hearings about leaks detailing a U.S. cyberattack against Irans nuclear program and called for a special counsel to investigate the matter. A report last week in The...
  • Obama: GOP a bigger problem than Putin or China

    09/16/2015 11:41:26 AM PDT · by jazusamo · 16 replies
    The Washington Times ^ | September 16, 2015 | Dave Boyer
    Urging business leaders to lobby Republican lawmakers for higher spending, President Obama said Wednesday that partisan gridlock in Washington is a bigger threat to the U.S. than Chinese cyberattacks or Russian military aggression. Our problem is not that Chinas going to out-negotiate us, or that [Russian President Vladimir] Putin is sort of out-strategizing us, Mr. Obama said. Has anybody taken a look at the Russian economy lately? Thats not our problem. Our problems us, typically. We engage in self-inflicted wounds, like this potential government shutdown. Its unnecessary. The president spoke to the Business Roundtable in Washington as the Oct. 1...
  • Valerie Plame on the 'Scary' State of Cybersecurity [and Scott Walker]

    07/24/2015 5:47:59 AM PDT · by Cincinatus' Wife · 22 replies
    Inc. ^ | July 23, 2015 | By Maria Aspan Senior editor, Inc.
    Cyber warfare has gone nuclear. So says Valerie Plame, the former covert CIA agent who spent her intelligence career working against the spread of weapons of mass destruction. Now shes taking on a new task: helping government agencies and companies stem the relentless flood of hacker attacks. Theres a huge impact on national security and intelligence, says Plame, who this spring became an adviser to cybersecurity startup Global Data Sentinel. The new normal is going to be more and more of these hacks, whether its Target or Home Depot or the Office of Personnel Management or Jennifer Lawrences nude photos....
  • Hillary Clintons Server Was In New Jersey This Whole Time. Its Blank Now (& Totally Insecure!)

    08/13/2015 12:29:07 PM PDT · by Crystal Palace East · 41 replies
    Democratic presidential candidate Hillary Clintons mysterious email server has been in a private data center in New Jersey since 2013, that is, until the IT company the former secretary of state hired to maintain the hardware handed the blank device over to the FBI Wednesday. Clintons attorney, David Kendall, informed the Department of State in a letter Wednesday that the company hired to manage and maintain the server, Denver-based Platte River Networks, was turning it over to the Department of Justice. Kendall also told State he handed over three thumb drives that contained Clintons emails. The Washington Post reported the...
  • A Congressman Goes to DEF CON

    08/13/2015 4:10:02 PM PDT · by DUMBGRUNT · 4 replies ^ | 13 aug 2015 | PATRICK TUCKER
    What is Will Hurd, Republican Congressman from Texas, doing here? The best way to defend digital networks is to have an attackers mentality, Hurd told Defense One. Hurd, who spent nearly a decade as an undercover CIA operative in places like Afghanistan, doesnt freak out easily. ... For one thing, he ran a cybersecurity firm for four years. Naturally, hes made cybersecurity a cornerstone of his legislative efforts.
  • Military Eases Thumb Drive, Flash Media Bans

    02/19/2010 4:53:22 PM PST · by SandRat · 7 replies · 257+ views
    WASHINGTON, Feb. 19, 2010 New guidelines from U.S. Strategic Command officials allow servicemembers to use thumb drives and other flash media to store computer data under specific circumstances. Strategic Command officials banned use of thumb drives and flash media in November 2008, after the use of the media infected a number of Defense Department computer systems. Computers users had to turn to alternative means to transfer data from one machine to another. Now, the command has lifted the ban on the devices under carefully controlled circumstances, said Navy Vice Adm. Carl V. Mauney, Stratcoms deputy commander. The command issued...
  • Cyber attacks 'as big a threat to new warships as missiles and torpedoes'

