Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Velveeta; DAVEY CROCKETT; WestCoastGal; MamaDearest

This is only a small part of the report, it also covers the fact that China pays for a Cuba site to monitor our important departments and explains a lot of the way the different systems work.


Weapons of Mass Destruction
Cyber Warfare and Telecommunications Espionage

http://66.102.7.104/search?q=cache:QPKxLnRNUXsJ:www.globalsecurity.org/wmd/library/news/cuba/oagmc029.htm+Cuban+biotechnology+sector+is+involved+in+a%0D%0A++%22biowarfare%22+effort&hl=en&start=9&ie=UTF-8&client=googlet

Conclusions

The United States' dependence on computers makes it more
vulnerable than most countries to cyberattack. The president's
Commission on Critical Infrastructure Protection has identified eight
critical areas in need of protection: information and
communications, electrical power systems, gas and oil industries,
banking and finance, transportation, water supply systems,
emergency services and government services.

Many traditional and non-traditional adversaries of the United
States-according to Louis J. Freeh, Director, FBI, today are
technological sophisticated and have modified their intelligence
methodologies to use advanced technologies to commit espionage.
In telecommunications, even some smaller (Cuba?) intelligence
adversaries now use equipment the FBI is unable to monitor.

The international terrorist threat can be divided- according again to
Louis J. Freeh- in three general categories. Each poses a serious
and distinct threat, and each has a presence in the United States.
The first and most important category, and the concern of this study,
is state-sponsored terrorism. It violates every convention of
international law. State sponsors of terrorism include Iran, Iraq,
Syria, Sudan, Cuba, and North Korea. Put simply, these nations view
terrorism as a tool of foreign policy.

Public and private sector organizations that rely on information
technologies are diverse. The result is a revolutionary and
systematic improvement in industrial, services, and commercial
processes. However, as commercial information technologies create
advantages, their increasingly indispensable nature transforms them
into high-value targets.

With very few exceptions, attacks against the nation's cyber assets
can be aggregated into one of four categories: crime, terrorism,
foreign intelligence, or war. Regardless of the category, any country
can acquire the capability to conduct limited attacks against
information systems.

Software is one weapon of information-based attacks. Such software
includes computer viruses, Trojan horses, worms, logic bombs and
eavesdropping sniffers. Advanced electronic hardware can also be
useful in information attacks. Examples of such hardware are
high-energy radio frequency(RF)weapons, electromagnetic pulse
weapons, RF jamming equipment, or RF interception equipment.

Such weapons can be used to destroy property and data; intercept
communications or modify traffic; reduce productivity; degrade the
integrity of data, communications, or navigation systems; and deny
crucial services to users of information and telecommunications
systems.

The Cuban government is well aware of this vulnerability. Hence,
major terrorists and intelligence services are quickly becoming
aware of exploiting the power of information tools and weapons. The
Cuban government is well aware of this vulnerability.

The increasing value of trade secrets in the global and domestic
marketplaces, and the corresponding spread of technology, have
combined to significantly increase both the opportunities and
methods for conducting electronic espionage.

The security of trade secrets is essential to maintaining the health
and competitiveness of critical segments of the U.S. economy. The
U.S. counterintelligence community has specifically identified the
suspicious collection and acquisition activities of foreign entities
from at least 23 countries, including Cuba.

Cuba has acquired the capacity to conduct cyberterrorism also
through simple technology transfer. There are multiple international
conferences on the subject. Anyone can attend these conferences.

There is a BEAMS conference that has gone on for 20 years, a
EUROEM conference that has gone on for over 20 years also. RF
weapons can be made today for a cost of $800 dollars. Therefore,
there is no need for a lot of power, or a lot of money to affect the
infrastructure. This technology application is quite under the
capabilities of Cuba's electronic development.

Electronic monitoring of communications signals will continue to be
the largest and most important form of secret intelligence. Cuba's
two main facilities-Lourdes and EWB- are quite capable of
monitoring telecommunications in the U.S., the Caribbean, and Latin
America.

Computers automatically analyze every call or data signal, and can
also identify calls to a target telephone number in U.S. no matter
from which country they originate. Both, Lourdes and EWB, are
highly computerized. They rely on near total interception of
international commercial and satellite communications in order to
locate the telephone or other messages of target individuals.

Cuba's intelligence activities against the United States have grown in
diversity and complexity in the past few years. Press reports of
recent espionage cases involving Russia, South Korea, China, and
Cuba are just the tip of a large and dangerous intelligence iceberg.

The director of the CIA stated before the Senate Select Committee
on Intelligence, 1998, that there are six countries presently
conducting electronic espionage that poses a threat to the United
States, they are: France, Israel, China, Russia, Iran, and Cuba.

Cuba represents a serious threat to the security of the United States
in the cyberwarfare phase of terrorism.


END


Ing. Manuel Cereijo
Miami, Florida.
September 1999




2,207 posted on 06/27/2005 12:34:46 PM PDT by nw_arizona_granny (Wake up call: It is time to fight the "Enemy Within".)
[ Post Reply | Private Reply | To 2206 | View Replies ]


To: nw_arizona_granny; MamaDearest; All
Granny don't worry about China LOL the Russian Mafia have been hacking our computers since the cold war was over....this is an old article again! LOL

US’s special services, the FBI in particular, constantly warns Americans of the greatest danger of mafia groups from the former Soviet Union, Interactive Week reports.

Russian hackers crack commercial sites, steal credit card numbers, and launch destructive computer viruses; at that, the Russian mafia is becoming more and more experienced in computer crimes.

According to statistics published by the FBI, organized criminal groups from Eastern Europe managed to steal over one million credit card numbers and crack Internet sites of over 40 companies in 20 US states. The Russian mafia is mentioned at that as the main threat to development of American e-commerce.

Extract from Red Mafia by Robert Friedman: “The scale of crimes committed by the Russian mafia is enormous. Murky deals involving diamonds, gasoline, medical insurance, and drug traffic have exceeded $1 billion in total. It is an unprecedented sum! There are 30 syndicates of the Russian mafia operating in North America; they are concentrated in 17 towns at least.”

Google search...
Web Results 1 - 10 of about 28,200 for russian mafia hackers

http://www.google.com/search?q=russian+mafia+hackers&hl=en&lr=&start=0&sa=N
2,244 posted on 06/27/2005 8:58:01 PM PDT by DAVEY CROCKETT (Character exalts Liberty and Freedom, Righteous exalts a Nation.)
[ Post Reply | Private Reply | To 2207 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson