Free Republic 2nd Qtr 2024 Fundraising Target: $81,000 Receipts & Pledges to-date: $15,231
18%  
Woo hoo!! And we're now over 18%!! Thank you all very much!! God bless.

Keyword: cyberwarfare

Brevity: Headers | « Text »
  • Body of murdered cyberwar expert found in landfill (Military man dumped into three-ring whodunit)

    01/05/2011 8:12:45 PM PST · by smoothsailing · 36 replies
    The Register ^ | 1-5-2010 | Dan Goodin
    Body of murdered cyberwar expert found in landfill Military man dumped into three-ring whodunit Dan Goodin January 5, 2010 The body of a decorated US Army officer was found dumped in a Delaware landfill on New Years Eve day, a few days after he expressed concern that the nation wasn't adequately prepared for cyber warfare, according to news reports following the bizarre whodunit. Events surrounding the murder of John P. Wheeler III, who most recently worked part-time for defense contractor Mitre Corporation on cyber defense topics, read like a Tom Clancy novel. The 66-year-old worked for three Republican administrations, was...
  • Protecting Our Protectors (Oliver North)

    12/09/2010 5:08:53 PM PST · by jazusamo · 8 replies · 1+ views
    Creators Syndicate ^ | December 9, 2010 | Oliver North
          WASHINGTON — It's a tough time to be a member of the U.S. armed forces. Those serving in our all-volunteer military — and their families — are stretched and stressed by more than nine years of war. Unfortunately, our commander in chief — supposedly the champion of our soldiers, sailors, airmen, guardsmen and Marines — isn't doing anything to make serving in uniform any easier. President Barack Obama — fresh from his 3 1/2-hour "visit" to Afghanistan — continues to insist that the U.S. Senate act immediately to allow active homosexuals to serve in the military....
  • WikiLeaks, Stuxnet, Cyberwar, and Obama

    12/09/2010 5:39:21 AM PST · by Lakeshark · 23 replies
    The American Thinker ^ | 12/9/2010 | JR Dunn
    War is transforming itself before our eyes, turning into something unfamiliar and strange. Information has taken a place as a major class of weaponry, with sabotage and subterfuge as preferred tactics. On the new battlefield, these weapons are available not only to nation-states, but to organizations and even individuals. The Revolution in Military Affairs (RMA) is something that ought to be more widely known than it is.
  • EDITORIAL: Declare war on Wikileaks--The Pentagon looks defenseless against cyberwarfare

    10/25/2010 4:03:33 PM PDT · by jazusamo · 22 replies · 1+ views
    The Washington Times ^ | October 25, 2010 | Editorial
    The Wikileaks organization has morphed from a relatively harmless aid to government whistleblowers into a threat to U.S. national security. It should be treated accordingly. As with the July dump of Afghan war documents, the mainstream press has attempted to kindle story lines from the Iraq war data dump that imply scandal, particularly regarding civilian casualties. But once again, the information is underwhelming. There are no smoking guns except for some inconvenient truths about the actual existence of Saddam Hussein's weapons-of-mass-destruction program and Iranian involvement in Iraq's insurgency. For the most part, however, this type of information was well known...
  • Siemens: Stuxnet worm hit industrial systems

    09/16/2010 11:11:46 AM PDT · by cartan · 21 replies
    COMPUTERWORLD ^ | 2010-09-14 | Robert McMillan
    A sophisticated worm designed to steal industrial secrets and disrupt operations has infected at least 14 plants, according to Siemens. Called Stuxnet, the worm was discovered in July when researchers at VirusBlokAda found it on computers in Iran. It is one of the most sophisticated and unusual pieces of malicious software ever created—the worm leveraged a previously unknown Windows vulnerability (now patched) that allowed it to spread from computer to computer, typically via USB sticks. The worm, designed to attack Siemens industrial control systems, has not spread widely. However, it has affected a number of Siemens plants, according to company...
  • Does Microsoft's sharing of source code with China and Russia pose a security risk?

    08/12/2010 4:46:56 AM PDT · by Cindy · 7 replies
    ZDNET.com - Zero Day - Blog ^ | July 12, 2010, 7:04am PDT | By Dancho Danchev
    SNIPPET: "Oops, Microsoft did it again. Part of the company’s Government Security Program (GSP), Microsoft has offered the Russian Federal Security Service (FSB) a peek inside the source code of Microsoft Windows Server 2008 R2, Microsoft Office 2010 and Microsoft SQL Server. This is the second time that the company has (publicly) shared source code with the FSB, following a similar deal which took place in 2002, this time involving source code for Windows XP, Windows 2000 and Windows Server 2000. Microsoft has done similar deals with China in 2003, and most recently in 2010. However, in the light of...
  • Pentagon says military response to cyber attack possible

