HOME/ABOUT  Prayer  SCOTUS  ProLife  BangList  Aliens  StatesRights  ConventionOfStates  WOT  HomosexualAgenda  GlobalWarming  Corruption  Taxes  Congress  Fraud  MediaBias  GovtAbuse  Tyranny  Obama  ObamaCare  Elections  Polls  Debates  Trump  Carson  Cruz  Bush  OPSEC  Benghazi  InfoSec  BigBrother  IRS  Scandals  TalkRadio  TeaParty  FreeperBookClub  HTMLSandbox  FReeperEd  FReepathon  CopyrightList  Copyright/DMCA Notice 

Closing in on the yellow! Let's get 'er done! Thank you very much for your loyal support, Jim

Or by mail to: Free Republic, LLC - PO Box 9771 - Fresno, CA 93794
Free Republic 4th Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $78,014
Woo hoo!! And now over 88%!! Less than $10k to go!! Thank you all very much!!

Keyword: cyberwarfare

Brevity: Headers | « Text »
  • Report: FBI Escalates 'Full Blown Investigation' Into Hillary's Unsecure Email Server

    11/10/2015 2:42:08 PM PST · by Kaslin · 34 replies
    Townhall.com ^ | November 10, 2015 | Guy Benson
    Hillary Clinton's top Democratic "rival" may believe that people are sick of hearing about her "damn emails," but that pronouncement -- since walked back, as its issuer fades in the polls -- evidently does not apply to the Federal Bureau of Investigation. Politico reports that the bureau's probe into Clinton's improper, unsecure email scheme has been ramping up, not petering out: Even as Hillary Clinton tries to put questions about her private email server behind her, the FBI has stepped up inquiries into the security of the former Secretary of State's home-made email system, and how aides communicated over email,...
  • Obama held hostage: How Iran’s using the nuke deal as license to go wild

    11/07/2015 4:47:23 PM PST · by E. Pluribus Unum · 16 replies
    New York Post ^ | November 7, 2015 | Post Editorial Board
    President Obama and Secretary of State John Kerry were convinced their one-sided nuclear deal would lead to better relations with Iran, but it’s already doing the reverse.Tehran has taken two more Americans hostage just this month — and followed up with a massive cyberattack on the US government, especially the State Department’s Office of Iranian Affairs.The kicker: Iran is holding the nuke deal hostage — threatening to junk it if Obama tries to punish the country for its fresh outrages.
  • Iran’s Military Launches Increased Cyber Attacks on Obama Administration Officials

    11/05/2015 9:32:02 AM PST · by lbryce · 14 replies
    Washington Beacon ^ | Morgan Chalfant
    Iran’s Revolutionary Guards Corps has in recent weeks launched increased cyber attacks on Obama administration officials, hacking into their email and social media accounts. U.S. officials believe that the hacks are related to the recent arrest of an Iranian-American businessman in Tehran. The Islamic Revolutionary Guard Corps, has routinely conducted cyberwarfare against American government agencies for years. But the U.S. officials said there has been a surge in such attacks coinciding with the arrest last month of Siamak Namazi, an energy industry executive and business consultant who has pushed for stronger U.S.-Iranian economic and diplomatic ties. Obama administration personnel are...
  • John McCain: Security leaks coming from highest levels of White House

    06/06/2012 9:14:49 AM PDT · by SeekAndFind · 72 replies
    The Hill ^ | 06/06/2012 | By Meghashyam Mali
    Sen. John McCain (R-Ariz.) on Wednesday blasted the Obama administration over the disclosure of classified intelligence operations, leaks he said came from the highest levels at the White House. This is the most highly classified information and its now been leaked by the administration at the highest levels at the White House and thats not acceptable, McCain said on CBS "This Morning." On Tuesday, McCain said the Senate Armed Services Committee would hold hearings about leaks detailing a U.S. cyberattack against Irans nuclear program and called for a special counsel to investigate the matter. A report last week in The...
  • Witnesses: (Former presidential advisor)John Wheeler Appeared Disoriented (before death)

    01/05/2011 6:06:52 AM PST · by Dr. Scarpetta · 223 replies
    Police in Delaware are slowly piecing together the details surrounding the death of former presidential advisor John P. "Jack" Wheeler III. It now seems Wheeler spent at least two days wandering the streets of Wilmington disoriented. Police say Wheeler traveled from Washington, D.C., where he worked, to Wilmington Tuesday on an AMTRAK train. He was last seen alive at 3:30 p.m. Thursday near the Hotel duPont parking garage at 10th and Orange streets. Iman Goldsborough, the parking lot attendant, encountered a man she believes was Wheeler on Wednesday night near the intersection where he was last officially seen Thursday. Goldsborough...
  • US Intelligence Chief Warns of Armageddon Cyberstrike

