Free Republic 3rd Quarter Fundraising Target: $85,000 Receipts & Pledges to-date: $70,319
82%  
Woo hoo!! And we're now over 82%!! Less than $15k to go!! Let's git 'er done!! Thank you all very much!!

Keyword: cyberwarfare

Brevity: Headers | « Text »
  • Snowden reveals automated NSA cyberwarfare program

    08/13/2014 10:36:36 AM PDT · by Citizen Zed · 13 replies
    computer world ^ | 8-13-2014 | Grant Gross (IDG News Service)
    The NSA cyberwarfare program, called MonsterMind, uses software to look for traffic patterns indicating possible foreign cyberattacks, according to Snowden, quoted in a lengthy profile in Wired. MonsterMind could automatically block a cyberattack from entering the U.S., then retaliate against the attackers, according to the Wired story. Snowden, when he was working as an NSA contractor, was concerned that MonsterMind could lead to misdirected counterattacks. "These attacks can be spoofed," he told Wired. "You could have someone sitting in China, for example, making it appear that one of these attacks is originating in Russia. And then we end up shooting...
  • Flights Briefly Vanish From Austrian Air Traffic

    Austria's flight safety organization says flight data recently disappeared twice from air controller radar screens in several countries....
  • China Is Our Number One National Security Threat

    05/29/2013 4:14:15 PM PDT · by raptor22 · 35 replies
    Investor's Business Daily ^ | May 29, 2013 | IBD EDITORIALS
    Cyberwar: Chinese hackers have obtained the designs for more than two dozen major U.S. weapon systems, including the Navy's missile defense system and our latest fighter. Our very national survival may soon be at risk. When President Barack Obama meets with Chinese President Xi Jinping for the first time on June 7-8 in California, we hope he will not bow but rather demand the Chinese stop their cyberwar against the U.S. that has reaped for them the designs for more than two dozen major weapon systems used by the U.S. military. According to a previously undisclosed section of a confidential...
  • Cyber Attack On Utilities Would Be A 'Katrina-Like Disaster Affecting Cities For Days, Months'

    05/22/2013 10:14:22 AM PDT · by blam · 45 replies
    TBI ^ | 5-22-3013 | Geoffrey Ingersoll
    Cyber Attack On Utilities Would Be A 'Katrina-Like Disaster Affecting Cities For Days, Months' Geoffrey IngersollMay 22, 2013, 12:49 PMHurricane Katrina NASA The possibility of a cyber attack on U.S. infrastructure is a bigger risk than ever, as utility companies report a record amount of vulnerability probing from outside sources in recent months, according to Bloomberg. The attack on critical infrastructure could be as bad as Katrina, experts say. Risk assessment professional Robert Bea warns of a cascading effect: “Should one piece of a system fail, you end up with these cascades, sort of like a game of dominos,” he...
  • Hitting Back At Hackers: Why "Strikeback" Is Doomed To Fail

    04/10/2013 4:17:51 AM PDT · by Sir Napsalot · 13 replies
    ReadWrite ^ | 4-9-2013 | Corey Nachreiner
    (snip) Considering this deluge of aggressive and costly security breaches, it’s no wonder that some people are getting frustrated enough to contemplate striking back directly against our attackers. While giving cyber criminals a taste of their own medicine certainly sounds appealing, most forms of so-called "Strikeback" have no place in private business. ...... What’s Wrong With Strikeback?Unfortunately, direct strikeback measures have huge inherent risks:. Targeting: The biggest problem with strikeback is that the Internet provides anonymity, making it very hard to know who’s really behind an attack. It's all too likely that strikebacks could impact innocent victims. For example, attackers...
  • How To Protect Your Computers, Networks From Anonymous Israel Cyber Attack

    04/02/2013 10:31:08 PM PDT · by IsraelBeach · 5 replies
    Israel News Agency / Google News ^ | April 2, 2013 | Joel Leyden
    How To Protect Your Computers, Networks From Anonymous Israel Cyber AttackBy Joel Leyden Israel News AgencyJerusalem, Israel --- April 2, 2013 … Threats have been made against the people of Israel for thousands of years. The latest threat now comes from a less macho, publicity seeking Internet group called Anonymous. Anonymous says that on April 7, 2013 it will "erase Israel from the Internet." It ain't gonna happen. Not today, not April 7 and not next year. “OpIsrael,” which is being organized by anti-Zionist hackers, are said to be targeting the 100 largest Websites in Israel, including banks, credit card...
  • Obama BANS U.S. government from buying Chinese-made computer technology over cyber-attack fears

