Free Republic 3rd Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $34,511
39%  
Woo hoo!! And the first 39% is in!! Thank you all very much!!

Keyword: cyberwarfare

Brevity: Headers | « Text »
  • Cyber-Security Expert: North Korea Takes Credit for NYSE Attack – No Coincidences – This Is Major

    07/08/2015 6:24:17 PM PDT · by Nachum · 34 replies
    The Gateway Pundit ^ | 7/8/15 | Jim Hoft
    Cyber-Security expert Greg Keeley said the North Koreans are taking credit for the “glitch” that took down the New York Stock Exchange today. Keeley said there is no way these several glitches are not connected. And that may very well be possible. “For the administration to come out so hard and so fast and say this was not an attack I think is disingenuous… This is a major attack and for us to bury our head in the sand is very troubling.”
  • Is St. Louis under a cyber attack? Threat map points to China

    07/08/2015 2:01:03 PM PDT · by mojito · 42 replies
    Fox News ^ | 7/8/2015 | Joe Millizter
    Is St. Louis at the center of a cyber attack from China? A company that monitors threats on the internet shows a large amount of traffic headed into the area from China. According to Norsecorp’s Twitter profile they offer, “Live threat intelligence & unmatched visibility into the darkest corners of the Internet.” A map on the company’s website shows a lot of activity coming from locations in china to IP addresses located mostly in St. Louis, Kirksville and Seattle. The majority of targets listed in the map are located in the US with origins in China.
  • Hackers ruin Bundestag computer network

    06/11/2015 11:54:35 PM PDT · by Olog-hai · 7 replies
    TheLocal.de ^ | 11 Jun 2015 08:59 GMT+02:00 | (DPA/The Local)
    A hacker attack on the Bundestag (German parliament) earlier in 2015 means that an entirely new network will have to be built after experts failed to fix the breach. The Federal Office of Information Technology Security (BSI) decided that it could no longer defend against the attack and had to give up, broadcasters NDR and WDR and the Süddeutsche Zeitung reported on Thursday. Der Spiegel reported on Wednesday evening that data was still flowing out of the parliament to unknown recipients, and that rebuilding the network using completely new hardware would take months and cost millions. …
  • Hackers nabbed data on every federal employee, union claims

    06/11/2015 10:09:38 PM PDT · by dennisw · 15 replies
    FoxNews.com ^ | June 12, 2015
    A major cyberattack on U.S. federal personnel data was far graver than the Obama administration has acknowledged, with hackers obtaining information on every federal employee, the president of a government workers union claimed Thursday. In a letter to the director of the Office of Personnel Management (OPM), J. David Cox, national president of the American Federation of Government Employees (AFGE), said that based on the information provided by the OPM, the hack was much broader than previously thought. “Based on the sketchy information OPM has provided, we believe that the Central Personnel Data File was the targeted database, and that...
  • Wow – The Federal Cyber Breach Was Not Discovered By U.S. Govt., Was Discovered By Private Company

    06/11/2015 6:25:34 PM PDT · by sheikdetailfeather · 16 replies
    The Conservative Treehouse ^ | 6-11-15 | sundance
    WASHINGTON DC – As officials of the Obama administration announced that millions of sensitive records associated with current and past federal employees and contractors had been exposed by a long-running infiltration of the networks and systems of the Office of Personnel Management on June 4, they claimed the breach had been found during a government effort to correct problems with OPM’s security. An OPM statement on the attack said that the agency discovered the breach as it had “undertaken an aggressive effort to update its cybersecurity posture.” And a DHS spokesperson told Ars that “interagency partners” were helping the OPM...
  • Job Title Key to Inner Access Held by Snowden

    07/01/2013 12:18:24 PM PDT · by Ernest_at_the_Beach · 16 replies
    NY Times ^ | June 30, 2013 | By SCOTT SHANE and DAVID E. SANGER
    WASHINGTON — Intelligence officials refer to Edward J. Snowden’s job as a National Security Agency contractor as “systems administrator” — a bland name for the specialists who keep the computers humming. But his last job before leaking classified documents about N.S.A. surveillance, he told the news organization The Guardian, was actually “infrastructure analyst.” It is a title that officials have carefully avoided mentioning, perhaps for fear of inviting questions about the agency’s aggressive tactics: an infrastructure analyst at the N.S.A., like a burglar casing an apartment building, looks for new ways to break into Internet and telephone traffic around the...
  • An Arlington burial for Jack Wheeler (Service today, April 29, 2011)

