Free Republic 2nd Quarter Fundraising Target: $85,000 Receipts & Pledges to-date: $19,036
22%  
Woo hoo!! And the first 22% is in!! Thank you all very much!!

Keyword: cyberwar

Brevity: Headers | « Text »
  • UK holds cyberwar game in Churchill’s WWII bunker

    03/14/2014 7:54:42 AM PDT · by Olog-hai · 1 replies
    Associated Press ^ | Mar 14, 2014 10:43 AM EDT | Raphael Satter
    Bent over their computers in a World War II-era bunker beneath London’s streets, dozens of young techies have spent Friday racing to understand why Britain’s banking network suddenly seems to have gone offline. The exercise—it is just an exercise—comes complete with sirens and mock newscasts. It’s meant to recruit the next generation of tech talent, and is also meant to help highlight the threat many here see as inevitable: A major cyberattack on the nation’s critical infrastructure. …
  • Cyberwar hits Ukraine

    03/07/2014 12:35:05 PM PST · by Former Fetus · 3 replies
    CNN ^ | 3/7/2014 | Peter Bergen and Tim Maurer
    Ukrainian security officials are complaining that unknown attackers are interfering with the mobile phone services of members of Ukraine's parliament, making difficult political decisions about what to do about Russia's incursion last week into Crimea that much harder. The head of Ukraine's security service said on Tuesday, "I confirm that an IP-telephonic attack is underway on mobile phones of members of Ukrainian parliament for the second day in row." This is reminiscent of the Distributed Denial of Service (DDoS) attacks on Georgia that preceded Russia's invasion of the country in August 2008. The attacks shut down several websites of Georgia's...
  • Iran's Cyber Warfare Commander Found Dead

    10/02/2013 7:16:03 PM PDT · by Eleutheria5 · 54 replies
    Arutz Sheva ^ | 3/10/13 | Elad Benari
    The head of Iran’s cyber warfare program has been shot dead, triggering further accusations that outside powers are carrying out targeted assassinations of key figures in the country’s security apparatus, reports the Telegraph. Mojtaba Ahmadi, who served as commander of Iran’s Cyber War Headquarters, was found dead in a wooded area near the town of Karaj, northwest of the capital Tehran. Five Iranian nuclear scientists and the head of the country’s ballistic missile program have been killed since 2007. The regime has accused Israel’s external intelligence agency, the Mossad, of carrying out these assassinations. Ahmadi was last seen leaving his...
  • Job Title Key to Inner Access Held by Snowden

    07/01/2013 12:18:24 PM PDT · by Ernest_at_the_Beach · 16 replies
    NY Times ^ | June 30, 2013 | By SCOTT SHANE and DAVID E. SANGER
    WASHINGTON — Intelligence officials refer to Edward J. Snowden’s job as a National Security Agency contractor as “systems administrator” — a bland name for the specialists who keep the computers humming. But his last job before leaking classified documents about N.S.A. surveillance, he told the news organization The Guardian, was actually “infrastructure analyst.” It is a title that officials have carefully avoided mentioning, perhaps for fear of inviting questions about the agency’s aggressive tactics: an infrastructure analyst at the N.S.A., like a burglar casing an apartment building, looks for new ways to break into Internet and telephone traffic around the...
  • Has U.S. started an Internet war?

    06/18/2013 6:28:34 AM PDT · by ShadowAce · 9 replies
    CNN ^ | 18 June 2013 | Bruce Schneier
    Today, the United States is conducting offensive cyberwar actions around the world. More than passively eavesdropping, we're penetrating and damaging foreign networks for both espionage and to ready them for attack. We're creating custom-designed Internet weapons, pre-targeted and ready to be "fired" against some piece of another country's electronic infrastructure on a moment's notice.This is much worse than what we're accusing China of doing to us. We're pursuing policies that are both expensive and destabilizing and aren't making the Internet any safer. We're reacting from fear, and causing other countries to counter-react from fear. We're ignoring resilience in favor of...
  • Obama BANS U.S. government from buying Chinese-made computer technology over cyber-attack fears

    03/28/2013 3:13:29 PM PDT · by ColdOne · 10 replies
    dailymail.co.uk ^ | 3/28/13 | Damien Gayle
    President Obama has hit back at Beijing's alleged hacking campaign against U.S. businesses by banning government from buying Chinese computer technology. The new rule, which was buried in a spending bill signed this week, comes after a string of hacks traced back to China hit some of America's most important companies. It will only be in effect until the end of the fiscal year on September 30,
  • South Korean Banks, Media Companies Targeted by Destructive Malware