    03/28/2013 3:13:29 PM PDT · by ColdOne · 10 replies
    dailymail.co.uk ^ | 3/28/13 | Damien Gayle
    President Obama has hit back at Beijing's alleged hacking campaign against U.S. businesses by banning government from buying Chinese computer technology. The new rule, which was buried in a spending bill signed this week, comes after a string of hacks traced back to China hit some of America's most important companies. It will only be in effect until the end of the fiscal year on September 30,
  • Sledgehammer of cyber warfare? EMP attack

    02/27/2013 1:05:17 PM PST · by Perseverando · 12 replies
    WND ^ | February 26, 2013 | F. Michael Maloof
    Enemies' doctrines include devastating blow as part of 'strategic operations' WASHINGTON – Warnings from U.S. Defense Secretary Leon Panetta and U.S. Department of Homeland Security Secretary Janet Napolitano that enemy nations are carrying out cyber attacks on the U.S. are on the rise. The target? The U.S. electric infrastructure. Even President Obama has pointed out that “our enemies are also seeking the abilities to sabotage our power grid, our financial institutions and our air traffic control systems.” But that may not be the worst of it. Those same adversaries – China, Russia, Iran and North Korea – also incorporate in...
  • Significant Cyberattack Incidents

    02/26/2013 11:14:58 PM PST · by neverdem · 9 replies
    Real Clear Politics ^ | 02.26.13 | NA
    Last week, the American computer security firm Mandiant released a detailed study shedding light on the secret cybercorps of the Chinese government. The “Shanghai Group,” or Unit 61398 of the People’s Liberation Army, is believed to operate out of a nondescript 12-story building (above) on the outskirts of Shanghai. Over the past six years, Mandiant claims to have tracked thousands of attacks on American industry, business, government and military targets originating from that area. Given the ubiquity of information technology, the threat of cyberattacks will continue to grow. The scope of these assaults can range from accessing confidential information and...
  • Dot Commie: China's Military Behind U.S. Cyberattacks

    02/23/2013 7:18:03 AM PST · by raptor22 · 16 replies
    Investor's Business Daily ^ | Feberuary 23, 2012 | IBD EDITORIALS
    Cyberwar: A cybersecurity firm reports a secretive Chinese military unit is behind many recent "hack attacks" into U.S. computers, stealing trade and military secrets and developing a potentially crippling new weapon. In a 2009 editorial we noted that units of China's armed forces, whom we dubbed its "Cybertooth Tigers" were developing capabilities to penetrate and potentially disrupt U.S. computer systems as part of the People's Liberation Army's focus on what is known as "asymmetrical" warfare, specifically cyber-warfare. At least as far back as the 2008 edition of the Pentagon's annual report to Congress entitled "Military Power of the People's Republic...
  • White House inactive on attack dangers ('The threat is on nobody's radar screen')

    01/08/2013 10:37:30 AM PST · by Perseverando · 26 replies
    WND ^ | January 7, 2013 | F. Michael Maloof
    WASHINGTON – The United States now is facing two serious national security challenges, but they aren’t expected to be addressed effectively because of the serious budgetary headaches Congress has created, and a virtually deadlocked legislature on just about every issue pending, according to report from Joseph Farah’s G2 Bulletin. And the White House apparently isn’t paying attention. The first is the growing concern of the impact that an electromagnetic pulse, or EMP, event – either natural or manmade – could have on the national grid system, on which the Department of Defense has a 99 percent dependency. The other concern...
  • LulzSec: the members and the enemies

    06/25/2011 6:35:43 AM PDT · by Bad~Rodeo · 10 replies
    Guardian ^ | Friday 24 June 2011 | Josh Halliday
    While Sabu and Topiary are firmly on the inside, the likes of The Jester and LulzSec Exposed are most certainly notInside Sabu Apparent founder and leader of LulzSec, he is a long-time hacktivist associated with senior Anonymous members. Decides who can join the group and who should be targeted. Attempts by rivals to uncover details about his real-life identity suggest he is a 30-year-old IT consultant skilled in the Python programming language who has lived in New York. The timing of some his tweets – tweeting "goodnight all" at 0700 BST, or 0200 New York time – implies he is...
  • LulzSec 'Leader' Turns on Fellow Hacktivists: Feds