    08/06/2015 6:25:14 AM PDT · by sukhoi-30mki · 5 replies
    The Telegraph ^ | 06 August 2015 | Ben Farmer
    Hackers and cyber attacks pose as great a threat to Britain's hi-tech warships of the future as missiles and torpedoes, the man in charge of building the Navys new frigate has warned. Increasing levels of computer control and automation mean protecting vessels against electronic attack has become a focus of shipbuilding for the Navy. The new Type-26 Global Combat Ship, which is designed to be the workhorse of the Royal Navy when it is built, has been designed to protect its weapons, engines and systems from cyber warfare. Geoff Searle, head of the Type-26 programme at BAE Systems, said: It...
  • EXCLUSIVE: Entire US national security system possibly compromised by year-long cyber-assault

    07/23/2015 9:33:20 AM PDT · by SeekAndFind · 68 replies
    Fox News ^ | 07/23/2015 | By George Russell
    The prolonged hacking into the White House Office of Personnel Management, which put the personal information of at least some 21.5 million past and current federal employees in jeopardy, is only the beginning of the security threat to the Obama Administration and its successors, a number of top-level experts in cybersecurity have told Fox News. The attack has been frequently sourced as coming from China. The experts warned that the entire U.S. national security clearance system could be compromised, that future senior government leaders and advisors could be targeted even before taking office, and hundreds, perhaps thousands, of government officials...
  • Cyber-Security Expert: North Korea Takes Credit for NYSE Attack No Coincidences This Is Major

    07/08/2015 6:24:17 PM PDT · by Nachum · 34 replies
    The Gateway Pundit ^ | 7/8/15 | Jim Hoft
    Cyber-Security expert Greg Keeley said the North Koreans are taking credit for the glitch that took down the New York Stock Exchange today. Keeley said there is no way these several glitches are not connected. And that may very well be possible. For the administration to come out so hard and so fast and say this was not an attack I think is disingenuous This is a major attack and for us to bury our head in the sand is very troubling.
  • Is St. Louis under a cyber attack? Threat map points to China

    07/08/2015 2:01:03 PM PDT · by mojito · 42 replies
    Fox News ^ | 7/8/2015 | Joe Millizter
    Is St. Louis at the center of a cyber attack from China? A company that monitors threats on the internet shows a large amount of traffic headed into the area from China. According to Norsecorps Twitter profile they offer, Live threat intelligence & unmatched visibility into the darkest corners of the Internet. A map on the companys website shows a lot of activity coming from locations in china to IP addresses located mostly in St. Louis, Kirksville and Seattle. The majority of targets listed in the map are located in the US with origins in China.
  • Hackers nabbed data on every federal employee, union claims

    06/11/2015 10:09:38 PM PDT · by dennisw · 15 replies ^ | June 12, 2015
    A major cyberattack on U.S. federal personnel data was far graver than the Obama administration has acknowledged, with hackers obtaining information on every federal employee, the president of a government workers union claimed Thursday. In a letter to the director of the Office of Personnel Management (OPM), J. David Cox, national president of the American Federation of Government Employees (AFGE), said that based on the information provided by the OPM, the hack was much broader than previously thought. Based on the sketchy information OPM has provided, we believe that the Central Personnel Data File was the targeted database, and that...
  • Wow The Federal Cyber Breach Was Not Discovered By U.S. Govt., Was Discovered By Private Company

    06/11/2015 6:25:34 PM PDT · by sheikdetailfeather · 16 replies
    The Conservative Treehouse ^ | 6-11-15 | sundance
    WASHINGTON DC As officials of the Obama administration announced that millions of sensitive records associated with current and past federal employees and contractors had been exposed by a long-running infiltration of the networks and systems of the Office of Personnel Management on June 4, they claimed the breach had been found during a government effort to correct problems with OPMs security. An OPM statement on the attack said that the agency discovered the breach as it had undertaken an aggressive effort to update its cybersecurity posture. And a DHS spokesperson told Ars that interagency partners were helping the OPM...
  • Obamas Response to Data Breach: New Systems and New Infrastructure

    06/08/2015 8:45:16 PM PDT · by Olog-hai · 29 replies
    Cybercast News Service ^ | June 8, 2015 | 11:00 AM EDT | Susan Jones
    Part of the problem is that weve got very old systems, President Obama said on Monday, in a response to a question about the recent hack attack on U.S. government computers. He said making U.S. cyberspace more secure is going to be a big project, requiring new systems and new infrastructure. The intrusion involving the Office of Personnel Management apparently compromised the personal, identifying information of four million current and former federal employees. [] Speaking at the conclusion of the G-7 summit in Germany on Monday, President Obama refused to say that China is responsible for the massive intrusion into...
  • Hack affected every single federal employee, union says