    04/29/2011 9:29:05 AM PDT · by smoothsailing · 7 replies · 1+ views
    Daily Press ^ | 4-27-2011
    An Arlington burial for Jack Wheeler April 27, 2011The murder of Jack Wheeler remains unsolved, but his funeral on Friday might provide a small bit of solace for his family and friends. Wheeler, a former Hampton resident, will be inurned with full military honors in the Columbarium at Arlington National Cemetery. Wheeler was a 1962 graduate of Hampton High School and a member of the Class of '66 at the U.S. Military Academy at West Point. He served in the Army from 1966 to 1971 and spent time in Vietnam. He went on to serve three GOP presidents in various...
  • Iran's Cyber Warfare Commander Found Dead

    10/02/2013 7:16:03 PM PDT · by Eleutheria5 · 54 replies
    Arutz Sheva ^ | 3/10/13 | Elad Benari
    The head of Iran’s cyber warfare program has been shot dead, triggering further accusations that outside powers are carrying out targeted assassinations of key figures in the country’s security apparatus, reports the Telegraph. Mojtaba Ahmadi, who served as commander of Iran’s Cyber War Headquarters, was found dead in a wooded area near the town of Karaj, northwest of the capital Tehran. Five Iranian nuclear scientists and the head of the country’s ballistic missile program have been killed since 2007. The regime has accused Israel’s external intelligence agency, the Mossad, of carrying out these assassinations. Ahmadi was last seen leaving his...
  • Iran Nuclear Facilities Hacked, Stations Made To Play AC/DC

    08/08/2014 12:30:42 PM PDT · by Ernest_at_the_Beach · 68 replies
    nextpowerup.com ^ | August 8, 2014 10:36 PDT | Seth Fitzgerald
    The Stuxnet virus reportedly created by the combined forces of the American and Israeli governments ravaged Iran's nuclear program between 2009 and 2010, destroying thousands of machines and effectively crippling the country's nuclear efforts.But this wasn't enough for the attackers. They wanted to show what real power was like.And so they made the facilities' hijacked work stations play AC/DC."There was also some music playing randomly on several of the workstations during the middle of the night with the volume maxed out," wrote an Iranian scientist in an email. "I believe it was the American band AC-DC Thunderstruck. It was...
  • Massive Utah cyberattacks — up to 300 million per day — may be aimed at NSA facility

    02/07/2015 9:23:30 PM PST · by BenLurkin · 12 replies
    http://www.sltrib.com/news/2135491-155/massive-utah-cyber-attacks-may-be ^ | First Published Feb 03 2015 10:57AM • Last Updated Feb 03 2015 10:56 pm | LEE DAVIDSON
    Five years ago, Utah government computer systems faced 25,000 to 30,000 attempted cyberattacks every day. At the time, Utah Public Safety Commissioner Keith Squires thought that was massive. "But this last year we have had spikes of over 300 million attacks against the state databases" each day: a 10,000-fold increase. Why? Squires says it is probably because Utah is home to the new, secretive National Security Agency computer center, and hackers believe they can somehow get to it through state computer systems. "I really do believe it was all the attention drawn to the NSA facility. In the cyberworld, that's...
  • Cabbie drove Wheeler to Hotel du Pont (w/video & new info)

    01/25/2011 5:40:14 PM PST · by smoothsailing · 12 replies
    WPVI Channel 6 Action News ^ | 1-25-2011 | David Henry
    Cabbie drove Wheeler to Hotel du Pont David Henry WILMINGTON - January 25, 2011 (WPVI) -- Action News spoke with a cabbie who says he left John Wheeler off on a corner in downtown Wilmington two days before he turned up dead in a landfill. It fills another gap in the mystery surrounding Wheeler's bizarre behavior in the days before he died... He says John Wheeler got into his cab at the Amtrak station around 9:00 the morning of December 29th. It was a cold day and Wheeler was wearing just a sportcoat and an open collared white shirt. He...
  • Hack affected every single federal employee, union says