    03/06/2012 9:02:03 PM PST · by Olog-hai · 7 replies
    ABC News via Yahoo News ^ | March 6, 2012 | RICHARD ESPOSITO, AARON KATERSKY and PIERRE THOMAS
    Six members of the suspected computer hacking groups affiliated with Anonymous were charged—including the suspected ring leader, who directed the entire operation from a Manhattan apartment complex—after it was revealed one of the group's most high profile members has been working with federal authorities for months. Hector Monsegur, a 28-year-old American believed to use the name "Sabu" on the internet, was arrested by federal agents last year and has been cooperating with law enforcement ever since, officials said. He pleaded guilty last August, a plea unsealed in federal court in Lower Manhattan today. At least four of the five other...
  • Anonymous Claims They Hacked GOP On Election Day

    11/18/2012 3:52:41 PM PST · by 2ndDivisionVet · 63 replies
    Breitbart TV ^ | November 18, 2012
    Mitt Romney's Republican Get Out the Vote system (ORCA) had a meltdown on Election Day leaving some campaign workers wandering around with nothing to do. Now Anonymous has released a video claiming responsibility for jamming ORCA...
  • Anti-Jihad Ads Considered Constitutional

    10/01/2012 2:02:13 PM PDT · by Cindy · 67 replies
    COLLEGIAN.csufresno.edu - Top Opinion Story ^ | September 24, 2012 | Liana Whitehead
    SNIPPET: "New York City is the center of a public uproar as Internet blogger Pamela Gellar rises with an “anti-jihad” ad campaign." SNIPPET: "Gellar and her group are protesting the Jihad, which in definition is the religious duty of Muslims. According to the Dictionary of Islam, jihad is defined as “A religious war with those who are unbelievers in the mission of Muhammad . . . enjoined especially for the purpose of advancing Islam and repelling evil from Muslims.” The literal meaning of jihad, according to the British Broadcasting Network, “is struggle or effort, and it means much more than...
  • Microsoft Fights Flame Malware With Certificate Killer

    06/14/2012 1:25:27 PM PDT · by OldEarlGray · 6 replies
    InformationWeek ^ | 05 Jun 2012 | Mathew J. Schwartz
    Microsoft identified the culprit Sunday when it released a security bulletin warning that "unauthorized digital certificates could allow spoofing." Its related Windows update revokes trust for three fraudulent certificate authority (CA) certificates: two Microsoft Enforced Licensing Intermediate PCA certificates, as well as the Microsoft Enforced Licensing Registration Authority CA. The revelation that Flame included the ability to pass off fake Windows updates is yet more evidence of that Flame, in Gostev's words, "is one of the most interesting and complex malicious programs we have ever seen." Indeed, the certificate flaw gave Flame's creators a way to attack all versions of...
  • Patch Tuesday: Microsoft raises alert for dangerous IE, Windows flaws

    06/13/2012 9:39:00 PM PDT · by OldEarlGray · 77 replies
    ZDnet ^ | 12 Jun 2012 | Ryan Naraine
    Summary: Microsoft expects to see exploit code targeting at least one of the vulnerabilities within the next 30 days. Microsoft today warned that cyber-criminals could soon aim exploits at critical security flaws in Internet Explorer browser and Windows to hijack and take complete control of vulnerable machines. The warning comes as part of this month’s Patch Tuesday where Microsoft released 7 bulletins with fixes for at least 26 documented vulnerabilities affecting the Windows ecosystem. The company is urging users to pay special attention to MS12-037 and MS12-036, which provides cover for “remote code execution” vulnerabilities that could be used in...
  • Germany confirms existence of operational cyberwarfare unit

    06/11/2012 1:17:04 AM PDT · by Olog-hai · 3 replies
    DPA via Stars and Stripes ^ | June 5, 2012 | Michael Fischer, Joerg Blank and Christoph Dernbach
    German authorities confirmed Tuesday in a parliamentary document that their military possesses a top secret cyberwarfare unit which is already operational, but gave no details of how big it is or what kind of attacks it could conduct. The German armed forces have been working for 20 years to defend the country's computer networks from external attack, but have never disclosed before that they have an offensive capacity as well.The existence of the unit, set up in 2006, was disclosed in a six-page paper presented to the parliamentary committee on defense in Berlin. … Legislators from both the government and...
  • 'End of the world as we know it': Kaspersky warns of cyber-terror apocalypse

