Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $25,797
31%  
Woo hoo!! And we're now over 31%!! Thank you all very much!! God bless.

Keyword: cyberwar

Brevity: Headers | « Text »
  • Cyberwar hits Ukraine

    03/07/2014 12:35:05 PM PST · by Former Fetus · 3 replies
    CNN ^ | 3/7/2014 | Peter Bergen and Tim Maurer
    Ukrainian security officials are complaining that unknown attackers are interfering with the mobile phone services of members of Ukraine's parliament, making difficult political decisions about what to do about Russia's incursion last week into Crimea that much harder. The head of Ukraine's security service said on Tuesday, "I confirm that an IP-telephonic attack is underway on mobile phones of members of Ukrainian parliament for the second day in row." This is reminiscent of the Distributed Denial of Service (DDoS) attacks on Georgia that preceded Russia's invasion of the country in August 2008. The attacks shut down several websites of Georgia's...
  • Iran's Cyber Warfare Commander Found Dead

    10/02/2013 7:16:03 PM PDT · by Eleutheria5 · 54 replies
    Arutz Sheva ^ | 3/10/13 | Elad Benari
    The head of Iran’s cyber warfare program has been shot dead, triggering further accusations that outside powers are carrying out targeted assassinations of key figures in the country’s security apparatus, reports the Telegraph. Mojtaba Ahmadi, who served as commander of Iran’s Cyber War Headquarters, was found dead in a wooded area near the town of Karaj, northwest of the capital Tehran. Five Iranian nuclear scientists and the head of the country’s ballistic missile program have been killed since 2007. The regime has accused Israel’s external intelligence agency, the Mossad, of carrying out these assassinations. Ahmadi was last seen leaving his...
  • Job Title Key to Inner Access Held by Snowden

    07/01/2013 12:18:24 PM PDT · by Ernest_at_the_Beach · 16 replies
    NY Times ^ | June 30, 2013 | By SCOTT SHANE and DAVID E. SANGER
    WASHINGTON — Intelligence officials refer to Edward J. Snowden’s job as a National Security Agency contractor as “systems administrator” — a bland name for the specialists who keep the computers humming. But his last job before leaking classified documents about N.S.A. surveillance, he told the news organization The Guardian, was actually “infrastructure analyst.” It is a title that officials have carefully avoided mentioning, perhaps for fear of inviting questions about the agency’s aggressive tactics: an infrastructure analyst at the N.S.A., like a burglar casing an apartment building, looks for new ways to break into Internet and telephone traffic around the...
  • Has U.S. started an Internet war?

    06/18/2013 6:28:34 AM PDT · by ShadowAce · 9 replies
    CNN ^ | 18 June 2013 | Bruce Schneier
    Today, the United States is conducting offensive cyberwar actions around the world. More than passively eavesdropping, we're penetrating and damaging foreign networks for both espionage and to ready them for attack. We're creating custom-designed Internet weapons, pre-targeted and ready to be "fired" against some piece of another country's electronic infrastructure on a moment's notice.This is much worse than what we're accusing China of doing to us. We're pursuing policies that are both expensive and destabilizing and aren't making the Internet any safer. We're reacting from fear, and causing other countries to counter-react from fear. We're ignoring resilience in favor of...
  • Obama BANS U.S. government from buying Chinese-made computer technology over cyber-attack fears

    03/28/2013 3:13:29 PM PDT · by ColdOne · 10 replies
    dailymail.co.uk ^ | 3/28/13 | Damien Gayle
    President Obama has hit back at Beijing's alleged hacking campaign against U.S. businesses by banning government from buying Chinese computer technology. The new rule, which was buried in a spending bill signed this week, comes after a string of hacks traced back to China hit some of America's most important companies. It will only be in effect until the end of the fiscal year on September 30,
  • South Korean Banks, Media Companies Targeted by Destructive Malware

    03/21/2013 1:52:08 PM PDT · by Ernest_at_the_Beach · 16 replies
    Mcafee Labs ^ | Wednesday, March 20, 2013 at 5:18pm | by Jorge Arias and Guilherme Venere
    A massive computer shutdown of two South Korean banks and media companies occurred Wednesday via an Internet malware attack. The malware wiped out the master boot records on the hard drives of the infected computers, overwriting the MBR with either one of these strings: PRINCPESPR!NCPESHASTATI. Figure 1: Snapshot of MBR after infection.The attack also overwrote random parts of the file system with the same strings, rendering several files unrecoverable. So even if the MBR is recovered, the files on disk will be compromised too.After that, the system is forced to reboot via the following command: shutdown -r -t 0 That...
  • Weapons in Cyber Attack on South Korea Killed Targeted PCs

