Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $9,038
11%  
Woo hoo!! And we're now over 11%!! Thank you all very much!! God bless.

Keyword: cyberwarfare

Brevity: Headers | « Text »
  • Touched By The Bear

    02/04/2010 11:01:16 PM PST · by myknowledge · 3 replies · 340+ views
    Strategy Page ^ | February 3, 2010
    In the last few months, major Russian newspapers, that have been critical of the government, have been attacked by hackers. Currently, Novaya Gazeta, highly respected for its investigative reporting, has had its web site shut down by hackers for a week (via a powerful DDOS attack). Novaya Gazeta publishes three issues a week, and its reporting is picked up globally via its web site. Novaya Gazeta's reporting has certainly upset some people, as four of their reporters have been murdered in the past nine years. Last November, hackers broke into the web site of mass audience (circulation of a million)...
  • Hackers Versus The 24th Air Force

    02/04/2010 10:39:38 PM PST · by myknowledge · 3 replies · 275+ views
    Strategy Page ^ | February 2, 2010
    Less than two years after the U.S. Air Force officially dumped its planned Cyber Command, it's scaled-back replacement, the 24th Air Force, recently officially opened for business. Over the past five years, the air force has been trying to establish a new Cyber War operation and use it to gain overall control for all Department of Defense Cyber War activities. The other services were not keen on this. That resistance, plus internal problems (losing track of nuclear weapons, cost overruns on new aircraft, inability to perform on the battlefield) led to the Cyber Command operation being scaled back to being...
  • Israel Defence Forces are prepared for Cyberwarfare

    02/04/2010 7:28:11 PM PST · by ErnstStavroBlofeld · 189+ views
    Defense Professionals ^ | 02/04/2010 | Arnon Ben-Dror
    In a paper published by the head of the Military Intelligence Directorate, Major General Amos Yadlin of the Israel Defence Forces (IDF), in the Intelligence Research Center Journal, described the development of cyberwarfare, computer attacks in the 21st century, and the capabilities required from armies to fight this medium successfully. According to Maj. Gen. Yadlin, cyberwarfare is divided into three areas: intelligence gathering, defense and attack. "Anyone who is able to hack (personal computers, cell phones and internet) ends up knowing quite a lot. If you catch my drift," warned the Military Intelligence chief in the article. "Just imagine the...
  • Space, Cyberspace Viewed as Likely Battlegrounds for U.S. in 21st Century

    01/29/2010 2:38:16 PM PST · by ErnstStavroBlofeld · 1 replies · 141+ views
    Space News ^ | 1/29/2010 | Turner Brinton
    The United States faces an evolving list of potential adversaries in the 21st century that not only continue to seek weapons of mass destruction, but are honing the skills necessary to wage battle in cyberspace as well as outer space, a panel of national security experts said Jan. 20. The nature of warfare has changed significantly since the end of the 20th century, with new technologies and threats emerging faster than ever, U.S. Air Force Gen. Robert Kehler, commander of Air Force Space Command, said during a panel discussion at the Conference on National Security Strategy and Policy here. The...
  • Experts: US gov't needs to prepare for cyberwar (no more nice guy to Chicom?)

    01/28/2010 10:03:50 AM PST · by TigerLikesRooster · 1 replies · 236+ views
    Network World ^ | 01/27/10 | Grant Gross
    Experts: US gov't needs to prepare for cyberwar Cyberwar is difficult to define, but the U.S. needs a strategy, a group of experts says By Grant Gross, IDG News Service January 27, 2010 04:31 PM ET Sponsored by: The U.S. government needs to figure out how it will respond to acts of cyberwar, as foreign governments increasingly look to gain advantages in cyberspace, a group of cybersecurity experts said Wednesday. One problem, however, is that there wasn't consensus among the panelists on what exactly constitutes an act of war in cyberspace. The U.S. military has used cyberattacks to disrupt enemy...
  • South Korea Is At War

    01/19/2010 2:44:24 AM PST · by myknowledge · 224+ views
    Strategy Page ^ | January 18, 2010
    In South Korea, the Ministry of Defense has got its new Cyber War Center operational . In addition to this military Cyber War unit, South Korea is forming a cyber police force to help protect commercial and government organizations from hackers. The new organization is part of the National Intelligence Service (South Korea's CIA) and hired 3,000 Internet security experts. These agents work with victims of Internet crime, coordinating the use of other government agencies to catch the hackers, and develop improved security. All of this is in response to the growing number of Internet based attacks coming from North...
  • Reports On Nonkinetic Weapons Mixed

    12/12/2009 11:11:18 PM PST · by ErnstStavroBlofeld · 8 replies · 824+ views
    Aviation Week and Space Technology ^ | 11/11/2009 | David A. Fulghum/Douglas Barrie
    The report card is mixed regarding next-generation nonkinetic, or limited effects, weaponry ­developed by the U.S. and its allies. Cyber-warfare turns on three critical aspects--attack, defense and assessment. Information-technology industry officials say attack capabilities are receiving attention and funding. Defenses against cyber-attack have begun attracting support because of persistent adversaries who flourish in the Wild West atmosphere of the Russian and Chinese cyber-worlds. The big shortfall, they agree, is in battle damage assessment (BDA). "I'm trying to render an enemy system nonfunctional with a nonkinetic attack," says John Osterholz, BAE Systems vice president for integrated cyber-warfare and cyber-security. "How do...
  • Naval Academy to add lesson on cyberwarfare