    06/08/2012 9:46:07 AM PDT · by SomeCallMeTim · 51 replies
    RT.com ^ | June 6, 2012 | Sergey Guneev
    After his eponymously-named lab discovered Flame, "the most sophisticated cyber weapon yet unleashed," Eugene Kaspersky believes that the evolving threat of “cyber terrorism” could spell the end of life on Earth as we know it. ­Doomsday scenarios are a common occurrence in 2012, but coming from a steely-eyed realist like Eugene Kaspersky, his calls for a global effort to halt emerging cyber threats should raise alarm bells. A global Internet blackout and crippling attacks against key infrastructure are among two possible cyber-pandemics he outlined."It's not cyber war, it's cyber terrorism, and I'm afraid the game is just beginning. Very soon,...
  • Obama Order Sped Up Wave of Cyberattacks Against Iran (taking credit for Stuxnet)

    06/01/2012 8:49:33 AM PDT · by Sir Napsalot · 22 replies
    NY Times ^ | 6-1-2012 | DAVID E. SANGER
    WASHINGTON — From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program. Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games — even after an element of the program accidentally became public in the summer of 2010 ...
  • U.S. senators: Al Qaeda calls for 'electronic jihad'

    05/27/2012 1:08:39 AM PDT · by Innovative · 11 replies
    CNN ^ | May 23, 2012 | CNN Wire Staff
    An al Qaeda video calling for "electronic jihad" illustrates the urgent need for cybersecurity standards for the most critical networks in the United States, a group of senators said. The video calls for cyberattacks against networks such as the electric grid and compares vulnerabilities in the United States' critical cyber networks to the vulnerabilities in the country's aviation system before 9/11, according to a statement Tuesday from the Senate Committee on Homeland Security and Governmental Affairs. "This is the clearest evidence we've seen that Al Qaeda and other terrorist groups want to attack the cyber systems of our critical infrastructure,"...
  • NORAD, Northcom launch joint cyber division

    05/25/2012 9:23:58 AM PDT · by Mich1193 · 2 replies
    gcn.com ^ | May 22, 2012 | GCN.com
    A new cyber division, jointly managed by the North American Aerospace Defense Command (NORAD) and U.S. Northern Command’s (Northcom) Operations Division, is up and running after approval by Defense Secretary Leon Panetta earlier this month. The U.S. Northern Command Joint Cyber Center (JCC) has three main missions: improving cyber domain situational awareness, improving the defense of the commands’ networks, and providing cyber consequence response and recovery support to civil authorities upon request, according to an announcement from the joint center. The division includes members from the intelligence, operations, and command and control systems divisions as well as a four- to...
  • China cyber capability puts U.S. forces at risk: report

    03/07/2012 11:27:05 PM PST · by Olog-hai · 8 replies
    Reuters ^ | Thu Mar 8, 2012 12:11am EST | Jim Wolf
    Chinese cyberwarfare would pose a "genuine risk" to the U.S. military in a conflict, for instance over Taiwan or disputes in the South China Sea, according to a report prepared for the U.S. Congress. Operations against computer networks have become fundamental to Beijing's military and national development strategies over the past decade, said the 136-page analysis by Northrop Grumman Corp released on Thursday by the U.S.-China Economic and Security Review Commission. Chinese commercial firms, bolstered by foreign partners, are giving the military access to cutting-edge research and technology, the analysis said. The Chinese military's close ties to large Chinese telecommunications...
  • Anonymous hackers claim to have crashed Justice Department website

    01/19/2012 3:19:57 PM PST · by maggief · 84 replies · 7+ views
    The Hill ^ | January 19, 2012 | Brendan Sasso
    Anonymous, the group of activist hackers, claimed to have crashed the Justice Department website on Thursday in retaliation for prosecutors shutting down the popular file-sharing site Megaupload.com. "The government takes down Megaupload? 15 minutes later Anonymous takes down government & record label sites," the group wrote on its Twitter account. A Justice Department spokesman did not confirm whether the agency had suffered a cyber attack, but justice.gov was not loading as of Thursday afternoon.
  • DECKER & TRIPLETT: Beijing’s electronic Pearl Harbor

    11/12/2011 10:35:51 PM PST · by Tolerance Sucks Rocks · 5 replies
    The Washington Times ^ | November 11, 2011 | Brett M. Decker and William C. Triplett II
    The following is an excerpt from “Bowing to Beijing” (Regnery Publishing, Nov. 14, 2011): In November 1997, Deputy Defense Secretary John Hamre testified before the Senate Subcommittee on Terrorism that “we’re facing the possibility of an electronic Pearl Harbor. … There is going to be an electronic attack on this country some time in the future.” Two years later, he told a secret session of the House Armed Services Committee, “We are at war - right now. We are in cyberwar.” Fast-forward more than a decade, to 2011. President Obama’s choice for secretary of defense, Leon Panetta, tells the Senate...
  • China State TV Alludes to U.S. Website Attacks