    03/21/2013 1:52:08 PM PDT · by Ernest_at_the_Beach · 16 replies
    Mcafee Labs ^ | Wednesday, March 20, 2013 at 5:18pm | by Jorge Arias and Guilherme Venere
    A massive computer shutdown of two South Korean banks and media companies occurred Wednesday via an Internet malware attack. The malware wiped out the master boot records on the hard drives of the infected computers, overwriting the MBR with either one of these strings: PRINCPESPR!NCPESHASTATI. Figure 1: Snapshot of MBR after infection.The attack also overwrote random parts of the file system with the same strings, rendering several files unrecoverable. So even if the MBR is recovered, the files on disk will be compromised too.After that, the system is forced to reboot via the following command: shutdown -r -t 0 That...
  • Weapons in Cyber Attack on South Korea Killed Targeted PCs

    03/21/2013 1:41:14 PM PDT · by Ernest_at_the_Beach · 9 replies
    allthingsd.com ^ | March 21, 2013 at 12:52 pm PT | Arik Hesseldahl
    The cyber attack that rocked South Korean TV stations and banks yesterday apparently wiped out the hard drives of the affected computers, according to an analysis of the incident by McAfee. The involved malware infections destroyed the master boot record of the hard drives of the machines attacked. The MBR on a hard drive contains crucial information on how file systems on the drive are organized. The malware involved overwrote data in the MBR with the following string of characters: “PRINCPES, PR!NCPES, HASTATI.” It also overwrote random parts of the file system with the same characters.After that the system was...
  • DoD panel recommends special bomber-armed cyber deterrent force

    03/07/2013 7:47:41 AM PST · by Seizethecarp · 5 replies
    Foreign Policy ^ | March 6, 2013 | John Reed
    The Defense Science Board's new report on protecting the Pentagon's computer networks calls for the development of a special force armed with its own bombers, cruise missiles, and cyber weapons to respond to a devastating cyber attack. Kind of like a mini, conventionally-armed Strategic Command for cyber deterrence. We've heard Pentagon leaders acknowledge that they are building up their offensive cyber capabilities to deter destructive cyber attacks that could harm thousands or even millions of Americans. However, the new report says that the U.S. must go further to "ensure the President has options beyond a nuclear-only response to a catastrophic...
  • Dot Commie: China's Military Behind U.S. Cyberattacks

    02/23/2013 7:18:03 AM PST · by raptor22 · 16 replies
    Investor's Business Daily ^ | Feberuary 23, 2012 | IBD EDITORIALS
    Cyberwar: A cybersecurity firm reports a secretive Chinese military unit is behind many recent "hack attacks" into U.S. computers, stealing trade and military secrets and developing a potentially crippling new weapon. In a 2009 editorial we noted that units of China's armed forces, whom we dubbed its "Cybertooth Tigers" were developing capabilities to penetrate and potentially disrupt U.S. computer systems as part of the People's Liberation Army's focus on what is known as "asymmetrical" warfare, specifically cyber-warfare. At least as far back as the 2008 edition of the Pentagon's annual report to Congress entitled "Military Power of the People's Republic...
  • Chinese government condones, assists cyber-war against the U.S. Military

    02/23/2013 8:02:56 AM PST · by darkwing104 · 14 replies
    Coach is Right ^ | February 23rd, 2013 | Jim Emerson
    Diànnǎo Hēikè “For to win one hundred victories in one hundred battles is not the acme of skill. To subdue the enemy without fighting is the acme of skill.” –Sun Tzu Sun Tzu would love cyber warfare. The master of the Chinese board game of Go enjoyed the idea of defeating his enemy without a battle. China is conducting cyber war on the United States. The People’s Liberation Army (PLA) have a group of highly trained hackers (Hēikè) whose sole purpose is to attack American companies in order to steal information to enhance the Chinese Military. This hacking group is...
  • Social Media, Terrorism Connect Too Well

    12/05/2012 12:51:07 AM PST · by Cindy · 28 replies
    SFGATE.com ^ | Published 1:16 p.m., Saturday, December 1, 2012 | Janine Zacharia
    SNIPPET: "Social media is no longer simply a fun way to share updates on the harmless idiosyncrasies of our lives. It can undermine national security, and there ought to be a more robust discussion between the Bay Area technology world and Washington on what to do about it. Cyber-terrorism, especially the potential for electronic tampering with U.S. industrial or military installations, is a paramount national security threat that Washington is working to forestall. We're all working to protect our accounts from hackers. But the cyber-threat getting far less public attention involves the social media networks we use every day and the...
  • LulzSec: the members and the enemies