    12/07/2009 7:20:59 PM PST · by HokieMom · 4 replies · 311+ views
    The Washington Times ^ | December 8, 2009 | AP
    ANNAPOLIS | U.S. Naval Academy officials said Monday that they were exploring ways of working knowledge about cyberwarfare into the core curriculum for all students because of the rising significance of cybersecurity. Right now, the academy offers some elective courses, classes mostly taken by computer science and information technology majors. But unlike the U.S. Military Academy at West Point in New York and the U.S. Air Force Academy in Colorado Springs, the Annapolis school does not even have a club for students interested in the field. "On a bunch of different levels, in terms of opening up to cyberwarfare, outside...
  • CT-Sen. 2010: Peter Schiff's website hit by cyber attacks

    11/09/2009 12:07:41 PM PST · by rabscuttle385 · 12 replies · 1,448+ views
    The Hartford Courant ^ | 2009-11-05 | Daniela Altimari
    Peter Schiff's campaign website has been repeatedly targeted by cyber attackers, his brother and spokesman said this afternoon. The campaign has notified the FBI. Schiff, a Republican running for U.S. Senate, had planned a "moneybomb'' -- a one-day online fundraising blitz -- for today, but just minutes before midnight, when the moneybomb was set to start, the website went down, his brother, Andrew Schiff, said. "These are coordinated attacks,'' Andrew Schiff said in a brief phone interview. It wasn't the first time the website has been hit, Andrew Schiff said. The campaign had been targeted several times in the past...
  • You Nork Bastards Will Pay For This

    11/06/2009 10:36:59 PM PST · by myknowledge · 12 replies · 697+ views
    Strategy Page ^ | November 4, 2009
    November 4, 2009: South Korea has confirmed suspicions that Internet based attacks earlier this year came from "the norks" (North Korea). The South Korean NIS (National Intelligence Service) has completed its investigation of the route the July attacks took, and has traced the origin back to the North Korean Ministry of Post and Telecommunications facilities. While there was no apparent damage from the July attacks (which hit government sites in South Korea and the United States), similar attacks have made away with secret data. For example, the South Korean military recently reported that someone hacked into a classified network, and...
  • North Korea Fingered Again in Hacking 'Revelations'

    10/18/2009 5:41:31 PM PDT · by Cindy · 4 replies · 408+ views
    UBIWAR.com ^ | 18 October 2009 at 15:17 | Tim Stevens
    SNIPPET: "After the 4 July DDoS attacks, wrongly attributed to North Korea, it’s wise to treat reports of DPRK security hacks with some caution. Nevertheless, The Korea Times reports the following: Classified Info on Dangerous Chemicals Hacked Hackers stole classified information on dangerous chemicals in their raid on the South Korean army computer network in what was believed to be an attack by North Korea, Yonhap News Agency reported Saturday, quoting government officials." SNIPPET: "The Sydney Morning Herald adds more information: A North Korea cyber warfare unit hacked into a South Korean military command earlier this year and stole some...
  • NKorea looks to unconventional warfare: US general

    09/30/2009 6:05:37 PM PDT · by ErnstStavroBlofeld · 4 replies · 708+ views
    Space War ^ | 9/29/2009 | AFP
    North Korea is increasingly focused on cyber warfare, improvised explosives and missile technology as the regime fears it would be defeated in a direct confrontation with US and South Korean forces, a US commander said on Tuesday. The emphasis on unconventional methods comes amid signs North Korean leader Kim Jong-Il appears to be firmly "in charge" and in decent health, General Walter Sharp, commander of US forces in Korea, told reporters on Tuesday. "I think the North Koreans probably realized they could not win in a normal conventional all-out attack," Sharp said. Given the strength of South Korean and US...
  • Could The Feds Seize The Internet?

    09/02/2009 5:34:24 PM PDT · by Kaslin · 28 replies · 2,524+ views
    IBD Editorials ^ | September 2, 2009 | INVESTORS BUSINESS DAILY Staff
    Security: A Senate bill lets the president "declare a cybersecurity emergency" relating to "nongovernmental" computer networks and do what's needed to respond to the threat. Didn't they just collect our e-mail addresses?We wish this was just a piece of the fictional "Dr. Strangelove" that fell to the cutting-room floor, but it's not. It is a real piece of disturbingly vague legislation sponsored by Sens. Jay Rockefeller, D-W.Va., Bill Nelson, D-Fla., and Olympia Snowe, R-Maine. Senate Bill 773 would grant the administration emergency powers (where have we heard that before?) in the event of a cyberemergency that the president would have...
  • Federal agency Web sites knocked out by massive, resilient cyber attack