    09/11/2015 5:56:19 PM PDT · by Olog-hai · 40 replies
    INN ^ | 9/11/2015, 10:19 AM | (Arutz Sheva Staff)
    US National Intelligence Director James Clapper on Thursday warned that America must be ready for a large, Armageddon-scale cyber attack, in remarks made at an annual conference of members of the US intelligence community in Washington DC. Cyber threats to US national and economic security are increasing in frequency, scale, sophistication and the severity of impact, Clapper warned. Although we must be prepared for a large, Armageddon-scale strike that would debilitate the entire US infrastructure, its not our belief that thats the most likely scenario. [] In a sign of the rising concern over the trend of cyber warfare in...
  • Walker calls on Obama to cancel Chinese state visit

    08/24/2015 10:55:24 PM PDT · by Cincinatus' Wife · 44 replies
    The Hill ^ | August 24, 2015 | Katie Bo Williams
    Wisconsin Gov. Scott Walker, a GOP presidential contender, is calling on President Obama to cancel the upcoming state visit by Chinese President Xi Jinping. Americans are struggling to cope with the fall in today's markets driven in part by China's slowing economy and the fact that they actively manipulate their economy," Walker said in a statement. Rather than honoring Chinese President Xi Jinping with an official state visit next month, President Obama should focus on holding China accountable over its increasing attempts to undermine U.S. interests." His statement came on a turbulent day for markets after Chinese stocks tumbled, setting...
  • Valerie Plame on the 'Scary' State of Cybersecurity [and Scott Walker]

    07/24/2015 5:47:59 AM PDT · by Cincinatus' Wife · 22 replies
    Inc. ^ | July 23, 2015 | By Maria Aspan Senior editor, Inc.
    Cyber warfare has gone nuclear. So says Valerie Plame, the former covert CIA agent who spent her intelligence career working against the spread of weapons of mass destruction. Now shes taking on a new task: helping government agencies and companies stem the relentless flood of hacker attacks. Theres a huge impact on national security and intelligence, says Plame, who this spring became an adviser to cybersecurity startup Global Data Sentinel. The new normal is going to be more and more of these hacks, whether its Target or Home Depot or the Office of Personnel Management or Jennifer Lawrences nude photos....
  • Hillary Clintons Server Was In New Jersey This Whole Time. Its Blank Now (& Totally Insecure!)

    08/13/2015 12:29:07 PM PDT · by Crystal Palace East · 41 replies
    Democratic presidential candidate Hillary Clintons mysterious email server has been in a private data center in New Jersey since 2013, that is, until the IT company the former secretary of state hired to maintain the hardware handed the blank device over to the FBI Wednesday. Clintons attorney, David Kendall, informed the Department of State in a letter Wednesday that the company hired to manage and maintain the server, Denver-based Platte River Networks, was turning it over to the Department of Justice. Kendall also told State he handed over three thumb drives that contained Clintons emails. The Washington Post reported the...
  • A Congressman Goes to DEF CON

    08/13/2015 4:10:02 PM PDT · by DUMBGRUNT · 4 replies
    defenseone.com ^ | 13 aug 2015 | PATRICK TUCKER
    What is Will Hurd, Republican Congressman from Texas, doing here? The best way to defend digital networks is to have an attackers mentality, Hurd told Defense One. Hurd, who spent nearly a decade as an undercover CIA operative in places like Afghanistan, doesnt freak out easily. ... For one thing, he ran a cybersecurity firm for four years. Naturally, hes made cybersecurity a cornerstone of his legislative efforts.
  • Cyber-Security Expert: North Korea Takes Credit for NYSE Attack No Coincidences This Is Major

    07/08/2015 6:24:17 PM PDT · by Nachum · 34 replies
    The Gateway Pundit ^ | 7/8/15 | Jim Hoft
    Cyber-Security expert Greg Keeley said the North Koreans are taking credit for the glitch that took down the New York Stock Exchange today. Keeley said there is no way these several glitches are not connected. And that may very well be possible. For the administration to come out so hard and so fast and say this was not an attack I think is disingenuous This is a major attack and for us to bury our head in the sand is very troubling.
  • Is St. Louis under a cyber attack? Threat map points to China