    06/25/2011 6:35:43 AM PDT · by Bad~Rodeo · 10 replies
    Guardian ^ | Friday 24 June 2011 | Josh Halliday
    While Sabu and Topiary are firmly on the inside, the likes of The Jester and LulzSec Exposed are most certainly notInside Sabu Apparent founder and leader of LulzSec, he is a long-time hacktivist associated with senior Anonymous members. Decides who can join the group and who should be targeted. Attempts by rivals to uncover details about his real-life identity suggest he is a 30-year-old IT consultant skilled in the Python programming language who has lived in New York. The timing of some his tweets – tweeting "goodnight all" at 0700 BST, or 0200 New York time – implies he is...
  • LulzSec 'Leader' Turns on Fellow Hacktivists: Feds

    03/06/2012 9:02:03 PM PST · by Olog-hai · 7 replies
    ABC News via Yahoo News ^ | March 6, 2012 | RICHARD ESPOSITO, AARON KATERSKY and PIERRE THOMAS
    Six members of the suspected computer hacking groups affiliated with Anonymous were charged—including the suspected ring leader, who directed the entire operation from a Manhattan apartment complex—after it was revealed one of the group's most high profile members has been working with federal authorities for months. Hector Monsegur, a 28-year-old American believed to use the name "Sabu" on the internet, was arrested by federal agents last year and has been cooperating with law enforcement ever since, officials said. He pleaded guilty last August, a plea unsealed in federal court in Lower Manhattan today. At least four of the five other...
  • Anonymous Claims They Hacked GOP On Election Day

    11/18/2012 3:52:41 PM PST · by 2ndDivisionVet · 63 replies
    Breitbart TV ^ | November 18, 2012
    Mitt Romney's Republican Get Out the Vote system (ORCA) had a meltdown on Election Day leaving some campaign workers wandering around with nothing to do. Now Anonymous has released a video claiming responsibility for jamming ORCA...
  • Mammoth mystery algorithm on Nasdaq: who and why?

    10/12/2012 10:31:54 PM PDT · by bruinbirdman · 15 replies
    France 24 ^ | 10/12/2012 | Sébastian SEIBT
    A single algorithm which placed and then cancelled orders on the Nasdaq accounted for 4% of all quoted traffic in the US with no clear goal. An investor gives FRANCE 24 his insight into the mystery which has concerned market watchers. A single mammoth mystery algorithm has set alarm bells ringing for market regulators and players, and underlined the market’s vulnerability to technology and the woeful lack of regulation on algorithms. A single algorithm last week placed and cancelled orders on the Nasdaq accounting for 4% of all quoted traffic in the US. Not only this, it also accounted for...
  • Panetta Warns of Dire Threat of Cyberattack on U.S.

    10/12/2012 2:35:17 PM PDT · by EBH · 29 replies
    New York Times ^ | October 11, 2012 | ELISABETH BUMILLER and THOM SHANKER
    Defense Secretary Leon E. Panetta warned Thursday that the United States was facing the possibility of a “cyber-Pearl Harbor” and was increasingly vulnerable to foreign computer hackers who could dismantle the nation’s power grid, transportation system, financial networks and government... ...Defense officials insisted that Mr. Panetta’s words were not hyperbole, and that he was responding to a recent wave of cyberattacks on large American financial institutions. He also cited an attack in August on the state oil company Saudi Aramco, which infected and made useless more than 30,000 computers. But Pentagon officials acknowledged that Mr. Panetta was also pushing for...
  • Anti-Jihad Ads Considered Constitutional

    10/01/2012 2:02:13 PM PDT · by Cindy · 67 replies
    COLLEGIAN.csufresno.edu - Top Opinion Story ^ | September 24, 2012 | Liana Whitehead
    SNIPPET: "New York City is the center of a public uproar as Internet blogger Pamela Gellar rises with an “anti-jihad” ad campaign." SNIPPET: "Gellar and her group are protesting the Jihad, which in definition is the religious duty of Muslims. According to the Dictionary of Islam, jihad is defined as “A religious war with those who are unbelievers in the mission of Muhammad . . . enjoined especially for the purpose of advancing Islam and repelling evil from Muslims.” The literal meaning of jihad, according to the British Broadcasting Network, “is struggle or effort, and it means much more than...
  • Hezbollah Raises Latin American Profile