    08/24/2011 2:50:35 PM PDT · by lbryce · 6 replies
    Wall Street Journal ^ | August 24, 2011 | Jeremy Page
    Chinese state television has broadcast footage of what two experts on the Chinese military say appears to be a military institute demonstrating software designed to attack websites in the U.S. Although it could be a decade old or a mock-up, the 10-second segment—part of a longer report on cybersecurity—appears to be a rare example of an official source contradicting China'a repeated assertions that it doesn't engage in cyberattacks, according to Andrew Erickson and Gabe Collins of the China SignPost analytical service, which specializes in military matters. The slightest suggestion that the Chinese military has attacked U.S. websites is highly sensitive,...
  • A Cyber-Pearl Harbor On Horizon?

    07/15/2011 5:28:21 PM PDT · by Kaslin · 24 replies
    IBD Editorials ^ | July 15, 2011 | Staff
    Security: The Pentagon has disclosed perhaps the largest theft of sensitive data by an unnamed foreign government. The threat to our electronic infrastructure is real, growing and as dangerous as a North Korean missile. In outlining America's cyberwarfare strategy last Thursday at the National Defense University, Deputy Secretary of Defense William Lynn disclosed that 24,000 sensitive files containing Pentagon data at a defense company were accessed in a cyberattack in March, likely by a foreign government. He didn't disclose the identity of that government, but in a bit of an understatement he acknowledged, "We have a pretty good idea." So...
  • North Korea recruits hackers at school

    06/20/2011 8:22:09 PM PDT · by Bad~Rodeo · 6 replies
    Aljazeera ^ | 20 Jun 2011 | Sangwon Yoon
    A child becomes computer literate at primary school. Meanwhile, North Korea's most prodigious young students are identified and trained in advanced cyberwarfare techniques As South Korea blames North Korea for a recent slew of cyberattacks, two defectors share their experiences, as a hacker and trainer of "cyberwarriors" in the reclusive communist country, with Al Jazeera shedding some light into the inner workings of the North's cyberwarfare programme. In the process, Kim Heung-kwang and Jang Se-yul also warn of the regime's concentrated efforts to bolster its cyberwarfare capabilities. The hackers' professor Kim Heung-kwang was a computer science professor in North...
  • CIA, Senate hackers gleefully promise more

    06/16/2011 6:54:35 PM PDT · by bushwon · 7 replies · 1+ views
    CNN ^ | 6/16/11 | Doug Gross
    CNN) -- They've breached or busted the websites of the CIA, PBS and the U.S. Senate, and launched at least part of an extended attack on Sony, whose PlayStation Network was brought to a grinding halt for the better part of a month. And, to hear them tell it, it's all for a laugh. Meet Lulz Security, or LulzSec, the gleeful and secretive band of hackers who appear to be responsible for a string of high-profile and sometimes embarrassing Internet attacks. Their most recent strike, and arguably the most ambitious, was a distributed denial-of-service attack Wednesday that shut down the...
  • Computer security: Is this the start of cyberwarfare?Last year's Stuxnet virus attack...

    06/09/2011 8:30:52 PM PDT · by neverdem · 6 replies
    Nature News ^ | 8 June 2011 | Sharon Weinberger
    Last year's Stuxnet virus attack represented a new kind of threat to critical infrastructure. Just over a year ago, a computer in Iran started repeatedly rebooting itself, seemingly without reason. Suspecting some kind of malicious software (malware), analysts at VirusBlokAda, an antivirus-software company in Minsk, examined the misbehaving machine over the Internet, and soon found that they were right. Disturbingly so: the code they extracted from the Iranian machine proved to be a previously unknown computer virus of unprecedented size and complexity. On 17 June 2010, VirusBlokAda issued a worldwide alert that set off an international race to track down...
  • Hackers hit Atlanta FBI

    06/09/2011 8:50:06 AM PDT · by robowombat · 8 replies
    The Atlanta Journal-Constitution ^ | June 5, 2011 | By Dan Chapman
    The FBI announced Sunday it shut down an Atlanta-based website that tracks cyber-crime after the site was compromised by a mysterious, yet increasingly audacious group of hackers. InfraGard Atlanta, a nonprofit partnership between local business, government and academic security experts and the FBI, was hacked late last week by Lulz Security. LulzSec, as it’s known on-line in cyber security channels, hijacked the InfraGard site and published the email addresses, usernames and passwords of its 180 members. On its website, LulzSec wrote that the InfraGard volunteers – which include internet security experts at Equifax, Georgia Tech, the U.S. Army, DeKalb County...
  • The Way to Fight China's Hacking