    07/08/2015 2:01:03 PM PDT · by mojito · 42 replies
    Fox News ^ | 7/8/2015 | Joe Millizter
    Is St. Louis at the center of a cyber attack from China? A company that monitors threats on the internet shows a large amount of traffic headed into the area from China. According to Norsecorps Twitter profile they offer, Live threat intelligence & unmatched visibility into the darkest corners of the Internet. A map on the companys website shows a lot of activity coming from locations in china to IP addresses located mostly in St. Louis, Kirksville and Seattle. The majority of targets listed in the map are located in the US with origins in China.
  • Hackers ruin Bundestag computer network

    06/11/2015 11:54:35 PM PDT · by Olog-hai · 7 replies
    TheLocal.de ^ | 11 Jun 2015 08:59 GMT+02:00 | (DPA/The Local)
    A hacker attack on the Bundestag (German parliament) earlier in 2015 means that an entirely new network will have to be built after experts failed to fix the breach. The Federal Office of Information Technology Security (BSI) decided that it could no longer defend against the attack and had to give up, broadcasters NDR and WDR and the Sddeutsche Zeitung reported on Thursday. Der Spiegel reported on Wednesday evening that data was still flowing out of the parliament to unknown recipients, and that rebuilding the network using completely new hardware would take months and cost millions.
  • Hackers nabbed data on every federal employee, union claims

    06/11/2015 10:09:38 PM PDT · by dennisw · 15 replies
    FoxNews.com ^ | June 12, 2015
    A major cyberattack on U.S. federal personnel data was far graver than the Obama administration has acknowledged, with hackers obtaining information on every federal employee, the president of a government workers union claimed Thursday. In a letter to the director of the Office of Personnel Management (OPM), J. David Cox, national president of the American Federation of Government Employees (AFGE), said that based on the information provided by the OPM, the hack was much broader than previously thought. Based on the sketchy information OPM has provided, we believe that the Central Personnel Data File was the targeted database, and that...
  • Wow The Federal Cyber Breach Was Not Discovered By U.S. Govt., Was Discovered By Private Company

    06/11/2015 6:25:34 PM PDT · by sheikdetailfeather · 16 replies
    The Conservative Treehouse ^ | 6-11-15 | sundance
    WASHINGTON DC As officials of the Obama administration announced that millions of sensitive records associated with current and past federal employees and contractors had been exposed by a long-running infiltration of the networks and systems of the Office of Personnel Management on June 4, they claimed the breach had been found during a government effort to correct problems with OPMs security. An OPM statement on the attack said that the agency discovered the breach as it had undertaken an aggressive effort to update its cybersecurity posture. And a DHS spokesperson told Ars that interagency partners were helping the OPM...
  • Job Title Key to Inner Access Held by Snowden

    07/01/2013 12:18:24 PM PDT · by Ernest_at_the_Beach · 16 replies
    NY Times ^ | June 30, 2013 | By SCOTT SHANE and DAVID E. SANGER
    WASHINGTON Intelligence officials refer to Edward J. Snowdens job as a National Security Agency contractor as systems administrator a bland name for the specialists who keep the computers humming. But his last job before leaking classified documents about N.S.A. surveillance, he told the news organization The Guardian, was actually infrastructure analyst. It is a title that officials have carefully avoided mentioning, perhaps for fear of inviting questions about the agencys aggressive tactics: an infrastructure analyst at the N.S.A., like a burglar casing an apartment building, looks for new ways to break into Internet and telephone traffic around the...
  • An Arlington burial for Jack Wheeler (Service today, April 29, 2011)

    04/29/2011 9:29:05 AM PDT · by smoothsailing · 7 replies · 1+ views
    Daily Press ^ | 4-27-2011
    An Arlington burial for Jack Wheeler April 27, 2011The murder of Jack Wheeler remains unsolved, but his funeral on Friday might provide a small bit of solace for his family and friends. Wheeler, a former Hampton resident, will be inurned with full military honors in the Columbarium at Arlington National Cemetery. Wheeler was a 1962 graduate of Hampton High School and a member of the Class of '66 at the U.S. Military Academy at West Point. He served in the Army from 1966 to 1971 and spent time in Vietnam. He went on to serve three GOP presidents in various...
  • Iran's Cyber Warfare Commander Found Dead

    10/02/2013 7:16:03 PM PDT · by Eleutheria5 · 54 replies
    Arutz Sheva ^ | 3/10/13 | Elad Benari
    The head of Irans cyber warfare program has been shot dead, triggering further accusations that outside powers are carrying out targeted assassinations of key figures in the countrys security apparatus, reports the Telegraph. Mojtaba Ahmadi, who served as commander of Irans Cyber War Headquarters, was found dead in a wooded area near the town of Karaj, northwest of the capital Tehran. Five Iranian nuclear scientists and the head of the countrys ballistic missile program have been killed since 2007. The regime has accused Israels external intelligence agency, the Mossad, of carrying out these assassinations. Ahmadi was last seen leaving his...
  • Iran Nuclear Facilities Hacked, Stations Made To Play AC/DC