    06/11/2015 7:02:35 PM PDT · by 2ndDivisionVet · 63 replies
    CNET ^ | June 11, 2015 | Laura Hautala
    A hack announced last week affected all current and retired federal employees, and hackers got their hands on much more personal information than previously announced, the American Federation of Government Employees said Thursday.A December breach of government systems containing personal information of millions of federal employees was worse than originally thought. A union of federal workers said Thursday that the attack, announced last week, had stolen confidential information of every single federal employee, past or present -- far more than was previously revealed. The government disputes those claims. It's the latest in a spree of damaging hacks against the government,...
  • Cabbie drove Wheeler to Hotel du Pont (w/video & new info)

    01/25/2011 5:40:14 PM PST · by smoothsailing · 12 replies
    WPVI Channel 6 Action News ^ | 1-25-2011 | David Henry
    Cabbie drove Wheeler to Hotel du Pont David Henry WILMINGTON - January 25, 2011 (WPVI) -- Action News spoke with a cabbie who says he left John Wheeler off on a corner in downtown Wilmington two days before he turned up dead in a landfill. It fills another gap in the mystery surrounding Wheeler's bizarre behavior in the days before he died... He says John Wheeler got into his cab at the Amtrak station around 9:00 the morning of December 29th. It was a cold day and Wheeler was wearing just a sportcoat and an open collared white shirt. He...
  • Cause of death released in Wheeler case (Vietnam vet found in Delaware landfill)

    01/28/2011 1:40:10 PM PST · by smoothsailing · 73 replies
    WPVI Action News ^ | 1-28-2011 | staff report
    Cause of death released in Wheeler case WILMINGTON, Del. - January 28, 2011 (WPVI) -- The cause of death has been released in the case of a former presidential advisor who was found dead in a Delaware landfill. In a news release issued Friday, investigators said that John Wheeler died as a result of blunt force trauma after being assaulted...
  • An Arlington burial for Jack Wheeler (Service today, April 29, 2011)

    04/29/2011 9:29:05 AM PDT · by smoothsailing · 7 replies · 1+ views
    Daily Press ^ | 4-27-2011
    An Arlington burial for Jack Wheeler April 27, 2011The murder of Jack Wheeler remains unsolved, but his funeral on Friday might provide a small bit of solace for his family and friends. Wheeler, a former Hampton resident, will be inurned with full military honors in the Columbarium at Arlington National Cemetery. Wheeler was a 1962 graduate of Hampton High School and a member of the Class of '66 at the U.S. Military Academy at West Point. He served in the Army from 1966 to 1971 and spent time in Vietnam. He went on to serve three GOP presidents in various...
  • Iran Flexes Its Power by Transporting Turkey to the Stone Age

    04/23/2015 6:27:47 AM PDT · by Former Proud Canadian · 38 replies
    Observer ^ | April 22, 2015 | Micah Halpern
    Half of Turkey44 of 81 provinces, 40 million people including those living in Istanbul and Ankara, suffered a massive power outage that lasted a solid twelve hours. It happened on Tuesday, March 31st. It happened because Iran wanted it to happen. The blackout in Turkey was caused by a cyber hack that originated in Iran. This cyber attack was payback, a taste of what Iran has to offer. Everything went down. Computers, airports, air traffic, traffic lights, hospitals, lights, elevators, refrigeration, water and sewage, everything simply stopped. In an instant, Turkey was transported back to the stone ages.
  • Hero CIA officer who led the hunt for Bin Laden and converted to Islam is removed from his post in

    03/26/2015 6:14:09 PM PDT · by null and void · 33 replies ^ | 13:48 EST, 26 March 2015 | Wills Robinson
    The CIA official who led the hunt for Osama Bin Laden is being removed from his post, it has been revealed. The head of the agency's Counterterrorism Center, who also directed drone campaigns which killed thousands, has been in the position for nine years and is described as a 'true hero'.
  • Massive Utah cyberattacks up to 300 million per day may be aimed at NSA facility