    05/13/2010 10:58:51 PM PDT · by ErnstStavroBlofeld · 8 replies · 312+ views
    AFP via Google News ^ | 5/12/2010 | AFP via Google News
    The Pentagon would consider a military response in the case of a cyber attack against the United States, a US defense official said on Wednesday. Asked about the possibility of using military force after a cyber assault, James Miller, undersecretary of defense for policy, said: "Yes, we need to think about the potential for responses that are not limited to the cyber domain." But he said it remained unclear what constituted an act of war in cyberspace. "Those are legal questions that we are attempting to address," Miller said at a conference in Washington, adding that "there are certainly a...
  • The Race to Build a Secure Operating System

    05/11/2010 5:27:57 PM PDT · by ErnstStavroBlofeld · 13 replies · 533+ views
    Defense Tech ^ | 5/11/2010 | Kevin Coleman
    In response to the continuous compromise of networks, multiple countries have begun developing secure platforms and operating systems. Computer companies, university researchers, defense R&D contractors and militaries around the world recognize the criticality of networks and embedded processors within their equipment. They also recognize how vulnerable they are and that’s why so much attention is being given to building in security at every level of the system including the operating system. As discussed here, China’s Trusted Computing Platform (TCP) program has been underway for some time now and can be traced back to the early 2000s. The Chinese TCP includes...
  • Obamalateral Disarmament

    04/06/2010 4:51:42 PM PDT · by Kaslin · 45 replies · 1,115+ views
    Investors.com ^ | April 6, 2010 | INVESTORS BUSINESS DAILY Staff
    National Security: Aiming at a world where nuclear weapons are obsolete, the administration's nuclear posture review leaves a world without American nuclear weapons and the backbone to use them. After his stunning bombing of Pearl Harbor in 1941, Japanese Adm. Isoroku Yamamoto lamented that all that had been accomplished was to awaken a sleeping giant and fill him with a terrible resolve. Under policies announced by the Obama administration, a devastating chemical or biological attack on this country might merely awaken our very own Hamlet and fill him with a terrible sense of angst. We have said before that rather...
  • China-Based Hackers Stole Indian Secrets

    04/06/2010 11:31:28 PM PDT · by myknowledge · 8 replies · 421+ views
    BEIJING—China-based hackers stole Indian national-security information, 1,500 emails from the Dalai Lama's office and other sensitive documents, a new report said Tuesday. Researchers at the University of Toronto said they were able to observe the hacking and trace it to core servers located in China and to people based in the southwestern city of Chengdu. The researchers said they monitored the hacking for the past eight months. The report said it has no evidence of involvement by the Chinese government, but it again put Beijing on the defensive. Separate reports earlier this year said security investigators had traced attacks on...
  • Hordes of Honkers Out To Raise Hell

    04/04/2010 9:16:46 PM PDT · by myknowledge · 11 replies · 553+ views
    Strategy Page ^ | April 4, 2010
    Many nations are taking advantage of the Internet to encourage, or even organize, patriotic Internet users to obtain hacking skills. This enables the government to use (often informally) these thousands of hackers to attack enemies (foreign or domestic.) These organizations arrange training and mentoring to improve the skills of group members. Turkey has over 44,000 of these hackers, Saudi Arabia has over 100,000, Iraq has over 40,000, Russia over 100,000 and China, over 400,000. While many of these Cyber Warriors are rank amateurs, even the least skilled can be given simple tasks. And out of their ranks will emerge more...
  • US Navy Wants to Field Cyber-Attack System

    03/31/2010 8:21:18 PM PDT · by ErnstStavroBlofeld · 12 replies · 379+ views
    Military.com ^ | 4/1/2010 | David A. Fulghum
    In 2018, the U.S. Navy hopes to take a major step toward fielding a cyber-attack system on a tactically survivable, fighter-size aircraft. Although researchers are cautious about discussing their cyberwarfare and electronic attack projects, one company states that it is "developing a weapon system that can deliver cyber-effects through free space into an aperture." That opaque explanation refers to a cyber-weapon, sized for a tactical aircraft or UAV, that can create a long-range data stream -- most likely from an active, electronically scanned array (AESA) emitter. The emitter will function both as radar and the source of these uniquely tailored...
  • Academic Paper in China Sets Off Alarms in U.S. (Cyber Attack on Electric Grid)

    03/22/2010 4:11:04 AM PDT · by edpc · 15 replies · 809+ views
    NYT ^ | John Markoff & David Barboza
    It came as a surprise this month to Wang Jianwei, a graduate engineering student in Liaoning, China, that he had been described as a potential cyberwarrior before the United States Congress. Larry M. Wortzel, a military strategist and China specialist, told the House Foreign Affairs Committee on March 10 that it should be concerned because “Chinese researchers at the Institute of Systems Engineering of Dalian University of Technology published a paper on how to attack a small U.S. power grid sub-network in a way that would cause a cascading failure of the entire U.S.”
  • US 'building top cyber defence team'