    06/11/2015 7:02:35 PM PDT · by 2ndDivisionVet · 63 replies
    CNET ^ | June 11, 2015 | Laura Hautala
    A hack announced last week affected all current and retired federal employees, and hackers got their hands on much more personal information than previously announced, the American Federation of Government Employees said Thursday.A December breach of government systems containing personal information of millions of federal employees was worse than originally thought. A union of federal workers said Thursday that the attack, announced last week, had stolen confidential information of every single federal employee, past or present -- far more than was previously revealed. The government disputes those claims. It's the latest in a spree of damaging hacks against the government,...
  • Obama’s Response to Data Breach: ‘New Systems and New Infrastructure’

    06/08/2015 8:45:16 PM PDT · by Olog-hai · 29 replies
    Cybercast News Service ^ | June 8, 2015 | 11:00 AM EDT | Susan Jones
    “Part of the problem is that we’ve got very old systems,” President Obama said on Monday, in a response to a question about the recent hack attack on U.S. government computers. He said making U.S. cyberspace more secure is “going to be a big project,” requiring “new systems and new infrastructure.” The intrusion involving the Office of Personnel Management apparently compromised the personal, identifying information of four million current and former federal employees. […] Speaking at the conclusion of the G-7 summit in Germany on Monday, President Obama refused to say that China is responsible for the massive intrusion into...
  • Iran Flexes Its Power by Transporting Turkey to the Stone Age

    04/23/2015 6:27:47 AM PDT · by Former Proud Canadian · 38 replies
    Observer ^ | April 22, 2015 | Micah Halpern
    Half of Turkey—44 of 81 provinces, 40 million people including those living in Istanbul and Ankara, suffered a massive power outage that lasted a solid twelve hours. It happened on Tuesday, March 31st. It happened because Iran wanted it to happen. The blackout in Turkey was caused by a cyber hack that originated in Iran. This cyber attack was payback, a taste of what Iran has to offer. Everything went down. Computers, airports, air traffic, traffic lights, hospitals, lights, elevators, refrigeration, water and sewage, everything simply stopped. In an instant, Turkey was transported back to the stone ages.
  • In North Korea, hackers are a handpicked, pampered elite

    12/06/2014 1:04:29 PM PST · by 2ndDivisionVet · 13 replies
    Reuters ^ | December 5, 2014 | Ju-min Park and James Pearson
    (VIDEO-AT-LINK) SEOUL-Despite its poverty and isolation, North Korea has poured resources into a sophisticated cyber-warfare cell called Bureau 121, defectors from the secretive state said as Pyongyang came under the microscope for a crippling hack into computers at Sony Pictures Entertainment. A North Korean diplomat has denied Pyongyang was behind the attack that was launched last month but a U.S. national security source said it was a suspect. Defectors from the North have said Bureau 121, staffed by some of the most talented computer experts in the insular state, is part of the General Bureau of Reconnaissance, an elite spy...
  • Chinese hack U.S. weather systems, satellite network

    11/12/2014 1:08:46 PM PST · by Kartographer · 50 replies
    Washington Post ^ | 11/12/14 | Mary Pat Flaherty, Jason Samenow and Lisa Rein
    Hackers from China breached the federal weather network recently, forcing cybersecurity teams to seal off data vital to disaster planning, aviation, shipping and scores of other crucial uses, officials said. The intrusion occurred in late September but officials gave no indication that they had a problem until Oct. 20, according to three people familiar with the hack and the subsequent reaction by the National Oceanic and Atmospheric Administration or NOAA, which includes the National Weather Service. Even then, NOAA did not say its systems were compromised.
  • New Chinese Intelligence Unit Linked to Massive Cyber Spying Program

    10/31/2014 7:43:50 AM PDT · by lbryce · 11 replies
    Washington Beacon ^ | October 31, 2014 | Bill Gertz
    A Chinese intelligence unit carried out a massive cyber espionage program that stole vast quantities of data from governments, businesses and other organizations, security analysts who uncovered the operation said Thursday. The activities of the Chinese unit called the Axiom group began at least six years ago and were uncovered by a coalition of security firms this month. Cyber sleuths traced Axiom attacks to the 2009 cyber operation against Google in China and other U.S. companies known as Operation Aurora. The group was also linked to a Chinese hacking program that targeted dissidents and opposition groups known as GhostNet. More...
  • FBI Director: China Has Hacked Every Big US Company