    02/07/2015 9:23:30 PM PST · by BenLurkin · 12 replies ^ | First Published Feb 03 2015 10:57AM Last Updated Feb 03 2015 10:56 pm | LEE DAVIDSON
    Five years ago, Utah government computer systems faced 25,000 to 30,000 attempted cyberattacks every day. At the time, Utah Public Safety Commissioner Keith Squires thought that was massive. "But this last year we have had spikes of over 300 million attacks against the state databases" each day: a 10,000-fold increase. Why? Squires says it is probably because Utah is home to the new, secretive National Security Agency computer center, and hackers believe they can somehow get to it through state computer systems. "I really do believe it was all the attention drawn to the NSA facility. In the cyberworld, that's...
  • The Sony Hack Was An Act of War, Not A Crime

    12/19/2014 5:02:07 AM PST · by IBD editorial writer · 19 replies
    Investor's Business Daily ^ | 12/18/2014 | IBD Staff
    Cyberwar: Like a bomb detonating in slow motion, the scale and destructiveness of the Sony hack has only now become fully apparent. Telling Americans to go to the movies doesn't cut it as a government response. At first, it seemed as if Sony was the latest victim of hackers who delight in stealing confidential information and sending it along to WikiLeaks. The hackers called themselves "Guardians of Peace" and claimed, "We want equality. Sony doesn't." Sony initially labeled the event as "an IT matter." For a while, the hack seemed to threaten only the reputations of some Hollywood big shots,...
  • Chinese hack U.S. weather systems, satellite network

    11/12/2014 1:08:46 PM PST · by Kartographer · 50 replies
    Washington Post ^ | 11/12/14 | Mary Pat Flaherty, Jason Samenow and Lisa Rein
    Hackers from China breached the federal weather network recently, forcing cybersecurity teams to seal off data vital to disaster planning, aviation, shipping and scores of other crucial uses, officials said. The intrusion occurred in late September but officials gave no indication that they had a problem until Oct. 20, according to three people familiar with the hack and the subsequent reaction by the National Oceanic and Atmospheric Administration or NOAA, which includes the National Weather Service. Even then, NOAA did not say its systems were compromised.
  • Iran Nuclear Facilities Hacked, Stations Made To Play AC/DC

    08/08/2014 12:30:42 PM PDT · by Ernest_at_the_Beach · 68 replies ^ | August 8, 2014 10:36 PDT | Seth Fitzgerald
    The Stuxnet virus reportedly created by the combined forces of the American and Israeli governments ravaged Iran's nuclear program between 2009 and 2010, destroying thousands of machines and effectively crippling the country's nuclear efforts.But this wasn't enough for the attackers. They wanted to show what real power was like.And so they made the facilities' hijacked work stations play AC/DC."There was also some music playing randomly on several of the workstations during the middle of the night with the volume maxed out," wrote an Iranian scientist in an email. "I believe it was the American band AC-DC Thunderstruck. It was...
  • UK holds cyberwar game in Churchills WWII bunker

    03/14/2014 7:54:42 AM PDT · by Olog-hai · 1 replies
    Associated Press ^ | Mar 14, 2014 10:43 AM EDT | Raphael Satter
    Bent over their computers in a World War II-era bunker beneath Londons streets, dozens of young techies have spent Friday racing to understand why Britains banking network suddenly seems to have gone offline. The exerciseit is just an exercisecomes complete with sirens and mock newscasts. Its meant to recruit the next generation of tech talent, and is also meant to help highlight the threat many here see as inevitable: A major cyberattack on the nations critical infrastructure.
  • Cyberwar hits Ukraine