    03/04/2010 8:06:42 PM PST · by myknowledge · 14 replies · 460+ views
    Nine News ^ | March 4, 2010
    The United States is building an elite cyber defence team to guard the nation's public and private computer systems, Homeland Security Secretary Janet Napolitano said Wednesday. "We need the best brains we can bring to bear on meeting the challenge," Napolitano told computer security specialists at a premier RSA Conference. "We are building one of the best teams anywhere, but our success depends in no small part on our ability to collaborate with the private sector." She challenged those at the conference to join forces with the department and help teach people the importance of protecting themselves from online crooks...
  • Cyber warriors gather as online battles rage

    03/01/2010 12:59:04 AM PST · by xtinct · 28 replies · 1,807+ views
    Space War ^ | 2/28/10 | Staff Writers
    US national security leaders and top cyber warriors from around the world are gathering here to plot defenses against criminals and spies that increasingly plague the Internet. Homeland Security Secretary Janet Napolitano and White House Cyber Security Coordinator Howard Schmidt will take part in this week's RSA conference along with computer defense companies and technology icons such as Apple co-founder Steve Wozniak and Craigslist creator Craig Newmark. "We have before us more data moving into the cloud and more sophisticated cyber criminals," said Qualys chief executive Philippe Courtot, who is among the keynote speakers at the premier event that kicks...
  • Microsoft Officer Calls for Licensing Users of the Internet

    02/22/2010 11:16:54 AM PST · by John Semmens · 12 replies · 651+ views
    A Semi-News/Semi-Satire from AzConservative ^ | 20 February 2010 | John Semmens
    Citing the need to take stronger measures against cyber warfare, Craig Mundie, chief research and strategy officer for Microsoft, demanded that access to the Internet be restricted to “licensed drivers.” “We wouldn’t let a person get behind the wheel of a car without a license, so why should we allow just anyone with a computer to cruise the web?” Mundie asked. Mundie contended that by screening those who want to use the Internet, “governments could dramatically reduce the incidence of hostile actions against them. Making those who want to use the web prove they are no threat to the government...
  • Touched By The Bear

    02/04/2010 11:01:16 PM PST · by myknowledge · 3 replies · 340+ views
    Strategy Page ^ | February 3, 2010
    In the last few months, major Russian newspapers, that have been critical of the government, have been attacked by hackers. Currently, Novaya Gazeta, highly respected for its investigative reporting, has had its web site shut down by hackers for a week (via a powerful DDOS attack). Novaya Gazeta publishes three issues a week, and its reporting is picked up globally via its web site. Novaya Gazeta's reporting has certainly upset some people, as four of their reporters have been murdered in the past nine years. Last November, hackers broke into the web site of mass audience (circulation of a million)...
  • Hackers Versus The 24th Air Force

    02/04/2010 10:39:38 PM PST · by myknowledge · 3 replies · 275+ views
    Strategy Page ^ | February 2, 2010
    Less than two years after the U.S. Air Force officially dumped its planned Cyber Command, it's scaled-back replacement, the 24th Air Force, recently officially opened for business. Over the past five years, the air force has been trying to establish a new Cyber War operation and use it to gain overall control for all Department of Defense Cyber War activities. The other services were not keen on this. That resistance, plus internal problems (losing track of nuclear weapons, cost overruns on new aircraft, inability to perform on the battlefield) led to the Cyber Command operation being scaled back to being...
  • Israel Defence Forces are prepared for Cyberwarfare

    02/04/2010 7:28:11 PM PST · by ErnstStavroBlofeld · 189+ views
    Defense Professionals ^ | 02/04/2010 | Arnon Ben-Dror
    In a paper published by the head of the Military Intelligence Directorate, Major General Amos Yadlin of the Israel Defence Forces (IDF), in the Intelligence Research Center Journal, described the development of cyberwarfare, computer attacks in the 21st century, and the capabilities required from armies to fight this medium successfully. According to Maj. Gen. Yadlin, cyberwarfare is divided into three areas: intelligence gathering, defense and attack. "Anyone who is able to hack (personal computers, cell phones and internet) ends up knowing quite a lot. If you catch my drift," warned the Military Intelligence chief in the article. "Just imagine the...
  • Space, Cyberspace Viewed as Likely Battlegrounds for U.S. in 21st Century

    01/29/2010 2:38:16 PM PST · by ErnstStavroBlofeld · 1 replies · 141+ views
    Space News ^ | 1/29/2010 | Turner Brinton
    The United States faces an evolving list of potential adversaries in the 21st century that not only continue to seek weapons of mass destruction, but are honing the skills necessary to wage battle in cyberspace as well as outer space, a panel of national security experts said Jan. 20. The nature of warfare has changed significantly since the end of the 20th century, with new technologies and threats emerging faster than ever, U.S. Air Force Gen. Robert Kehler, commander of Air Force Space Command, said during a panel discussion at the Conference on National Security Strategy and Policy here. The...