    08/08/2014 12:30:42 PM PDT · by Ernest_at_the_Beach · 68 replies
    nextpowerup.com ^ | August 8, 2014 10:36 PDT | Seth Fitzgerald
    The Stuxnet virus reportedly created by the combined forces of the American and Israeli governments ravaged Iran's nuclear program between 2009 and 2010, destroying thousands of machines and effectively crippling the country's nuclear efforts.But this wasn't enough for the attackers. They wanted to show what real power was like.And so they made the facilities' hijacked work stations play AC/DC."There was also some music playing randomly on several of the workstations during the middle of the night with the volume maxed out," wrote an Iranian scientist in an email. "I believe it was the American band AC-DC Thunderstruck. It was...
  • Massive Utah cyberattacks up to 300 million per day may be aimed at NSA facility

    02/07/2015 9:23:30 PM PST · by BenLurkin · 12 replies
    http://www.sltrib.com/news/2135491-155/massive-utah-cyber-attacks-may-be ^ | First Published Feb 03 2015 10:57AM Last Updated Feb 03 2015 10:56 pm | LEE DAVIDSON
    Five years ago, Utah government computer systems faced 25,000 to 30,000 attempted cyberattacks every day. At the time, Utah Public Safety Commissioner Keith Squires thought that was massive. "But this last year we have had spikes of over 300 million attacks against the state databases" each day: a 10,000-fold increase. Why? Squires says it is probably because Utah is home to the new, secretive National Security Agency computer center, and hackers believe they can somehow get to it through state computer systems. "I really do believe it was all the attention drawn to the NSA facility. In the cyberworld, that's...
  • Cabbie drove Wheeler to Hotel du Pont (w/video & new info)

    01/25/2011 5:40:14 PM PST · by smoothsailing · 12 replies
    WPVI Channel 6 Action News ^ | 1-25-2011 | David Henry
    Cabbie drove Wheeler to Hotel du Pont David Henry WILMINGTON - January 25, 2011 (WPVI) -- Action News spoke with a cabbie who says he left John Wheeler off on a corner in downtown Wilmington two days before he turned up dead in a landfill. It fills another gap in the mystery surrounding Wheeler's bizarre behavior in the days before he died... He says John Wheeler got into his cab at the Amtrak station around 9:00 the morning of December 29th. It was a cold day and Wheeler was wearing just a sportcoat and an open collared white shirt. He...
  • Hack affected every single federal employee, union says

    06/11/2015 7:02:35 PM PDT · by 2ndDivisionVet · 63 replies
    CNET ^ | June 11, 2015 | Laura Hautala
    A hack announced last week affected all current and retired federal employees, and hackers got their hands on much more personal information than previously announced, the American Federation of Government Employees said Thursday.A December breach of government systems containing personal information of millions of federal employees was worse than originally thought. A union of federal workers said Thursday that the attack, announced last week, had stolen confidential information of every single federal employee, past or present -- far more than was previously revealed. The government disputes those claims. It's the latest in a spree of damaging hacks against the government,...
  • Obamas Response to Data Breach: New Systems and New Infrastructure

    06/08/2015 8:45:16 PM PDT · by Olog-hai · 29 replies
    Cybercast News Service ^ | June 8, 2015 | 11:00 AM EDT | Susan Jones
    Part of the problem is that weve got very old systems, President Obama said on Monday, in a response to a question about the recent hack attack on U.S. government computers. He said making U.S. cyberspace more secure is going to be a big project, requiring new systems and new infrastructure. The intrusion involving the Office of Personnel Management apparently compromised the personal, identifying information of four million current and former federal employees. [] Speaking at the conclusion of the G-7 summit in Germany on Monday, President Obama refused to say that China is responsible for the massive intrusion into...
  • Iran Flexes Its Power by Transporting Turkey to the Stone Age

    04/23/2015 6:27:47 AM PDT · by Former Proud Canadian · 38 replies
    Observer ^ | April 22, 2015 | Micah Halpern
    Half of Turkey44 of 81 provinces, 40 million people including those living in Istanbul and Ankara, suffered a massive power outage that lasted a solid twelve hours. It happened on Tuesday, March 31st. It happened because Iran wanted it to happen. The blackout in Turkey was caused by a cyber hack that originated in Iran. This cyber attack was payback, a taste of what Iran has to offer. Everything went down. Computers, airports, air traffic, traffic lights, hospitals, lights, elevators, refrigeration, water and sewage, everything simply stopped. In an instant, Turkey was transported back to the stone ages.
  • In North Korea, hackers are a handpicked, pampered elite

