Keyword: cyberwar
-
The Department of Justice has alleged that nine hackers with ties to the Iranian government engaged in a massive cybertheft scheme to steal scientific data and intellectual property from hundreds of U.S. and foreign universities, private companies and government agencies.
-
A huge range of security exploits, said to be worth over $2m if sold on the black market, have been leaked online.The tools are said to have been created by the US National Security Agency (NSA), and accompanying documents appear to indicate a possible breach of the Swift global banking system.Such a hack could have enabled the US to covertly monitor financial transactions, researchers said.The files were released by Shadow Brokers, a hacking group that has previously leaked malware.If genuine, it represents perhaps the most significant exposure of NSA files since the Edward Snowden leaks in 2013.On Twitter, Mr Snowden...
-
**TruePundit currently under Denial of Service Attack....
-
The FBI rounded up a network of deep-cover Russian spies last year after the group came close to placing an agent near a Cabinet official in the Obama administration, a senior FBI counterspy said Monday as the bureau released once-secret documents on the case. ...U.S. officials said it was Secretary of State Hillary Rodham Clinton. Mr. Figliuzzi said in an interview that the FBI decided to end its more than 10-year-long counterspy investigation of the network because of concerns that the spies were “getting very close to their objective.” “These 10 Russian officers were sent to the U.S. on a...
-
WASHINGTON—A suspected Chinese cyberattack on the website of a prominent Washington think tank drew a complaint from U.S. Attorney General Jeff Sessions this week in a meeting with top Chinese government officials. The website of the Hudson Institute crashed earlier this week, shortly before the organization was scheduled to host an event with Guo Wengui, a fugitive Chinese businessman and political dissident who has alleged corruption within China’s leadership. The Institute had several days earlier detected a Shanghai-based attack aimed at shutting down access to its website, according to a spokesman. The spokesman said the attack was foiled, and he...
-
President Barack Obama reportedly told Russian President Vladimir Putin in October that directly interfering with the U.S. election could result in an "armed conflict." According to NBC News, Obama opted to use the red phone to contact Moscow directly, a communication system that dates back to the Cold War. It's not an actual telephone, but instead sends a secure email message between the two countries. "International law, including the law for armed conflict, applies to actions in cyberspace," part of the Oct. 31 message read, according to NBC. "We will hold Russia to those standards."
-
The United States has reportedly been engaged in offensive cyberattacks against North Korea, but with no destructive results. According to a report by the Washington Post, President Donald Trump signed a directive earlier this year of putting pressure against North Korea that involved several diplomatic and cyber-military actions, including using cyber activities against the country.US Cyber Command DDoS-ed North Korea The United States Cyber Command, which was elevated to a Unified Combatant Command by the President earlier this year, targeted North Korea’s military spy agency, the Reconnaissance General Bureau. The attack was a distributed denial of service (DDoS) campaign with an aim...
-
A group calling itself the Islamic State hacking division has published the details of 1,400 mostly US military and government personnel, urging supporters to attack those listed. The spreadsheet, published online on Wednesday, exposes names, email addresses, phone numbers and passwords. Those listed include members of the marine corps, Nasa, the state department, air force and FBI. Supporters of Isis on Twitter seized on the breach, posting personal details of soldiers and government staffers and encouraging lone wolves to “act and kill”. A person claiming to speak for the group told the Guardian the information was obtained from military and...
-
EXCLUSIVE: Tech company which maintained Hillary's secret server was sued for 'illegally accessing' database and 'stealing White House military advisers' phone numbers' The Internet company used by Hillary Clinton to maintain her private server was sued for stealing dozens of phone lines including some which were used by the White House. Platte River Networks is said to have illegally accessed the master database for all US phone numbers. It also seized 390 lines in a move that created chaos across the US government. Among the phone numbers which the company took - which all suddenly stopped working - were lines...
-
The feds warned that “a group of malicious cyber actors,” whom security experts believe to be the government-sponsored hacking group known as APT6, “have compromised and stolen sensitive information from various government and commercial networks” since at least 2011, according to an FBI alert obtained by Motherboard. The alert, which is also available online, shows that foreign government hackers are still successfully hacking and stealing data from US government’s servers, their activities going unnoticed for years. This comes months after the US government revealed that a group of hackers, widely believed to be working for the Chinese government, had for...
-
Reports of satellite navigation problems in the Black Sea suggest that Russia may be testing a new system for spoofing GPS . On 22 June, the US Maritime Administration filed a seemingly bland incident report. The master of a ship off the Russian port of Novorossiysk had discovered his GPS put him in the wrong spot – more than 32 kilometres inland, at Gelendzhik Airport. After checking the navigation equipment was working properly, the captain contacted other nearby ships. Their AIS traces – signals from the automatic identification system used to track vessels – placed them all at the same...