    09/18/2012 9:27:36 PM PDT · by neverdem · 43 replies
    Commentary ^ | 09.15.2012 | Michael Rubin
    @mrubin1971Two news stories from recent weeks, if true, should raise a red flag in the United States that Iran is preparing to use Hezbollah to strike at U.S. interests in Latin America, if not in the United States itself.First, this story from the Lebanese news portal Naharnet and sourced in part to Israeli radio. The Naharnet story was taken down shortly after it appeared: Hezbollah is using a training base established by Iran in northern Nicaragua near the border with Honduras, the Israeli radio reported on Thursday [September 6]. “The area is cordoned off and there are around 30 members...
  • September 2001 - September 2012

    09/01/2012 1:56:13 AM PDT · by Cindy · 46 replies
    TRUTHUSA.com ^ | September 1, 2012 | n/a
    Brief thoughts/quotes from the last 11 years. "Looking away, not caring, or hoping for the best are not viable options in fighting terrorism (in general) and the global jihad (specifically). Terrorism must be fought head on 24/7 and preventing terrorism is far better than just reacting to one terror-related event after another." -Cindy (July 1, 2011) ~ "WHAT DID I LEARN from the terrorist attack on September 11, 2001? OPINION: I have learned that more Americans love America than the lame-stream media will ever let on. I have learned that America's military is the finest in the world. I have...
  • Dirty Deeds: Iranian nuclear program hit by 'AC/DC virus'?

    07/24/2012 12:17:53 PM PDT · by GSWarrior · 50 replies
    RT.com ^ | 7/24/12
    Iranian nuclear facilities have reportedly been attacked by a “music” virus, turning on lab PCs at night and blasting AC/DC’s “Thunderstruck.” Mikko Hypponen, Chief Researcher at Finnish digital security firm F-secure, publicly released a letter he received from an unnamed Iranian scientist. The researcher, who claimed to work for the Atomic Energy Organization of Iran (AEOI), said that another virus has struck the Natanz uranium enrichment facility in central Iran and a secret underground research facility at Fordo, southwest of Tehran. The letter’s author reported that the virus shut down equipment (made by Germany’s Siemens Corporation) and automated systems at...
  • Jihadis Online: A Few Thoughts

    07/24/2012 3:24:56 AM PDT · by Cindy · 45 replies
    Society For Internet Research ^ | JULY 5, 2011 | S.O.F.I.R.
    SNIPPET: "I. When considering the matter of jihadis online, remember that most of what we think we know is based on analyses of the comments made by an handful of vocal activists. The vast majority of jihadis online, be they on forums or social networking sites[i], say nothing. Skillful translations and insightful analyses by definition tell us little about this potentially lethal yet silent majority."
  • Squealing Versus Killing

    06/14/2012 4:03:26 AM PDT · by Kaslin · 6 replies
    Townhall.com ^ | June 14, 2012 | Judge Andrew Napolitano
    If you are still listening to those in the political class who are falling over each other to condemn leaks from the government to the media, you'd think the leaks had revealed private information in which the public has no legitimate interest, or perhaps a planned secret government mission to rescue innocents. Neither is the case. Republicans and Democrats in Congress, most of them from the House and Senate intelligence committees, have blasted the White House for leaking to The New York Times and others the existence of President Obama's secret kill list and his cyber-warfare against Iran. According to...
  • "Flame" virus a creation of the U.S. Government?

    06/01/2012 11:18:38 AM PDT · by mamelukesabre · 3 replies
    Check the comments for links to various stories that popped up on the internet this morning.
  • Alerts say major cyber attack aimed at gas pipeline industry

    05/06/2012 3:17:23 AM PDT · by Uncle Ike · 18 replies
    The Christian Science Monitor on MSNBC.com ^ | updated 5/6/2012 1:13:23 AM ET | By Mark Clayton
    By Mark Clayton Staff writer Christian Science Monitor updated 5/6/2012 1:13:23 AM ET 2012-05-06T05:13:23 A major cyber attack is currently under way aimed squarely at computer networks belonging to US natural gas pipeline companies, according to alerts issued to the industry by the US Department of Homeland Security. At least three confidential "amber" alerts – the second most sensitive next to "red" – were issued by DHS beginning March 29, all warning of a "gas pipeline sector cyber intrusion campaign" against multiple pipeline companies. But the wave of cyber attacks, which apparently began four months ago – and may also...
  • Al-Qaida's online forums go dark  