    06/04/2011 2:29:22 AM PDT · by Rudder · 6 replies
    WSJ ^ | 6/03/11 | HOLMAN W. JENKINS, JR
    Google wouldn't be human if it weren't relieved that the latest Chinese hacking incident targeted not a hole in Google's defenses but a gullibility of its customers. The proper term is "spear phishing" for the use of email cons to scam a specific, chosen individual into revealing his or her password, allowing unauthorized access to inboxes and online accounts. In a blog post this week, Google announced that the latest attacks seem to come from Jinan, China. The targets were the Gmail accounts of "senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military...
  • CIA Director Leon Panetta Warns of Possible Cyber-Pearl Harbor

    02/20/2011 8:20:35 PM PST · by robowombat · 22 replies
    ABC News ^ | Feb 11, 2011 | By JASON RYAN
    "The potential for the next Pearl Harbor could very well be a cyber-attack," he testified on Capitol Hill Thursday Director of National Intelligence James Clapper also appeared, telling the committee, "This threat is increasing in scope and scale, and its impact is difficult to overstate." ........ Panetta told the committee, "This is a real national security threat that we have to pay attention to. I know there are a lot of aspects to it. "The Internet, the cyber-arena ... is a vastly growing area of information that can be used and abused in a number of ways." U.S. officials and...
  • Iran to introduce cyberwarfare crack teams

    01/21/2011 3:25:21 PM PST · by nuconvert · 29 replies
    Telegraph UK ^ | Jan. 21, 2011
    The Iranian authorities have promised to "put cyberpolice all over the country" as it comes under threat from online dissent at home and computer sabotage from abroad. The country's head of police, Ismael Ahmadi Moghaddam, said Iran had to stamp out "defamation and mischief" at the opening of a new headquarters in Qom, the religious centre of the country. He gave few details of his plans, but his words suggests he intends to continue developing the Chinese-style model already in place of using a mixture of technological censorship using keywords and large numbers of trained police to monitor websites. He...
  • Body of murdered cyberwar expert found in landfill (Military man dumped into three-ring whodunit)

    01/05/2011 8:12:45 PM PST · by smoothsailing · 36 replies
    The Register ^ | 1-5-2010 | Dan Goodin
    Body of murdered cyberwar expert found in landfill Military man dumped into three-ring whodunit Dan Goodin January 5, 2010 The body of a decorated US Army officer was found dumped in a Delaware landfill on New Years Eve day, a few days after he expressed concern that the nation wasn't adequately prepared for cyber warfare, according to news reports following the bizarre whodunit. Events surrounding the murder of John P. Wheeler III, who most recently worked part-time for defense contractor Mitre Corporation on cyber defense topics, read like a Tom Clancy novel. The 66-year-old worked for three Republican administrations, was...
  • Protecting Our Protectors (Oliver North)

    12/09/2010 5:08:53 PM PST · by jazusamo · 8 replies · 1+ views
    Creators Syndicate ^ | December 9, 2010 | Oliver North
          WASHINGTON — It's a tough time to be a member of the U.S. armed forces. Those serving in our all-volunteer military — and their families — are stretched and stressed by more than nine years of war. Unfortunately, our commander in chief — supposedly the champion of our soldiers, sailors, airmen, guardsmen and Marines — isn't doing anything to make serving in uniform any easier. President Barack Obama — fresh from his 3 1/2-hour "visit" to Afghanistan — continues to insist that the U.S. Senate act immediately to allow active homosexuals to serve in the military....
  • WikiLeaks, Stuxnet, Cyberwar, and Obama

    12/09/2010 5:39:21 AM PST · by Lakeshark · 23 replies
    The American Thinker ^ | 12/9/2010 | JR Dunn
    War is transforming itself before our eyes, turning into something unfamiliar and strange. Information has taken a place as a major class of weaponry, with sabotage and subterfuge as preferred tactics. On the new battlefield, these weapons are available not only to nation-states, but to organizations and even individuals. The Revolution in Military Affairs (RMA) is something that ought to be more widely known than it is.
  • EDITORIAL: Declare war on Wikileaks--The Pentagon looks defenseless against cyberwarfare