    12/06/2014 1:04:29 PM PST · by 2ndDivisionVet · 13 replies
    Reuters ^ | December 5, 2014 | Ju-min Park and James Pearson
    (VIDEO-AT-LINK) SEOUL-Despite its poverty and isolation, North Korea has poured resources into a sophisticated cyber-warfare cell called Bureau 121, defectors from the secretive state said as Pyongyang came under the microscope for a crippling hack into computers at Sony Pictures Entertainment. A North Korean diplomat has denied Pyongyang was behind the attack that was launched last month but a U.S. national security source said it was a suspect. Defectors from the North have said Bureau 121, staffed by some of the most talented computer experts in the insular state, is part of the General Bureau of Reconnaissance, an elite spy...
  • Chinese hack U.S. weather systems, satellite network

    11/12/2014 1:08:46 PM PST · by Kartographer · 50 replies
    Washington Post ^ | 11/12/14 | Mary Pat Flaherty, Jason Samenow and Lisa Rein
    Hackers from China breached the federal weather network recently, forcing cybersecurity teams to seal off data vital to disaster planning, aviation, shipping and scores of other crucial uses, officials said. The intrusion occurred in late September but officials gave no indication that they had a problem until Oct. 20, according to three people familiar with the hack and the subsequent reaction by the National Oceanic and Atmospheric Administration or NOAA, which includes the National Weather Service. Even then, NOAA did not say its systems were compromised.
  • New Chinese Intelligence Unit Linked to Massive Cyber Spying Program

    10/31/2014 7:43:50 AM PDT · by lbryce · 11 replies
    Washington Beacon ^ | October 31, 2014 | Bill Gertz
    A Chinese intelligence unit carried out a massive cyber espionage program that stole vast quantities of data from governments, businesses and other organizations, security analysts who uncovered the operation said Thursday. The activities of the Chinese unit called the Axiom group began at least six years ago and were uncovered by a coalition of security firms this month. Cyber sleuths traced Axiom attacks to the 2009 cyber operation against Google in China and other U.S. companies known as Operation Aurora. The group was also linked to a Chinese hacking program that targeted dissidents and opposition groups known as GhostNet. More...
  • FBI Director: China Has Hacked Every Big US Company

    10/06/2014 6:28:40 AM PDT · by blam · 38 replies
    BI ^ | 10-6-2014 | James Cook
    October 6, 2014 James CookIn his first major television interview, the director of the FBI has warned that Chinese hackers have embarked on a widespread campaign of cyberwarfare against the US. Speaking to CBS' "60 Minutes," James Comey had the following to say on Chinese hackers: There are two kinds of big companies in the United States. There are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese. When asked whether Chinese hackers were particularly good at gaining access to servers belonging to US companies, Comey said the hackers were not...
  • Snowden reveals automated NSA cyberwarfare program

    08/13/2014 10:36:36 AM PDT · by Citizen Zed · 13 replies
    computer world ^ | 8-13-2014 | Grant Gross (IDG News Service)
    The NSA cyberwarfare program, called MonsterMind, uses software to look for traffic patterns indicating possible foreign cyberattacks, according to Snowden, quoted in a lengthy profile in Wired. MonsterMind could automatically block a cyberattack from entering the U.S., then retaliate against the attackers, according to the Wired story. Snowden, when he was working as an NSA contractor, was concerned that MonsterMind could lead to misdirected counterattacks. "These attacks can be spoofed," he told Wired. "You could have someone sitting in China, for example, making it appear that one of these attacks is originating in Russia. And then we end up shooting...
  • Flights Briefly Vanish From Austrian Air Traffic

    Austria's flight safety organization says flight data recently disappeared twice from air controller radar screens in several countries....
  • China Is Our Number One National Security Threat

    05/29/2013 4:14:15 PM PDT · by raptor22 · 35 replies
    Investor's Business Daily ^ | May 29, 2013 | IBD EDITORIALS
    Cyberwar: Chinese hackers have obtained the designs for more than two dozen major U.S. weapon systems, including the Navy's missile defense system and our latest fighter. Our very national survival may soon be at risk. When President Barack Obama meets with Chinese President Xi Jinping for the first time on June 7-8 in California, we hope he will not bow but rather demand the Chinese stop their cyberwar against the U.S. that has reaped for them the designs for more than two dozen major weapon systems used by the U.S. military. According to a previously undisclosed section of a confidential...
  • Cyber Attack On Utilities Would Be A 'Katrina-Like Disaster Affecting Cities For Days, Months'