    10/06/2014 6:28:40 AM PDT · by blam · 38 replies
    BI ^ | 10-6-2014 | James Cook
    October 6, 2014 James CookIn his first major television interview, the director of the FBI has warned that Chinese hackers have embarked on a widespread campaign of cyberwarfare against the US. Speaking to CBS' "60 Minutes," James Comey had the following to say on Chinese hackers: There are two kinds of big companies in the United States. There are those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese. When asked whether Chinese hackers were particularly good at gaining access to servers belonging to US companies, Comey said the hackers were not...
  • Snowden reveals automated NSA cyberwarfare program

    08/13/2014 10:36:36 AM PDT · by Citizen Zed · 13 replies
    computer world ^ | 8-13-2014 | Grant Gross (IDG News Service)
    The NSA cyberwarfare program, called MonsterMind, uses software to look for traffic patterns indicating possible foreign cyberattacks, according to Snowden, quoted in a lengthy profile in Wired. MonsterMind could automatically block a cyberattack from entering the U.S., then retaliate against the attackers, according to the Wired story. Snowden, when he was working as an NSA contractor, was concerned that MonsterMind could lead to misdirected counterattacks. "These attacks can be spoofed," he told Wired. "You could have someone sitting in China, for example, making it appear that one of these attacks is originating in Russia. And then we end up shooting...
  • Flights Briefly Vanish From Austrian Air Traffic

    Austria's flight safety organization says flight data recently disappeared twice from air controller radar screens in several countries....
  • China Is Our Number One National Security Threat

    05/29/2013 4:14:15 PM PDT · by raptor22 · 35 replies
    Investor's Business Daily ^ | May 29, 2013 | IBD EDITORIALS
    Cyberwar: Chinese hackers have obtained the designs for more than two dozen major U.S. weapon systems, including the Navy's missile defense system and our latest fighter. Our very national survival may soon be at risk. When President Barack Obama meets with Chinese President Xi Jinping for the first time on June 7-8 in California, we hope he will not bow but rather demand the Chinese stop their cyberwar against the U.S. that has reaped for them the designs for more than two dozen major weapon systems used by the U.S. military. According to a previously undisclosed section of a confidential...
  • Cyber Attack On Utilities Would Be A 'Katrina-Like Disaster Affecting Cities For Days, Months'

    05/22/2013 10:14:22 AM PDT · by blam · 45 replies
    TBI ^ | 5-22-3013 | Geoffrey Ingersoll
    Cyber Attack On Utilities Would Be A 'Katrina-Like Disaster Affecting Cities For Days, Months' Geoffrey IngersollMay 22, 2013, 12:49 PMHurricane Katrina NASA The possibility of a cyber attack on U.S. infrastructure is a bigger risk than ever, as utility companies report a record amount of vulnerability probing from outside sources in recent months, according to Bloomberg. The attack on critical infrastructure could be as bad as Katrina, experts say. Risk assessment professional Robert Bea warns of a cascading effect: “Should one piece of a system fail, you end up with these cascades, sort of like a game of dominos,” he...
  • Hitting Back At Hackers: Why "Strikeback" Is Doomed To Fail

    04/10/2013 4:17:51 AM PDT · by Sir Napsalot · 13 replies
    ReadWrite ^ | 4-9-2013 | Corey Nachreiner
    (snip) Considering this deluge of aggressive and costly security breaches, it’s no wonder that some people are getting frustrated enough to contemplate striking back directly against our attackers. While giving cyber criminals a taste of their own medicine certainly sounds appealing, most forms of so-called "Strikeback" have no place in private business. ...... What’s Wrong With Strikeback?Unfortunately, direct strikeback measures have huge inherent risks:. Targeting: The biggest problem with strikeback is that the Internet provides anonymity, making it very hard to know who’s really behind an attack. It's all too likely that strikebacks could impact innocent victims. For example, attackers...
  • How To Protect Your Computers, Networks From Anonymous Israel Cyber Attack