    07/07/2009 8:36:00 PM PDT · by STARWISE · 19 replies · 1,421+ views
    Chicago Tribune/AP ^ | 7-7-09 | Lolita Baldor
    A widespread and unusually resilient computer attack that began July 4 knocked out the Web sites of several government agencies, including some that are responsible for fighting cyber crime, The Associated Press has learned. The Treasury Department, Secret Service, Federal Trade Commission and Transportation Department Web sites were all down at varying points over the holiday weekend and into this week, according to officials inside and outside the government. Some of the sites were still experiencing problems Tuesday evening. Cyber attacks on South Korea government and private sites also may be linked, officials there said. U.S. officials refused to publicly...
  • China's 'secure' OS Kylin - a threat to U.S. offensive cyber capabilities?

    06/02/2009 11:58:03 PM PDT · by Cindy · 8 replies · 518+ views
    Blogs.ZDNET.com ^ | May 13, 2009, 6:23 am | Dancho Danchev
    May 13th, 2009 China's 'secure' OS Kylin - a threat to U.S offensive cyber capabilities? Posted by Dancho Danchev @ 6:23 am Categories: Browsers, Complex Attacks, Governments, Hackers, Kernel-level Exploits... Tags: China, Operating System, Operating Systems, Linux, Software... Picture a cyber warfare arms race where the participating countries have spent years of building offensive cyber warfare capabilities by exploiting the monoculture on one another’s IT infrastructure. Suddenly, one of the countries starts migrating to a hardened operating system of its own, and by integrating it on systems managing the critical infrastructure it successfully undermines the offensive cyber warfare capabilities developed...
  • Code-cracking and computers ( WWII and German Codes )

    05/31/2009 9:41:54 AM PDT · by Ernest_at_the_Beach · 39 replies · 1,375+ views
    BBC ^ | Thursday, 6 November 2008 | Mark Ward Technology correspondent, BBC News
    By the end of WWII, 11 Colossus machines were in use Bletchley Park is best known for the work done on cracking the German codes and helping to bring World War II to a close far sooner than might have happened without those code breakers. But many believe Bletchley should be celebrated not just for what it ended but also for what it started - namely the computer age. The pioneering machines at Bletchley were created to help codebreakers cope with the enormous volume of enciphered material the Allies managed to intercept. The machine that arguably had the greatest influence...
  • China Updates Government,Military Computers With New Secure Operating System

    05/14/2009 3:24:53 PM PDT · by Flavius · 22 replies · 749+ views
    nas ^ | 5/14/09 | nasdaq
    -China has installed a secure operating system known as " Kylin" on government and military computers designed to be impenetrable to U.S. military and intelligence agencies, The Washington Times reported on Tuesday. The newspaper said the existence of the secure operating system was disclosed to Congress during recent hearings that included new details on how China's government is preparing to wage cyberwarfare with the U.S.
  • The First War In Cyberspace

    05/26/2009 3:29:39 AM PDT · by Scanian · 5 replies · 652+ views
    The American Thinker ^ | May 26, 2009 | Ed Timperlake
    Cyberwar is now a fact of life in 21st Century wars. Actual and potential enemies of America already know the dimensions of Cyberwar and have moved into full combat. With a real world combat engagement in Georgia and Estonia, the Russians have shown skill. Make no mistake; in certain arenas the Russians are smart and capable, and as the invasion of Georgia shows, ruthless. They have world class scientists and engineers. It is well known they are excellent Cyber Warfighters who have now also apparently harnessed their criminal hackers to augment their worldwide reach. This melding of Russian conventional military...
  • Cyberwar, Cadets Trade the Trenches for Firewalls

    05/11/2009 7:58:02 AM PDT · by Republican Party Reptile · 5 replies · 401+ views
    New York Times ^ | May 11 2009 | COREY KILGANNON and NOAM COHEN
    WEST POINT, N.Y. — The Army forces were under attack. Communications were down, and the chain of command was broken. Pacing a makeshift bunker whose entrance was camouflaged with netting, the young man in battle fatigues barked at his comrades: “They are flooding the e-mail server. Block it. I’ll take the heat for it.” These are the war games at West Point, at least last month, when a team of cadets spent four days struggling around the clock to establish a computer network and keep it operating while hackers from the National Security Agency in Maryland tried to infiltrate it...
  • COVERT RADIO SHOW - The Daily Blast [CYBERWARFARE;More]

    05/07/2009 2:57:53 PM PDT · by Cindy · 4 replies · 262+ views
    COVERT RADIO SHOW http://covertradioshow.com # http://covertradioshow.com/podcast.cfm?pid=187 Covert Radio Daily Blast May 7 North Korea has hackers working round the clock on cyberwarfare. Could they have been behind recent attacks on the Alaskan Air Traffic Control system? Are we prepared for Cyber Warfare? Narco Traffickers are declaring war on our cops, and the latest in the coming war between Georgia and Russia.