    03/21/2013 1:41:14 PM PDT · by Ernest_at_the_Beach · 9 replies
    allthingsd.com ^ | March 21, 2013 at 12:52 pm PT | Arik Hesseldahl
    The cyber attack that rocked South Korean TV stations and banks yesterday apparently wiped out the hard drives of the affected computers, according to an analysis of the incident by McAfee. The involved malware infections destroyed the master boot record of the hard drives of the machines attacked. The MBR on a hard drive contains crucial information on how file systems on the drive are organized. The malware involved overwrote data in the MBR with the following string of characters: “PRINCPES, PR!NCPES, HASTATI.” It also overwrote random parts of the file system with the same characters.After that the system was...
  • DoD panel recommends special bomber-armed cyber deterrent force

    03/07/2013 7:47:41 AM PST · by Seizethecarp · 5 replies
    Foreign Policy ^ | March 6, 2013 | John Reed
    The Defense Science Board's new report on protecting the Pentagon's computer networks calls for the development of a special force armed with its own bombers, cruise missiles, and cyber weapons to respond to a devastating cyber attack. Kind of like a mini, conventionally-armed Strategic Command for cyber deterrence. We've heard Pentagon leaders acknowledge that they are building up their offensive cyber capabilities to deter destructive cyber attacks that could harm thousands or even millions of Americans. However, the new report says that the U.S. must go further to "ensure the President has options beyond a nuclear-only response to a catastrophic...
  • Dot Commie: China's Military Behind U.S. Cyberattacks

    02/23/2013 7:18:03 AM PST · by raptor22 · 16 replies
    Investor's Business Daily ^ | Feberuary 23, 2012 | IBD EDITORIALS
    Cyberwar: A cybersecurity firm reports a secretive Chinese military unit is behind many recent "hack attacks" into U.S. computers, stealing trade and military secrets and developing a potentially crippling new weapon. In a 2009 editorial we noted that units of China's armed forces, whom we dubbed its "Cybertooth Tigers" were developing capabilities to penetrate and potentially disrupt U.S. computer systems as part of the People's Liberation Army's focus on what is known as "asymmetrical" warfare, specifically cyber-warfare. At least as far back as the 2008 edition of the Pentagon's annual report to Congress entitled "Military Power of the People's Republic...
  • Chinese government condones, assists cyber-war against the U.S. Military

    02/23/2013 8:02:56 AM PST · by darkwing104 · 14 replies
    Coach is Right ^ | February 23rd, 2013 | Jim Emerson
    Diànnǎo Hēikè “For to win one hundred victories in one hundred battles is not the acme of skill. To subdue the enemy without fighting is the acme of skill.” –Sun Tzu Sun Tzu would love cyber warfare. The master of the Chinese board game of Go enjoyed the idea of defeating his enemy without a battle. China is conducting cyber war on the United States. The People’s Liberation Army (PLA) have a group of highly trained hackers (Hēikè) whose sole purpose is to attack American companies in order to steal information to enhance the Chinese Military. This hacking group is...
  • Social Media, Terrorism Connect Too Well

    12/05/2012 12:51:07 AM PST · by Cindy · 28 replies
    SFGATE.com ^ | Published 1:16 p.m., Saturday, December 1, 2012 | Janine Zacharia
    SNIPPET: "Social media is no longer simply a fun way to share updates on the harmless idiosyncrasies of our lives. It can undermine national security, and there ought to be a more robust discussion between the Bay Area technology world and Washington on what to do about it. Cyber-terrorism, especially the potential for electronic tampering with U.S. industrial or military installations, is a paramount national security threat that Washington is working to forestall. We're all working to protect our accounts from hackers. But the cyber-threat getting far less public attention involves the social media networks we use every day and the...
  • LulzSec: the members and the enemies

    06/25/2011 6:35:43 AM PDT · by Bad~Rodeo · 10 replies
    Guardian ^ | Friday 24 June 2011 | Josh Halliday
    While Sabu and Topiary are firmly on the inside, the likes of The Jester and LulzSec Exposed are most certainly notInside Sabu Apparent founder and leader of LulzSec, he is a long-time hacktivist associated with senior Anonymous members. Decides who can join the group and who should be targeted. Attempts by rivals to uncover details about his real-life identity suggest he is a 30-year-old IT consultant skilled in the Python programming language who has lived in New York. The timing of some his tweets – tweeting "goodnight all" at 0700 BST, or 0200 New York time – implies he is...
  • LulzSec 'Leader' Turns on Fellow Hacktivists: Feds

    03/06/2012 9:02:03 PM PST · by Olog-hai · 7 replies
    ABC News via Yahoo News ^ | March 6, 2012 | RICHARD ESPOSITO, AARON KATERSKY and PIERRE THOMAS
    Six members of the suspected computer hacking groups affiliated with Anonymous were charged—including the suspected ring leader, who directed the entire operation from a Manhattan apartment complex—after it was revealed one of the group's most high profile members has been working with federal authorities for months. Hector Monsegur, a 28-year-old American believed to use the name "Sabu" on the internet, was arrested by federal agents last year and has been cooperating with law enforcement ever since, officials said. He pleaded guilty last August, a plea unsealed in federal court in Lower Manhattan today. At least four of the five other...
  • Anonymous Claims They Hacked GOP On Election Day

    11/18/2012 3:52:41 PM PST · by 2ndDivisionVet · 63 replies
    Breitbart TV ^ | November 18, 2012
    Mitt Romney's Republican Get Out the Vote system (ORCA) had a meltdown on Election Day leaving some campaign workers wandering around with nothing to do. Now Anonymous has released a video claiming responsibility for jamming ORCA...
  • Mammoth mystery algorithm on Nasdaq: who and why?