    04/02/2012 4:31:33 PM PDT · by Cindy · 47 replies
    UPI ^ | Published: April 2, 2012 at 2:37 PM | n/a
    SNIPPET: "WASHINGTON, April 2 (UPI) -- A blackout of al-Qaida's main Web sites is in its 11th day, and officials think the forums may have been brought down in a cyberattack. While no one has claimed credit for disabling the sites..." SNIPPET: "The loss of information typically confuses and frustrates the readers of the Web sites. "It leaves the rank-and-file to guess which messages and which messengers are genuine al-Qaida, and provides undercover operators with new opportunities to disrupt the movement," said A. Aaron Weisburd, senior fellow at the Homeland Security Policy Institute."
  • Internet is a powerful catalyst for jihad: Dutch security service

    02/16/2012 12:31:58 AM PST · by Cindy · 25 replies
    DUTCH NEWS.nl ^ | February 14, 2012 | n/a
    The internet has become a powerful catalyst for international violent jihad, according to a new report from the Dutch security service AIVD.
  • The Jihad Will Be YouTubed

    01/01/2012 3:26:29 PM PST · by Cindy · 25 replies
    FOREIGN POLICY - The AFPAK Channel ^ | December 15, 2011 | by Raffaello Pantucci
    The Jihad Will Be YouTubed by Raffaello Pantucci December 15, 2011 FOREIGN POLICY - The AFPAK Channel SNIPPET: "While clearly the technology to make such videos is something that is universal, it does seem as though it is aspirant jihadists in the West who find it easiest to use. There was no evidence that Gul was being directed by foreign terrorist organizations to produce his material, and his case shows the continued existence of young Westerners producing radical material on their own. It may indeed be the case that the virtual armies have yet to fully emerge as active warriors...
  • U.S. Expels Venezuelan Consul in Miami

    01/08/2012 4:01:57 PM PST · by Eleutheria5 · 31 replies
    Arutz Sheva ^ | 9/1/12
    The United States has ordered the expulsion of Venezuela’s consul general in Miami, AFP reported on Sunday. The expulsion comes amid reports linking the diplomat to an alleged Iranian plot to target sensitive U.S. facilities with cyber attacks. According to the report, the Venezuelan embassy in Washington was notified on Friday that Livia Acosta Noguera, the consul general in Miami, had been declared persona non grata and had until Tuesday to leave the country...
  • Israeli-Turkish Cyberwar Begins

    09/06/2011 11:22:40 AM PDT · by Nachum · 16 replies
    INN ^ | 9/6/11 | Gavriel Queenann
    Amid the current diplomatic impasse between Ankara and Jerusalem, Turkish hackers hijacked some 350 Israeli websites on Sunday evening, launching a Domain Name System (DNS) attack on dozens of other websites as well. Israeli IT analysts said Tuesday the DNS hijacking is likely to be, in fact, a "test-run" ahead of a major attack on Israeli domains. Visitors to some of the sites were diverted to a page declaring it was “World Hackers Day." At least seven high-profile websites outside Israel were also hijacked, including those of The Telegraph, Acer, National Geographic, UPS and Vodafone. Hackers calling themselves the "TurkGuvenligi...
  • A Cyber-Pearl Harbor On Horizon?

    07/15/2011 5:28:21 PM PDT · by Kaslin · 24 replies
    IBD Editorials ^ | July 15, 2011 | Staff
    Security: The Pentagon has disclosed perhaps the largest theft of sensitive data by an unnamed foreign government. The threat to our electronic infrastructure is real, growing and as dangerous as a North Korean missile. In outlining America's cyberwarfare strategy last Thursday at the National Defense University, Deputy Secretary of Defense William Lynn disclosed that 24,000 sensitive files containing Pentagon data at a defense company were accessed in a cyberattack in March, likely by a foreign government. He didn't disclose the identity of that government, but in a bit of an understatement he acknowledged, "We have a pretty good idea." So...
  • Pentagon reveals 24,000 files stolen in cyber-attack