    05/22/2013 10:14:22 AM PDT · by blam · 45 replies
    TBI ^ | 5-22-3013 | Geoffrey Ingersoll
    Cyber Attack On Utilities Would Be A 'Katrina-Like Disaster Affecting Cities For Days, Months' Geoffrey IngersollMay 22, 2013, 12:49 PMHurricane Katrina NASA The possibility of a cyber attack on U.S. infrastructure is a bigger risk than ever, as utility companies report a record amount of vulnerability probing from outside sources in recent months, according to Bloomberg. The attack on critical infrastructure could be as bad as Katrina, experts say. Risk assessment professional Robert Bea warns of a cascading effect: Should one piece of a system fail, you end up with these cascades, sort of like a game of dominos, he...
  • Hitting Back At Hackers: Why "Strikeback" Is Doomed To Fail

    04/10/2013 4:17:51 AM PDT · by Sir Napsalot · 13 replies
    ReadWrite ^ | 4-9-2013 | Corey Nachreiner
    (snip) Considering this deluge of aggressive and costly security breaches, its no wonder that some people are getting frustrated enough to contemplate striking back directly against our attackers. While giving cyber criminals a taste of their own medicine certainly sounds appealing, most forms of so-called "Strikeback" have no place in private business. ...... Whats Wrong With Strikeback?Unfortunately, direct strikeback measures have huge inherent risks:. Targeting: The biggest problem with strikeback is that the Internet provides anonymity, making it very hard to know whos really behind an attack. It's all too likely that strikebacks could impact innocent victims. For example, attackers...
  • How To Protect Your Computers, Networks From Anonymous Israel Cyber Attack

    04/02/2013 10:31:08 PM PDT · by IsraelBeach · 5 replies
    Israel News Agency / Google News ^ | April 2, 2013 | Joel Leyden
    How To Protect Your Computers, Networks From Anonymous Israel Cyber AttackBy Joel Leyden Israel News AgencyJerusalem, Israel --- April 2, 2013 Threats have been made against the people of Israel for thousands of years. The latest threat now comes from a less macho, publicity seeking Internet group called Anonymous. Anonymous says that on April 7, 2013 it will "erase Israel from the Internet." It ain't gonna happen. Not today, not April 7 and not next year. OpIsrael, which is being organized by anti-Zionist hackers, are said to be targeting the 100 largest Websites in Israel, including banks, credit card...
  • Obama BANS U.S. government from buying Chinese-made computer technology over cyber-attack fears

    03/28/2013 3:13:29 PM PDT · by ColdOne · 10 replies
    dailymail.co.uk ^ | 3/28/13 | Damien Gayle
    President Obama has hit back at Beijing's alleged hacking campaign against U.S. businesses by banning government from buying Chinese computer technology. The new rule, which was buried in a spending bill signed this week, comes after a string of hacks traced back to China hit some of America's most important companies. It will only be in effect until the end of the fiscal year on September 30,
  • Sledgehammer of cyber warfare? EMP attack

    02/27/2013 1:05:17 PM PST · by Perseverando · 12 replies
    WND ^ | February 26, 2013 | F. Michael Maloof
    Enemies' doctrines include devastating blow as part of 'strategic operations' WASHINGTON Warnings from U.S. Defense Secretary Leon Panetta and U.S. Department of Homeland Security Secretary Janet Napolitano that enemy nations are carrying out cyber attacks on the U.S. are on the rise. The target? The U.S. electric infrastructure. Even President Obama has pointed out that our enemies are also seeking the abilities to sabotage our power grid, our financial institutions and our air traffic control systems. But that may not be the worst of it. Those same adversaries China, Russia, Iran and North Korea also incorporate in...
  • Significant Cyberattack Incidents

    02/26/2013 11:14:58 PM PST · by neverdem · 9 replies
    Real Clear Politics ^ | 02.26.13 | NA
    Last week, the American computer security firm Mandiant released a detailed study shedding light on the secret cybercorps of the Chinese government. The Shanghai Group, or Unit 61398 of the Peoples Liberation Army, is believed to operate out of a nondescript 12-story building (above) on the outskirts of Shanghai. Over the past six years, Mandiant claims to have tracked thousands of attacks on American industry, business, government and military targets originating from that area. Given the ubiquity of information technology, the threat of cyberattacks will continue to grow. The scope of these assaults can range from accessing confidential information and...
  • Dot Commie: China's Military Behind U.S. Cyberattacks