    10/12/2012 10:31:54 PM PDT · by bruinbirdman · 15 replies
    France 24 ^ | 10/12/2012 | Sébastian SEIBT
    A single algorithm which placed and then cancelled orders on the Nasdaq accounted for 4% of all quoted traffic in the US with no clear goal. An investor gives FRANCE 24 his insight into the mystery which has concerned market watchers. A single mammoth mystery algorithm has set alarm bells ringing for market regulators and players, and underlined the market’s vulnerability to technology and the woeful lack of regulation on algorithms. A single algorithm last week placed and cancelled orders on the Nasdaq accounting for 4% of all quoted traffic in the US. Not only this, it also accounted for...
  • Panetta Warns of Dire Threat of Cyberattack on U.S.

    10/12/2012 2:35:17 PM PDT · by EBH · 29 replies
    New York Times ^ | October 11, 2012 | ELISABETH BUMILLER and THOM SHANKER
    Defense Secretary Leon E. Panetta warned Thursday that the United States was facing the possibility of a “cyber-Pearl Harbor” and was increasingly vulnerable to foreign computer hackers who could dismantle the nation’s power grid, transportation system, financial networks and government... ...Defense officials insisted that Mr. Panetta’s words were not hyperbole, and that he was responding to a recent wave of cyberattacks on large American financial institutions. He also cited an attack in August on the state oil company Saudi Aramco, which infected and made useless more than 30,000 computers. But Pentagon officials acknowledged that Mr. Panetta was also pushing for...
  • Anti-Jihad Ads Considered Constitutional

    10/01/2012 2:02:13 PM PDT · by Cindy · 67 replies
    COLLEGIAN.csufresno.edu - Top Opinion Story ^ | September 24, 2012 | Liana Whitehead
    SNIPPET: "New York City is the center of a public uproar as Internet blogger Pamela Gellar rises with an “anti-jihad” ad campaign." SNIPPET: "Gellar and her group are protesting the Jihad, which in definition is the religious duty of Muslims. According to the Dictionary of Islam, jihad is defined as “A religious war with those who are unbelievers in the mission of Muhammad . . . enjoined especially for the purpose of advancing Islam and repelling evil from Muslims.” The literal meaning of jihad, according to the British Broadcasting Network, “is struggle or effort, and it means much more than...
  • Hezbollah Raises Latin American Profile

    09/18/2012 9:27:36 PM PDT · by neverdem · 43 replies
    Commentary ^ | 09.15.2012 | Michael Rubin
    @mrubin1971Two news stories from recent weeks, if true, should raise a red flag in the United States that Iran is preparing to use Hezbollah to strike at U.S. interests in Latin America, if not in the United States itself.First, this story from the Lebanese news portal Naharnet and sourced in part to Israeli radio. The Naharnet story was taken down shortly after it appeared: Hezbollah is using a training base established by Iran in northern Nicaragua near the border with Honduras, the Israeli radio reported on Thursday [September 6]. “The area is cordoned off and there are around 30 members...
  • September 2001 - September 2012

    09/01/2012 1:56:13 AM PDT · by Cindy · 46 replies
    TRUTHUSA.com ^ | September 1, 2012 | n/a
    Brief thoughts/quotes from the last 11 years. "Looking away, not caring, or hoping for the best are not viable options in fighting terrorism (in general) and the global jihad (specifically). Terrorism must be fought head on 24/7 and preventing terrorism is far better than just reacting to one terror-related event after another." -Cindy (July 1, 2011) ~ "WHAT DID I LEARN from the terrorist attack on September 11, 2001? OPINION: I have learned that more Americans love America than the lame-stream media will ever let on. I have learned that America's military is the finest in the world. I have...
  • Dirty Deeds: Iranian nuclear program hit by 'AC/DC virus'?

    07/24/2012 12:17:53 PM PDT · by GSWarrior · 50 replies
    RT.com ^ | 7/24/12
    Iranian nuclear facilities have reportedly been attacked by a “music” virus, turning on lab PCs at night and blasting AC/DC’s “Thunderstruck.” Mikko Hypponen, Chief Researcher at Finnish digital security firm F-secure, publicly released a letter he received from an unnamed Iranian scientist. The researcher, who claimed to work for the Atomic Energy Organization of Iran (AEOI), said that another virus has struck the Natanz uranium enrichment facility in central Iran and a secret underground research facility at Fordo, southwest of Tehran. The letter’s author reported that the virus shut down equipment (made by Germany’s Siemens Corporation) and automated systems at...