    07/14/2011 5:19:36 PM PDT · by Pan_Yan · 32 replies · 1+ views
    Telegraph (UK) ^ | 12:19AM BST 15 Jul 2011 | Nick Allen
    The Pentagon has disclosed that it suffered one of its largest ever losses of sensitive data in March when 24,000 files were stolen in a cyber-attack by a foreign government. William Lynn, the US deputy secretary of defence, said the data was taken from the computers of a corporate defence contractor. He said the US government had a "pretty good idea" who was responsible but did not elaborate. Many cyber-attacks in the past have been blamed on China or Russia, and one of the Pentagon's fears is that eventually a terrorist group will acquire the ability to steal data. Mr...
  • Anonymous Declares War On The City Of Orlando

    06/28/2011 6:02:58 AM PDT · by Bad~Rodeo · 31 replies
    TechCrunch ^ | June 28,2011 | Erick Schonfeld
    The hacktivist group Anonymous may be setting its sights on the city of Orlando, Florida next, if an anonymous press release which has landed in our inbox is to be believed (see bellow). The group is threatening to take down a different city-related website every day, starting with Orlando Florida Guide, which doesn’t even appear to be owned by the city of Orlando (it is registered to an organization called Utopia, administered by a man named Steven Ridenour). So any random website extolling the virtues of Orlando could be targeted. The DDOS attacks are justified in the press release...
  • UPDATE 4-IMF becomes latest known target of major cyber attack

    06/11/2011 9:02:43 PM PDT · by Pan_Yan · 10 replies
    Reuters ^ | Sat Jun 11, 2011 10:49pm EDT | Jim Wolf and Jim Finkle
    WASHINGTON, June 11 (Reuters) - The International Monetary Fund, the intergovernmental group that oversees the global financial system and brings together 187 member nations, has become the latest known target of a significant cyber attack on its computer systems. A cybersecruty expert who has worked for both the Washington-headquartered IMF and the World Bank, its sister institution, said the intruders' goal had been to install software that would give a nation state a "digital insider presence" on the IMF network. Such a presence could yield a trove of non-public economic data used by the Fund to promote exchange rate stability,...
  • Lockheed Martin hit by cyber incident, U.S. says

    05/28/2011 7:00:40 PM PDT · by SeekAndFind · 16 replies
    Reuters ^ | 05/28/2011
    Lockheed Martin Corp, the world's biggest aerospace company and the Pentagon's No. 1 supplier by sales, has been hit by an unspecified cyber incident, the government said on Saturday. The Department of Homeland Security said it and the Defense Department had offered to help gauge the scope of a "cyber incident impacting LMCO," as the maker of fighter jets, ships and other major weapons systems is known. The U.S. government also has offered to help analyze "available data in order to provide recommendations to mitigate further risk," Chris Ortman, a Homeland Security official, said in an e-mailed reply to a...
  • Secrets surface about North Korea's cyberwar college

    05/12/2011 8:47:43 PM PDT · by TigerLikesRooster · 2 replies
    MSNBC ^ | 05/11/11 | Matt Liebowitz
    Secrets surface about North Korea's cyberwar college Super-covert military school graduates 120 cyberwarriors per year By Matt Liebowitz The inner workings of a secret North Korean cyberwar college in existence for the past 25 years are finally coming to the surface. According to the South Korean newspaper the DailyNK, Mirim College, in a mountainous region of North Korea's capital, Pyongyang, was opened in 1986 by North Korean dictator Kim Jong-il, and in the 25 years since has made it its mission to train about 120 students per year in electronic warfare. The DailyNK spoke to a North Korean defector, Cheong,...
  • Hackers could attack planes

    04/03/2011 2:24:58 PM PDT · by MamaDearest · 18 replies
    adelaide now ^ | April 4, 2011 | Alex Dickinson
    MALICIOUS hacking software that could force a passenger jet to nosedive has been developed. Security representatives at the Asia-Pacific Aviation Security conference, which included representatives from Qantas and Virgin Airlines, said that cyber attacks were the second biggest risk to the aviation industry after natural disasters. Ty Miller, of Australian security firm Pure Hacking, said the risk was no longer "something out of a movie" but had become more likely with the dawn of the Stuxnet virus. An unknown attacker last year used the software to sabotage one of Iran's uranium enrichment plants. "The stereotypical Die Hard 2 airport attack...
  • Hacker group vows 'cyberwar' on US government, business [ The result will be Internet Regulations]

    03/08/2011 7:25:03 PM PST · by NoLibZone · 23 replies
    MSNBC ^ | March 8 2011 | Michael Isikoff
    Actions to retaliate for treatment of WikiLeaks, Manning, spokesman for Anonymous says. DALLAS — A leader of the computer hackers group known as Anonymous is threatening new attacks on major U.S. corporations and government officials as part of at an escalating “cyberwar” against the citadels of American power. “It’s a guerilla cyberwar — that’s what I call it,” said Barrett Brown, 29, who calls himself a senior strategist and “propagandist” for Anonymous. He added: “It’s sort of an unconventional, asymmetrical act of warfare that we’ve involved in. And we didn’t necessarily start it. I mean, this fire has been burning.”...
  • Ready For CyberWar? You Can Buy Illegal Access to U.S. Military Websites for $500.