    10/25/2010 4:03:33 PM PDT · by jazusamo · 22 replies · 1+ views
    The Washington Times ^ | October 25, 2010 | Editorial
    The Wikileaks organization has morphed from a relatively harmless aid to government whistleblowers into a threat to U.S. national security. It should be treated accordingly. As with the July dump of Afghan war documents, the mainstream press has attempted to kindle story lines from the Iraq war data dump that imply scandal, particularly regarding civilian casualties. But once again, the information is underwhelming. There are no smoking guns except for some inconvenient truths about the actual existence of Saddam Hussein's weapons-of-mass-destruction program and Iranian involvement in Iraq's insurgency. For the most part, however, this type of information was well known...
  • Siemens: Stuxnet worm hit industrial systems

    09/16/2010 11:11:46 AM PDT · by cartan · 21 replies
    COMPUTERWORLD ^ | 2010-09-14 | Robert McMillan
    A sophisticated worm designed to steal industrial secrets and disrupt operations has infected at least 14 plants, according to Siemens. Called Stuxnet, the worm was discovered in July when researchers at VirusBlokAda found it on computers in Iran. It is one of the most sophisticated and unusual pieces of malicious software ever created—the worm leveraged a previously unknown Windows vulnerability (now patched) that allowed it to spread from computer to computer, typically via USB sticks. The worm, designed to attack Siemens industrial control systems, has not spread widely. However, it has affected a number of Siemens plants, according to company...
  • Does Microsoft's sharing of source code with China and Russia pose a security risk?

    08/12/2010 4:46:56 AM PDT · by Cindy · 7 replies
    ZDNET.com - Zero Day - Blog ^ | July 12, 2010, 7:04am PDT | By Dancho Danchev
    SNIPPET: "Oops, Microsoft did it again. Part of the company’s Government Security Program (GSP), Microsoft has offered the Russian Federal Security Service (FSB) a peek inside the source code of Microsoft Windows Server 2008 R2, Microsoft Office 2010 and Microsoft SQL Server. This is the second time that the company has (publicly) shared source code with the FSB, following a similar deal which took place in 2002, this time involving source code for Windows XP, Windows 2000 and Windows Server 2000. Microsoft has done similar deals with China in 2003, and most recently in 2010. However, in the light of...
  • Pentagon says military response to cyber attack possible

    05/13/2010 10:58:51 PM PDT · by ErnstStavroBlofeld · 8 replies · 312+ views
    AFP via Google News ^ | 5/12/2010 | AFP via Google News
    The Pentagon would consider a military response in the case of a cyber attack against the United States, a US defense official said on Wednesday. Asked about the possibility of using military force after a cyber assault, James Miller, undersecretary of defense for policy, said: "Yes, we need to think about the potential for responses that are not limited to the cyber domain." But he said it remained unclear what constituted an act of war in cyberspace. "Those are legal questions that we are attempting to address," Miller said at a conference in Washington, adding that "there are certainly a...
  • The Race to Build a Secure Operating System

    05/11/2010 5:27:57 PM PDT · by ErnstStavroBlofeld · 13 replies · 533+ views
    Defense Tech ^ | 5/11/2010 | Kevin Coleman
    In response to the continuous compromise of networks, multiple countries have begun developing secure platforms and operating systems. Computer companies, university researchers, defense R&D contractors and militaries around the world recognize the criticality of networks and embedded processors within their equipment. They also recognize how vulnerable they are and that’s why so much attention is being given to building in security at every level of the system including the operating system. As discussed here, China’s Trusted Computing Platform (TCP) program has been underway for some time now and can be traced back to the early 2000s. The Chinese TCP includes...
  • Obamalateral Disarmament

    04/06/2010 4:51:42 PM PDT · by Kaslin · 45 replies · 1,115+ views
    Investors.com ^ | April 6, 2010 | INVESTORS BUSINESS DAILY Staff
    National Security: Aiming at a world where nuclear weapons are obsolete, the administration's nuclear posture review leaves a world without American nuclear weapons and the backbone to use them. After his stunning bombing of Pearl Harbor in 1941, Japanese Adm. Isoroku Yamamoto lamented that all that had been accomplished was to awaken a sleeping giant and fill him with a terrible resolve. Under policies announced by the Obama administration, a devastating chemical or biological attack on this country might merely awaken our very own Hamlet and fill him with a terrible sense of angst. We have said before that rather...
  • China-Based Hackers Stole Indian Secrets

    04/06/2010 11:31:28 PM PDT · by myknowledge · 8 replies · 421+ views
    BEIJING—China-based hackers stole Indian national-security information, 1,500 emails from the Dalai Lama's office and other sensitive documents, a new report said Tuesday. Researchers at the University of Toronto said they were able to observe the hacking and trace it to core servers located in China and to people based in the southwestern city of Chengdu. The researchers said they monitored the hacking for the past eight months. The report said it has no evidence of involvement by the Chinese government, but it again put Beijing on the defensive. Separate reports earlier this year said security investigators had traced attacks on...
  • Hordes of Honkers Out To Raise Hell