    03/07/2014 12:35:05 PM PST · by Former Fetus · 3 replies
    CNN ^ | 3/7/2014 | Peter Bergen and Tim Maurer
    Ukrainian security officials are complaining that unknown attackers are interfering with the mobile phone services of members of Ukraine's parliament, making difficult political decisions about what to do about Russia's incursion last week into Crimea that much harder. The head of Ukraine's security service said on Tuesday, "I confirm that an IP-telephonic attack is underway on mobile phones of members of Ukrainian parliament for the second day in row." This is reminiscent of the Distributed Denial of Service (DDoS) attacks on Georgia that preceded Russia's invasion of the country in August 2008. The attacks shut down several websites of Georgia's...
  • Iran's Cyber Warfare Commander Found Dead

    10/02/2013 7:16:03 PM PDT · by Eleutheria5 · 54 replies
    Arutz Sheva ^ | 3/10/13 | Elad Benari
    The head of Irans cyber warfare program has been shot dead, triggering further accusations that outside powers are carrying out targeted assassinations of key figures in the countrys security apparatus, reports the Telegraph. Mojtaba Ahmadi, who served as commander of Irans Cyber War Headquarters, was found dead in a wooded area near the town of Karaj, northwest of the capital Tehran. Five Iranian nuclear scientists and the head of the countrys ballistic missile program have been killed since 2007. The regime has accused Israels external intelligence agency, the Mossad, of carrying out these assassinations. Ahmadi was last seen leaving his...
  • Job Title Key to Inner Access Held by Snowden

    07/01/2013 12:18:24 PM PDT · by Ernest_at_the_Beach · 16 replies
    NY Times ^ | June 30, 2013 | By SCOTT SHANE and DAVID E. SANGER
    WASHINGTON Intelligence officials refer to Edward J. Snowdens job as a National Security Agency contractor as systems administrator a bland name for the specialists who keep the computers humming. But his last job before leaking classified documents about N.S.A. surveillance, he told the news organization The Guardian, was actually infrastructure analyst. It is a title that officials have carefully avoided mentioning, perhaps for fear of inviting questions about the agencys aggressive tactics: an infrastructure analyst at the N.S.A., like a burglar casing an apartment building, looks for new ways to break into Internet and telephone traffic around the...
  • Has U.S. started an Internet war?

    06/18/2013 6:28:34 AM PDT · by ShadowAce · 9 replies
    CNN ^ | 18 June 2013 | Bruce Schneier
    Today, the United States is conducting offensive cyberwar actions around the world. More than passively eavesdropping, we're penetrating and damaging foreign networks for both espionage and to ready them for attack. We're creating custom-designed Internet weapons, pre-targeted and ready to be "fired" against some piece of another country's electronic infrastructure on a moment's notice.This is much worse than what we're accusing China of doing to us. We're pursuing policies that are both expensive and destabilizing and aren't making the Internet any safer. We're reacting from fear, and causing other countries to counter-react from fear. We're ignoring resilience in favor of...
  • Obama BANS U.S. government from buying Chinese-made computer technology over cyber-attack fears

    03/28/2013 3:13:29 PM PDT · by ColdOne · 10 replies ^ | 3/28/13 | Damien Gayle
    President Obama has hit back at Beijing's alleged hacking campaign against U.S. businesses by banning government from buying Chinese computer technology. The new rule, which was buried in a spending bill signed this week, comes after a string of hacks traced back to China hit some of America's most important companies. It will only be in effect until the end of the fiscal year on September 30,
  • South Korean Banks, Media Companies Targeted by Destructive Malware

    03/21/2013 1:52:08 PM PDT · by Ernest_at_the_Beach · 16 replies
    Mcafee Labs ^ | Wednesday, March 20, 2013 at 5:18pm | by Jorge Arias and Guilherme Venere
    A massive computer shutdown of two South Korean banks and media companies occurred Wednesday via an Internet malware attack. The malware wiped out the master boot records on the hard drives of the infected computers, overwriting the MBR with either one of these strings: PRINCPESPR!NCPESHASTATI. Figure 1: Snapshot of MBR after infection.The attack also overwrote random parts of the file system with the same strings, rendering several files unrecoverable. So even if the MBR is recovered, the files on disk will be compromised too.After that, the system is forced to reboot via the following command: shutdown -r -t 0 That...
  • Weapons in Cyber Attack on South Korea Killed Targeted PCs