    01/22/2011 7:01:38 PM PST · by lbryce · 4 replies
    Krebs On Security ^ | Jnuary 22, 2011 | Staff
    Amid all of the media and public fascination with threats like Stuxnet and weighty terms such as “cyberwar,” it’s easy to overlook the more humdrum and persistent security threats, such as Web site vulnerabilities. But none of these distractions should excuse U.S. military leaders from making sure their Web sites aren’t trivially hackable by script kiddies. Security vendor Imperva today blogged about a hacker who claims to have access to and control over several top dot-gov, dot-mil and dot-edu Web sites. I’ve seen some of the back-end evidence of his hacks, so it doesn’t seem like he’s making this up....
  • Video Released In Murder Mystery Of Delaware War Vet (Wheeler)

    01/05/2011 11:42:38 AM PST · by Smokeyblue · 33 replies
    CBS philadelphia ^ | Jan. 5, 2011 | Robin Rieger; Todd Quinones; Steve Beck
    Eyewitness News has obtained exclusive surveillance video of a former presidential aide that was taken two days before his body was found dumped in a Delaware landfill. The body of John Wheeler III was found in the Cherry Island landfill in Wilmington on New Year’s Eve. The video shows a man that appears to be Wheeler entering the lobby of a parking garage at 5th and King Streets in Wilmington on December 29. An employee of the parking garage said Wheeler look disheveled and said he was looking for his car. The employee also said his right shoe, which appeared...
  • Body of murdered cyberwar expert found in landfill (Military man dumped into three-ring whodunit)

    01/05/2011 8:12:45 PM PST · by smoothsailing · 36 replies
    The Register ^ | 1-5-2010 | Dan Goodin
    Body of murdered cyberwar expert found in landfill Military man dumped into three-ring whodunit Dan Goodin January 5, 2010 The body of a decorated US Army officer was found dumped in a Delaware landfill on New Years Eve day, a few days after he expressed concern that the nation wasn't adequately prepared for cyber warfare, according to news reports following the bizarre whodunit. Events surrounding the murder of John P. Wheeler III, who most recently worked part-time for defense contractor Mitre Corporation on cyber defense topics, read like a Tom Clancy novel. The 66-year-old worked for three Republican administrations, was...
  • Free Republic DDOS attack?

    11/28/2010 11:22:49 AM PST · by PreciousLiberty · 29 replies
    Me ^ | 11/28/2010 | Me
    Is FR under a denial of service attack? I've had a lot of server errors trying to read and/or post an article today...
  • Mystery Surrounds Cyber Missile That Crippled Iran's Nuclear Weapons Ambitions

    11/26/2010 11:17:09 AM PST · by Ron C. · 112 replies · 2+ views
    Fox News ^ | 11/26/10 | Ed Barnes
    In the 20th century, this would have been a job for James Bond. The mission: Infiltrate the highly advanced, securely guarded enemy headquarters where scientists in the clutches of an evil master are secretly building a weapon that can destroy the world. Then render that weapon harmless and escape undetected. But in the 21st century, Bond doesn't get the call. Instead, the job is handled by a suave and very sophisticated secret computer worm, a jumble of code called Stuxnet, which in the last year has not only crippled Iran's nuclear program but has caused a major rethinking of computer...
  • China's Internet Hijacking Uncovered

    11/17/2010 12:38:43 PM PST · by James C. Bennett · 9 replies
    Gizmodo ^ | 17 November, 2010 | Gizmodo
     Cybercrime experts have found proof that China hijacked the Internet for 18 minutes last April. China absorbed 15% of the traffic from US military and civilian networks, as well as from other Western countries—a massive chunk. Nobody knows why.We know how it happened, however. On April 8, China Telecom's routers sent messages declaring that their network channels were the fastest available at that point. Since the traffic routing is based on trust between the world's telecommunication providers, other Internet routers redirected their traffic through China's network.Security expert Dmitri Alperovitch—VP of threat research at McAfee—says that this happens "accidentally" a few...
  • Declare War on Wikileaks