    04/04/2010 9:16:46 PM PDT · by myknowledge · 11 replies · 553+ views
    Strategy Page ^ | April 4, 2010
    Many nations are taking advantage of the Internet to encourage, or even organize, patriotic Internet users to obtain hacking skills. This enables the government to use (often informally) these thousands of hackers to attack enemies (foreign or domestic.) These organizations arrange training and mentoring to improve the skills of group members. Turkey has over 44,000 of these hackers, Saudi Arabia has over 100,000, Iraq has over 40,000, Russia over 100,000 and China, over 400,000. While many of these Cyber Warriors are rank amateurs, even the least skilled can be given simple tasks. And out of their ranks will emerge more...
  • US Navy Wants to Field Cyber-Attack System

    03/31/2010 8:21:18 PM PDT · by ErnstStavroBlofeld · 12 replies · 379+ views
    Military.com ^ | 4/1/2010 | David A. Fulghum
    In 2018, the U.S. Navy hopes to take a major step toward fielding a cyber-attack system on a tactically survivable, fighter-size aircraft. Although researchers are cautious about discussing their cyberwarfare and electronic attack projects, one company states that it is "developing a weapon system that can deliver cyber-effects through free space into an aperture." That opaque explanation refers to a cyber-weapon, sized for a tactical aircraft or UAV, that can create a long-range data stream -- most likely from an active, electronically scanned array (AESA) emitter. The emitter will function both as radar and the source of these uniquely tailored...
  • Academic Paper in China Sets Off Alarms in U.S. (Cyber Attack on Electric Grid)

    03/22/2010 4:11:04 AM PDT · by edpc · 15 replies · 809+ views
    NYT ^ | John Markoff & David Barboza
    It came as a surprise this month to Wang Jianwei, a graduate engineering student in Liaoning, China, that he had been described as a potential cyberwarrior before the United States Congress. Larry M. Wortzel, a military strategist and China specialist, told the House Foreign Affairs Committee on March 10 that it should be concerned because “Chinese researchers at the Institute of Systems Engineering of Dalian University of Technology published a paper on how to attack a small U.S. power grid sub-network in a way that would cause a cascading failure of the entire U.S.”
  • US 'building top cyber defence team'

    03/04/2010 8:06:42 PM PST · by myknowledge · 14 replies · 460+ views
    Nine News ^ | March 4, 2010
    The United States is building an elite cyber defence team to guard the nation's public and private computer systems, Homeland Security Secretary Janet Napolitano said Wednesday. "We need the best brains we can bring to bear on meeting the challenge," Napolitano told computer security specialists at a premier RSA Conference. "We are building one of the best teams anywhere, but our success depends in no small part on our ability to collaborate with the private sector." She challenged those at the conference to join forces with the department and help teach people the importance of protecting themselves from online crooks...
  • Cyber warriors gather as online battles rage

    03/01/2010 12:59:04 AM PST · by xtinct · 28 replies · 1,807+ views
    Space War ^ | 2/28/10 | Staff Writers
    US national security leaders and top cyber warriors from around the world are gathering here to plot defenses against criminals and spies that increasingly plague the Internet. Homeland Security Secretary Janet Napolitano and White House Cyber Security Coordinator Howard Schmidt will take part in this week's RSA conference along with computer defense companies and technology icons such as Apple co-founder Steve Wozniak and Craigslist creator Craig Newmark. "We have before us more data moving into the cloud and more sophisticated cyber criminals," said Qualys chief executive Philippe Courtot, who is among the keynote speakers at the premier event that kicks...
  • Microsoft Officer Calls for Licensing Users of the Internet

    02/22/2010 11:16:54 AM PST · by John Semmens · 12 replies · 651+ views
    A Semi-News/Semi-Satire from AzConservative ^ | 20 February 2010 | John Semmens
    Citing the need to take stronger measures against cyber warfare, Craig Mundie, chief research and strategy officer for Microsoft, demanded that access to the Internet be restricted to “licensed drivers.” “We wouldn’t let a person get behind the wheel of a car without a license, so why should we allow just anyone with a computer to cruise the web?” Mundie asked. Mundie contended that by screening those who want to use the Internet, “governments could dramatically reduce the incidence of hostile actions against them. Making those who want to use the web prove they are no threat to the government...