    03/21/2013 1:41:14 PM PDT · by Ernest_at_the_Beach · 9 replies ^ | March 21, 2013 at 12:52 pm PT | Arik Hesseldahl
    The cyber attack that rocked South Korean TV stations and banks yesterday apparently wiped out the hard drives of the affected computers, according to an analysis of the incident by McAfee. The involved malware infections destroyed the master boot record of the hard drives of the machines attacked. The MBR on a hard drive contains crucial information on how file systems on the drive are organized. The malware involved overwrote data in the MBR with the following string of characters: PRINCPES, PR!NCPES, HASTATI. It also overwrote random parts of the file system with the same characters.After that the system was...
  • DoD panel recommends special bomber-armed cyber deterrent force

    03/07/2013 7:47:41 AM PST · by Seizethecarp · 5 replies
    Foreign Policy ^ | March 6, 2013 | John Reed
    The Defense Science Board's new report on protecting the Pentagon's computer networks calls for the development of a special force armed with its own bombers, cruise missiles, and cyber weapons to respond to a devastating cyber attack. Kind of like a mini, conventionally-armed Strategic Command for cyber deterrence. We've heard Pentagon leaders acknowledge that they are building up their offensive cyber capabilities to deter destructive cyber attacks that could harm thousands or even millions of Americans. However, the new report says that the U.S. must go further to "ensure the President has options beyond a nuclear-only response to a catastrophic...
  • Dot Commie: China's Military Behind U.S. Cyberattacks

    02/23/2013 7:18:03 AM PST · by raptor22 · 16 replies
    Investor's Business Daily ^ | Feberuary 23, 2012 | IBD EDITORIALS
    Cyberwar: A cybersecurity firm reports a secretive Chinese military unit is behind many recent "hack attacks" into U.S. computers, stealing trade and military secrets and developing a potentially crippling new weapon. In a 2009 editorial we noted that units of China's armed forces, whom we dubbed its "Cybertooth Tigers" were developing capabilities to penetrate and potentially disrupt U.S. computer systems as part of the People's Liberation Army's focus on what is known as "asymmetrical" warfare, specifically cyber-warfare. At least as far back as the 2008 edition of the Pentagon's annual report to Congress entitled "Military Power of the People's Republic...
  • Chinese government condones, assists cyber-war against the U.S. Military

    02/23/2013 8:02:56 AM PST · by darkwing104 · 14 replies
    Coach is Right ^ | February 23rd, 2013 | Jim Emerson
    Diànnǎo Hēikè “For to win one hundred victories in one hundred battles is not the acme of skill. To subdue the enemy without fighting is the acme of skill.” –Sun Tzu Sun Tzu would love cyber warfare. The master of the Chinese board game of Go enjoyed the idea of defeating his enemy without a battle. China is conducting cyber war on the United States. The People’s Liberation Army (PLA) have a group of highly trained hackers (Hēikè) whose sole purpose is to attack American companies in order to steal information to enhance the Chinese Military. This hacking group is...
  • Social Media, Terrorism Connect Too Well

    12/05/2012 12:51:07 AM PST · by Cindy · 28 replies ^ | Published 1:16p.m., Saturday, December 1, 2012 | Janine Zacharia
    SNIPPET: "Social media is no longer simply a fun way to share updates on the harmless idiosyncrasies of our lives. It can undermine national security, and there ought to be a more robust discussion between the Bay Area technology world and Washington on what to do aboutit. Cyber-terrorism, especially the potential for electronic tampering with U.S. industrial or military installations, is a paramount national security threat that Washington is working to forestall. We're all working to protect our accounts from hackers. But the cyber-threat getting far less public attention involves the social media networks we use every day and the...
  • LulzSec: the members and the enemies