    02/23/2013 7:18:03 AM PST · by raptor22 · 16 replies
    Investor's Business Daily ^ | Feberuary 23, 2012 | IBD EDITORIALS
    Cyberwar: A cybersecurity firm reports a secretive Chinese military unit is behind many recent "hack attacks" into U.S. computers, stealing trade and military secrets and developing a potentially crippling new weapon. In a 2009 editorial we noted that units of China's armed forces, whom we dubbed its "Cybertooth Tigers" were developing capabilities to penetrate and potentially disrupt U.S. computer systems as part of the People's Liberation Army's focus on what is known as "asymmetrical" warfare, specifically cyber-warfare. At least as far back as the 2008 edition of the Pentagon's annual report to Congress entitled "Military Power of the People's Republic...
  • White House inactive on attack dangers ('The threat is on nobody's radar screen')

    01/08/2013 10:37:30 AM PST · by Perseverando · 26 replies
    WND ^ | January 7, 2013 | F. Michael Maloof
    WASHINGTON The United States now is facing two serious national security challenges, but they arent expected to be addressed effectively because of the serious budgetary headaches Congress has created, and a virtually deadlocked legislature on just about every issue pending, according to report from Joseph Farahs G2 Bulletin. And the White House apparently isnt paying attention. The first is the growing concern of the impact that an electromagnetic pulse, or EMP, event either natural or manmade could have on the national grid system, on which the Department of Defense has a 99 percent dependency. The other concern...
  • LulzSec: the members and the enemies

    06/25/2011 6:35:43 AM PDT · by Bad~Rodeo · 10 replies
    Guardian ^ | Friday 24 June 2011 | Josh Halliday
    While Sabu and Topiary are firmly on the inside, the likes of The Jester and LulzSec Exposed are most certainly notInside Sabu Apparent founder and leader of LulzSec, he is a long-time hacktivist associated with senior Anonymous members. Decides who can join the group and who should be targeted. Attempts by rivals to uncover details about his real-life identity suggest he is a 30-year-old IT consultant skilled in the Python programming language who has lived in New York. The timing of some his tweets tweeting "goodnight all" at 0700 BST, or 0200 New York time implies he is...
  • LulzSec 'Leader' Turns on Fellow Hacktivists: Feds

    03/06/2012 9:02:03 PM PST · by Olog-hai · 7 replies
    ABC News via Yahoo News ^ | March 6, 2012 | RICHARD ESPOSITO, AARON KATERSKY and PIERRE THOMAS
    Six members of the suspected computer hacking groups affiliated with Anonymous were chargedincluding the suspected ring leader, who directed the entire operation from a Manhattan apartment complexafter it was revealed one of the group's most high profile members has been working with federal authorities for months. Hector Monsegur, a 28-year-old American believed to use the name "Sabu" on the internet, was arrested by federal agents last year and has been cooperating with law enforcement ever since, officials said. He pleaded guilty last August, a plea unsealed in federal court in Lower Manhattan today. At least four of the five other...
  • Anonymous Claims They Hacked GOP On Election Day

    11/18/2012 3:52:41 PM PST · by 2ndDivisionVet · 63 replies
    Breitbart TV ^ | November 18, 2012
    Mitt Romney's Republican Get Out the Vote system (ORCA) had a meltdown on Election Day leaving some campaign workers wandering around with nothing to do. Now Anonymous has released a video claiming responsibility for jamming ORCA...
  • Anti-Jihad Ads Considered Constitutional

    10/01/2012 2:02:13 PM PDT · by Cindy · 67 replies
    COLLEGIAN.csufresno.edu - Top Opinion Story ^ | September 24, 2012 | Liana Whitehead
    SNIPPET: "New York City is the center of a public uproar as Internet blogger Pamela Gellar rises with an anti-jihad ad campaign." SNIPPET: "Gellar and her group are protesting the Jihad, which in definition is the religious duty of Muslims. According to the Dictionary of Islam, jihad is defined as A religious war with those who are unbelievers in the mission of Muhammad . . . enjoined especially for the purpose of advancing Islam and repelling evil from Muslims. The literal meaning of jihad, according to the British Broadcasting Network, is struggle or effort, and it means much more than...
  • Microsoft Fights Flame Malware With Certificate Killer

    06/14/2012 1:25:27 PM PDT · by OldEarlGray · 6 replies
    InformationWeek ^ | 05 Jun 2012 | Mathew J. Schwartz
    Microsoft identified the culprit Sunday when it released a security bulletin warning that "unauthorized digital certificates could allow spoofing." Its related Windows update revokes trust for three fraudulent certificate authority (CA) certificates: two Microsoft Enforced Licensing Intermediate PCA certificates, as well as the Microsoft Enforced Licensing Registration Authority CA. The revelation that Flame included the ability to pass off fake Windows updates is yet more evidence of that Flame, in Gostev's words, "is one of the most interesting and complex malicious programs we have ever seen." Indeed, the certificate flaw gave Flame's creators a way to attack all versions of...
  • Patch Tuesday: Microsoft raises alert for dangerous IE, Windows flaws