-
As an advisor to the Department of Homeland Security, Mohammed Elibiary was given access to sensitive government documents. Now the Texas Muslim activist stands accused of leaking some of those documents to the media to spread charges of "Islamophobia."
-
Back in October 2010 I warned of the consequences of naming a stealth jihadist with ties to Islamic subversives whose stated goal is to "eliminate and destroy Western civilization from within and sabatoage its miserable house."more here ... Secretary Napolitano named devout Muslim Mohamed Elibiary to the Homeland Security Advisory Council (Department of Homeland Security.) Texas Department of Public Safety now says Homeland Security Advisory Council member Mohamed Elibiary may have been given access to a sensitive database of state and local intelligence reports, and then allegedly shopped some of those materials to a media outlet. Who else is the...
-
In a plot Tom Clancy might have dreamed up, an IT staffer who’d worked for Democrats in Congress was arrested by federal officials and charged with bank fraud. Fox News has reported that officers and agents from the U.S. Capitol Police, the FBI and Customs and Border Protection, were involved in the arrest of Imran Awan at Dulles International Airport not far from Washington, D.C., as he tried to fly away to Pakistan. Awan has pleaded not guilty to bank fraud, but his strange case has all the feeling of the opening scene of a movie that might soon include...
-
The rapid improvement in DNA sequencing has sparked a big data revolution in genomic sciences, which has in turn led to a proliferation of bioinformatics tools. To date, these tools have encountered little adversarial pressure. This paper evaluates the robustness of such tools if (or when) adversarial attacks manifest. We demonstrate, for the first time, the synthesis of DNA which — when sequenced and processed— gives an attacker arbitrary remote code execution. To study the feasibility of creating and synthesizing a DNA-based exploit, we performed our attack on a modified downstream sequencing utility with a deliberately introduced vulnerability. After sequencing,...
-
While the headlines over the past week have been swamped with coverage over the candidates bidding for the 2016 presidential election and a “trans-racial” NAACP leader lying about her race, critically important issues that are detrimental to our national security have gone virtually unnoticed. For instance, on Friday we learned that as many as 14 million current and former civilian U.S. government employees had their information compromised in an unprecedented attack by Chinese hackers. In a late Friday news dump, the Associated Press announced that the hackers stole, “Social Security numbers, military records and veterans’ status information, addresses, birth dates,...
-
Scandal: When federal officials arrested Rep. Debbie Wasserman Schultz's IT aide, Imran Awan, as he tried to flee for his native Pakistan, it was the latest twist to an already twisted scandal involving several House IT workers who possibly stole highly sensitive information from several Democrats. Stranger still has been the Democrats' nonresponse to this unfolding scandal. Back in February, the Capitol Hill police opened a criminal investigation into Awan and four other House employees who provided IT services for several Democrats, including those serving on the House intelligence, foreign affairs and homeland security committees. Investigators were looking into whether...
-
On November 19, 1919, Congress rejected the Versailles Treaty ending World War I and with it the charter of the League of Nations which was a key part of it. Principal among the reasons for the treaty’s rejection was a provision that committed the United States, along with the other members of the League, to the mutual defense of any member that was attacked militarily. Because treaties are the supreme law of the land — second only to the Constitution — Congress refused to surrender its power to declare war. Almost thirty years later, Congress ratified the NATO Treaty despite...
-
A criminal suspect in an investigation into a major security breach on the House of Representatives computer network has abruptly left the country and gone to Pakistan, where her family has significant assets and VIP-level protection, a relative and others told The Daily Caller News Foundation’s Investigative Group. Hina Alvi, her husband Imran Awan, and his brothers Abid and Jamal were highly paid shared IT administrators working for multiple House Democrats until their access to congressional IT systems was terminated Feb. 2 as a result of the investigation. Capitol Police confirmed the investigation is ongoing, but no arrests have been...
-
The heads of the Pentagon and the nation’s intelligence community have recommended to President Obama that the director of the National Security Agency, Adm. Michael S. Rogers, be removed. The recommendation, delivered to the White House last month, was made by Defense Secretary Ashton B. Carter and Director of National Intelligence James R. Clapper Jr., according to several U.S. officials familiar with the matter. Action has been delayed, some administration officials said, because relieving Rogers of his duties is tied to another controversial recommendation: to create separate chains of command at the NSA and the
|
|
|