    06/25/2011 6:35:43 AM PDT · by Bad~Rodeo · 10 replies
    Guardian ^ | Friday 24 June 2011 | Josh Halliday
    While Sabu and Topiary are firmly on the inside, the likes of The Jester and LulzSec Exposed are most certainly notInside Sabu Apparent founder and leader of LulzSec, he is a long-time hacktivist associated with senior Anonymous members. Decides who can join the group and who should be targeted. Attempts by rivals to uncover details about his real-life identity suggest he is a 30-year-old IT consultant skilled in the Python programming language who has lived in New York. The timing of some his tweets tweeting "goodnight all" at 0700 BST, or 0200 New York time implies he is...
  • LulzSec 'Leader' Turns on Fellow Hacktivists: Feds

    03/06/2012 9:02:03 PM PST · by Olog-hai · 7 replies
    ABC News via Yahoo News ^ | March 6, 2012 | RICHARD ESPOSITO, AARON KATERSKY and PIERRE THOMAS
    Six members of the suspected computer hacking groups affiliated with Anonymous were chargedincluding the suspected ring leader, who directed the entire operation from a Manhattan apartment complexafter it was revealed one of the group's most high profile members has been working with federal authorities for months. Hector Monsegur, a 28-year-old American believed to use the name "Sabu" on the internet, was arrested by federal agents last year and has been cooperating with law enforcement ever since, officials said. He pleaded guilty last August, a plea unsealed in federal court in Lower Manhattan today. At least four of the five other...
  • Anonymous Claims They Hacked GOP On Election Day

    11/18/2012 3:52:41 PM PST · by 2ndDivisionVet · 63 replies
    Breitbart TV ^ | November 18, 2012
    Mitt Romney's Republican Get Out the Vote system (ORCA) had a meltdown on Election Day leaving some campaign workers wandering around with nothing to do. Now Anonymous has released a video claiming responsibility for jamming ORCA...
  • Mammoth mystery algorithm on Nasdaq: who and why?

    10/12/2012 10:31:54 PM PDT · by bruinbirdman · 15 replies
    France 24 ^ | 10/12/2012 | Sbastian SEIBT
    A single algorithm which placed and then cancelled orders on the Nasdaq accounted for 4% of all quoted traffic in the US with no clear goal. An investor gives FRANCE 24 his insight into the mystery which has concerned market watchers. A single mammoth mystery algorithm has set alarm bells ringing for market regulators and players, and underlined the markets vulnerability to technology and the woeful lack of regulation on algorithms. A single algorithm last week placed and cancelled orders on the Nasdaq accounting for 4% of all quoted traffic in the US. Not only this, it also accounted for...
  • Panetta Warns of Dire Threat of Cyberattack on U.S.

    10/12/2012 2:35:17 PM PDT · by EBH · 29 replies
    New York Times ^ | October 11, 2012 | ELISABETH BUMILLER and THOM SHANKER
    Defense Secretary Leon E. Panetta warned Thursday that the United States was facing the possibility of a cyber-Pearl Harbor and was increasingly vulnerable to foreign computer hackers who could dismantle the nations power grid, transportation system, financial networks and government... ...Defense officials insisted that Mr. Panettas words were not hyperbole, and that he was responding to a recent wave of cyberattacks on large American financial institutions. He also cited an attack in August on the state oil company Saudi Aramco, which infected and made useless more than 30,000 computers. But Pentagon officials acknowledged that Mr. Panetta was also pushing for...
  • Anti-Jihad Ads Considered Constitutional

    10/01/2012 2:02:13 PM PDT · by Cindy · 67 replies - Top Opinion Story ^ | September 24, 2012 | Liana Whitehead
    SNIPPET: "New York City is the center of a public uproar as Internet blogger Pamela Gellar rises with an anti-jihad ad campaign." SNIPPET: "Gellar and her group are protesting the Jihad, which in definition is the religious duty of Muslims. According to the Dictionary of Islam, jihad is defined as A religious war with those who are unbelievers in the mission of Muhammad . . . enjoined especially for the purpose of advancing Islam and repelling evil from Muslims. The literal meaning of jihad, according to the British Broadcasting Network, is struggle or effort, and it means much more than...
  • Hezbollah Raises Latin American Profile