    06/13/2012 9:39:00 PM PDT · by OldEarlGray · 77 replies
    ZDnet ^ | 12 Jun 2012 | Ryan Naraine
    Summary: Microsoft expects to see exploit code targeting at least one of the vulnerabilities within the next 30 days. Microsoft today warned that cyber-criminals could soon aim exploits at critical security flaws in Internet Explorer browser and Windows to hijack and take complete control of vulnerable machines. The warning comes as part of this months Patch Tuesday where Microsoft released 7 bulletins with fixes for at least 26 documented vulnerabilities affecting the Windows ecosystem. The company is urging users to pay special attention to MS12-037 and MS12-036, which provides cover for remote code execution vulnerabilities that could be used in...
  • Germany confirms existence of operational cyberwarfare unit

    06/11/2012 1:17:04 AM PDT · by Olog-hai · 3 replies
    DPA via Stars and Stripes ^ | June 5, 2012 | Michael Fischer, Joerg Blank and Christoph Dernbach
    German authorities confirmed Tuesday in a parliamentary document that their military possesses a top secret cyberwarfare unit which is already operational, but gave no details of how big it is or what kind of attacks it could conduct. The German armed forces have been working for 20 years to defend the country's computer networks from external attack, but have never disclosed before that they have an offensive capacity as well.The existence of the unit, set up in 2006, was disclosed in a six-page paper presented to the parliamentary committee on defense in Berlin. Legislators from both the government and...
  • 'End of the world as we know it': Kaspersky warns of cyber-terror apocalypse

    06/08/2012 9:46:07 AM PDT · by SomeCallMeTim · 51 replies
    RT.com ^ | June 6, 2012 | Sergey Guneev
    After his eponymously-named lab discovered Flame, "the most sophisticated cyber weapon yet unleashed," Eugene Kaspersky believes that the evolving threat of cyber terrorism could spell the end of life on Earth as we know it. Doomsday scenarios are a common occurrence in 2012, but coming from a steely-eyed realist like Eugene Kaspersky, his calls for a global effort to halt emerging cyber threats should raise alarm bells. A global Internet blackout and crippling attacks against key infrastructure are among two possible cyber-pandemics he outlined."It's not cyber war, it's cyber terrorism, and I'm afraid the game is just beginning. Very soon,...
  • Obama Order Sped Up Wave of Cyberattacks Against Iran (taking credit for Stuxnet)

    06/01/2012 8:49:33 AM PDT · by Sir Napsalot · 22 replies
    NY Times ^ | 6-1-2012 | DAVID E. SANGER
    WASHINGTON From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Irans main nuclear enrichment facilities, significantly expanding Americas first sustained use of cyberweapons, according to participants in the program. Mr. Obama decided to accelerate the attacks begun in the Bush administration and code-named Olympic Games even after an element of the program accidentally became public in the summer of 2010 ...
  • U.S. senators: Al Qaeda calls for 'electronic jihad'

    05/27/2012 1:08:39 AM PDT · by Innovative · 11 replies
    CNN ^ | May 23, 2012 | CNN Wire Staff
    An al Qaeda video calling for "electronic jihad" illustrates the urgent need for cybersecurity standards for the most critical networks in the United States, a group of senators said. The video calls for cyberattacks against networks such as the electric grid and compares vulnerabilities in the United States' critical cyber networks to the vulnerabilities in the country's aviation system before 9/11, according to a statement Tuesday from the Senate Committee on Homeland Security and Governmental Affairs. "This is the clearest evidence we've seen that Al Qaeda and other terrorist groups want to attack the cyber systems of our critical infrastructure,"...
  • NORAD, Northcom launch joint cyber division

    05/25/2012 9:23:58 AM PDT · by Mich1193 · 2 replies
    gcn.com ^ | May 22, 2012 | GCN.com
    A new cyber division, jointly managed by the North American Aerospace Defense Command (NORAD) and U.S. Northern Commands (Northcom) Operations Division, is up and running after approval by Defense Secretary Leon Panetta earlier this month. The U.S. Northern Command Joint Cyber Center (JCC) has three main missions: improving cyber domain situational awareness, improving the defense of the commands networks, and providing cyber consequence response and recovery support to civil authorities upon request, according to an announcement from the joint center. The division includes members from the intelligence, operations, and command and control systems divisions as well as a four- to...