    10/25/2010 7:44:21 PM PDT · by Abakumov · 21 replies
    The Washington Times ^ | October 25, 2010 | Editorial
    The Wikileaks organization has morphed from a relatively harmless aid to government whistleblowers into a threat to U.S. national security. It should be treated accordingly.... There are a variety of means whereby technicians could render inoperable the sites distributing the classified information. Wikileaks could respond by using alternate sites, but those could be targeted as soon as they came online. Wikileaks has a small staff and limited resources. Relentless attacks on the servers and sites dispensing this classified information would have a debilitating effect on the leakers' morale and help widen the fissures that already have appeared in the group....
  • Iran acknowledges espionage at nuclear facilities

    10/09/2010 10:05:07 AM PDT · by Pride_of_the_Bluegrass · 2 replies · 2+ views
    AP via Yahoo News ^ | ALI AKBAR DAREINI
    TEHRAN, Iran – Iran acknowledged Saturday that some personnel at the country's nuclear facilities were lured by promises of money to pass secrets to the West but insisted increased security and worker privileges have put a stop to the spying. The stunning admission by Vice President Ali Akbar Salehi provides the clearest government confirmation that Iran has been fighting espionage at its nuclear facilities. In recent weeks, Iran has announced the arrest of several nuclear spies and battled a computer worm that it says is part of a covert Western plot to derail its nuclear program. And in July, a...
  • Stuxnet: Fact vs. theory

    10/09/2010 6:12:24 AM PDT · by Pride_of_the_Bluegrass · 33 replies · 1+ views
    CNET News ^ | Elinor Mills
    The Stuxnet worm has taken the computer security world by storm, inspiring talk of a top secret, government-sponsored cyberwar, and of a software program laden with obscure biblical references that call to mind not computer code, but "The Da Vinci Code." Stuxnet, which first made headlines in July, (CNET FAQ here) is believed to be the first known malware that targets the controls at industrial facilities such as power plants. At the time of its discovery, the assumption was that espionage lay behind the effort, but subsequent analysis by Symantec uncovered the ability of the malware to control plant operations...
  • How Stuxnet is Scaring the Tech World Half to Death

    10/03/2010 8:09:37 AM PDT · by GVnana · 82 replies
    The Weekly Standard ^ | 9/30/2010 | Jonathan V. Last
    The computer worm Stuxnet broke out of the tech underworld and into the mass media this week. It’s an amazing story: Stuxnet has infected roughly 45,000 computers. Sixty percent of these machines happen to be in Iran. Which is odd. What is odder still is that Stuxnet is designed specifically to attack a computer system using software from Siemens which controls industrial facilities such as factories, oil refineries, and oh, by the way, nuclear power plants. As you might imagine, Stuxnet raises big, interesting geo-strategic questions. Did a state design it as an attack on the Iranian nuclear program? Was...
  • Russian experts flee Iran, escape dragnet for cyber worm smugglers

    10/03/2010 8:34:55 PM PDT · by Pride_of_the_Bluegrass · 35 replies
    debkafile's intelligence sources report from Iran that dozens of Russian nuclear engineers, technicians and contractors are hurriedly departing Iran for home since local intelligence authorities began rounding up their compatriots as suspects of planting the Stuxnet malworm into their nuclear program. Among them are the Russian personnel who built Iran's first nuclear reactor at Bushehr which Tehran admits has been damaged by the virus. One of the Russian nuclear staffers, questioned in Moscow Sunday, Oct. 3 by Western sources, confirmed that many of his Russian colleagues had decided to leave with their families after team members were detained for questioning...
  • Stuxnet raises virus stakes

    10/02/2010 8:19:45 PM PDT · by Pride_of_the_Bluegrass · 19 replies
    Asia Times Online ^ | Martin J Young
    Industrial control systems made by German company Siemens, which are widely used in Iran, were the targets of the worm, indicating that its creators had advanced knowledge of these types of systems far beyond the scope of a most information technology experts. The code is so specialized that it targets only two models of Siemens programmable logic controllers, the S7 300 and S7 400, and will execute only if it finds very specific parameters within the machine. These controllers are usually associated with the management of oil pipeline systems, electrical power grids, and nuclear power plants