    09/18/2012 9:27:36 PM PDT · by neverdem · 43 replies
    Commentary ^ | 09.15.2012 | Michael Rubin
    @mrubin1971Two news stories from recent weeks, if true, should raise a red flag in the United States that Iran is preparing to use Hezbollah to strike at U.S. interests in Latin America, if not in the United States itself.First, this story from the Lebanese news portal Naharnet and sourced in part to Israeli radio. The Naharnet story was taken down shortly after it appeared: Hezbollah is using a training base established by Iran in northern Nicaragua near the border with Honduras, the Israeli radio reported on Thursday [September 6]. “The area is cordoned off and there are around 30 members...
  • September 2001 - September 2012

    09/01/2012 1:56:13 AM PDT · by Cindy · 46 replies ^ | September 1, 2012 | n/a
    Brief thoughts/quotes from the last 11 years. "Looking away, not caring, or hoping for the best are not viable options in fighting terrorism (in general) and the global jihad (specifically). Terrorism must be fought head on 24/7 and preventing terrorism is far better than just reacting to one terror-related event after another." -Cindy (July 1, 2011) ~ "WHAT DID I LEARN from the terrorist attack on September 11, 2001? OPINION: I have learned that more Americans love America than the lame-stream media will ever let on. I have learned that America's military is the finest in the world. I have...
  • Dirty Deeds: Iranian nuclear program hit by 'AC/DC virus'?

    07/24/2012 12:17:53 PM PDT · by GSWarrior · 50 replies ^ | 7/24/12
    Iranian nuclear facilities have reportedly been attacked by a music virus, turning on lab PCs at night and blasting AC/DCs Thunderstruck. Mikko Hypponen, Chief Researcher at Finnish digital security firm F-secure, publicly released a letter he received from an unnamed Iranian scientist. The researcher, who claimed to work for the Atomic Energy Organization of Iran (AEOI), said that another virus has struck the Natanz uranium enrichment facility in central Iran and a secret underground research facility at Fordo, southwest of Tehran. The letters author reported that the virus shut down equipment (made by Germanys Siemens Corporation) and automated systems at...
  • Jihadis Online: A Few Thoughts

    07/24/2012 3:24:56 AM PDT · by Cindy · 45 replies
    Society For Internet Research ^ | JULY 5, 2011 | S.O.F.I.R.
    SNIPPET: "I. When considering the matter of jihadis online, remember that most of what we think we know is based on analyses of the comments made by an handful of vocal activists. The vast majority of jihadis online, be they on forums or social networking sites[i], say nothing. Skillful translations and insightful analyses by definition tell us little about this potentially lethal yet silent majority."
  • Squealing Versus Killing

    06/14/2012 4:03:26 AM PDT · by Kaslin · 6 replies ^ | June 14, 2012 | Judge Andrew Napolitano
    If you are still listening to those in the political class who are falling over each other to condemn leaks from the government to the media, you'd think the leaks had revealed private information in which the public has no legitimate interest, or perhaps a planned secret government mission to rescue innocents. Neither is the case. Republicans and Democrats in Congress, most of them from the House and Senate intelligence committees, have blasted the White House for leaking to The New York Times and others the existence of President Obama's secret kill list and his cyber-warfare against Iran. According to...
  • "Flame" virus a creation of the U.S. Government?

    06/01/2012 11:18:38 AM PDT · by mamelukesabre · 3 replies
    Check the comments for links to various stories that popped up on the internet this morning.
  • Alerts say major cyber attack aimed at gas pipeline industry

    05/06/2012 3:17:23 AM PDT · by Uncle Ike · 18 replies
    The Christian Science Monitor on ^ | updated 5/6/2012 1:13:23 AM ET | By Mark Clayton
    By Mark Clayton Staff writer Christian Science Monitor updated 5/6/2012 1:13:23 AM ET 2012-05-06T05:13:23 A major cyber attack is currently under way aimed squarely at computer networks belonging to US natural gas pipeline companies, according to alerts issued to the industry by the US Department of Homeland Security. At least three confidential "amber" alerts the second most sensitive next to "red" were issued by DHS beginning March 29, all warning of a "gas pipeline sector cyber intrusion campaign" against multiple pipeline companies. But the wave of cyber attacks, which apparently began four months ago and may also...