    04/02/2013 10:31:08 PM PDT · by IsraelBeach · 5 replies
    Israel News Agency / Google News ^ | April 2, 2013 | Joel Leyden
    How To Protect Your Computers, Networks From Anonymous Israel Cyber AttackBy Joel Leyden Israel News AgencyJerusalem, Israel --- April 2, 2013 … Threats have been made against the people of Israel for thousands of years. The latest threat now comes from a less macho, publicity seeking Internet group called Anonymous. Anonymous says that on April 7, 2013 it will "erase Israel from the Internet." It ain't gonna happen. Not today, not April 7 and not next year. “OpIsrael,” which is being organized by anti-Zionist hackers, are said to be targeting the 100 largest Websites in Israel, including banks, credit card...
  • Obama BANS U.S. government from buying Chinese-made computer technology over cyber-attack fears

    03/28/2013 3:13:29 PM PDT · by ColdOne · 10 replies
    dailymail.co.uk ^ | 3/28/13 | Damien Gayle
    President Obama has hit back at Beijing's alleged hacking campaign against U.S. businesses by banning government from buying Chinese computer technology. The new rule, which was buried in a spending bill signed this week, comes after a string of hacks traced back to China hit some of America's most important companies. It will only be in effect until the end of the fiscal year on September 30,
  • Sledgehammer of cyber warfare? EMP attack

    02/27/2013 1:05:17 PM PST · by Perseverando · 12 replies
    WND ^ | February 26, 2013 | F. Michael Maloof
    Enemies' doctrines include devastating blow as part of 'strategic operations' WASHINGTON – Warnings from U.S. Defense Secretary Leon Panetta and U.S. Department of Homeland Security Secretary Janet Napolitano that enemy nations are carrying out cyber attacks on the U.S. are on the rise. The target? The U.S. electric infrastructure. Even President Obama has pointed out that “our enemies are also seeking the abilities to sabotage our power grid, our financial institutions and our air traffic control systems.” But that may not be the worst of it. Those same adversaries – China, Russia, Iran and North Korea – also incorporate in...
  • Significant Cyberattack Incidents

    02/26/2013 11:14:58 PM PST · by neverdem · 9 replies
    Real Clear Politics ^ | 02.26.13 | NA
    Last week, the American computer security firm Mandiant released a detailed study shedding light on the secret cybercorps of the Chinese government. The “Shanghai Group,” or Unit 61398 of the People’s Liberation Army, is believed to operate out of a nondescript 12-story building (above) on the outskirts of Shanghai. Over the past six years, Mandiant claims to have tracked thousands of attacks on American industry, business, government and military targets originating from that area. Given the ubiquity of information technology, the threat of cyberattacks will continue to grow. The scope of these assaults can range from accessing confidential information and...
  • Dot Commie: China's Military Behind U.S. Cyberattacks

    02/23/2013 7:18:03 AM PST · by raptor22 · 16 replies
    Investor's Business Daily ^ | Feberuary 23, 2012 | IBD EDITORIALS
    Cyberwar: A cybersecurity firm reports a secretive Chinese military unit is behind many recent "hack attacks" into U.S. computers, stealing trade and military secrets and developing a potentially crippling new weapon. In a 2009 editorial we noted that units of China's armed forces, whom we dubbed its "Cybertooth Tigers" were developing capabilities to penetrate and potentially disrupt U.S. computer systems as part of the People's Liberation Army's focus on what is known as "asymmetrical" warfare, specifically cyber-warfare. At least as far back as the 2008 edition of the Pentagon's annual report to Congress entitled "Military Power of the People's Republic...
  • White House inactive on attack dangers ('The threat is on nobody's radar screen')

    01/08/2013 10:37:30 AM PST · by Perseverando · 26 replies
    WND ^ | January 7, 2013 | F. Michael Maloof
    WASHINGTON – The United States now is facing two serious national security challenges, but they aren’t expected to be addressed effectively because of the serious budgetary headaches Congress has created, and a virtually deadlocked legislature on just about every issue pending, according to report from Joseph Farah’s G2 Bulletin. And the White House apparently isn’t paying attention. The first is the growing concern of the impact that an electromagnetic pulse, or EMP, event – either natural or manmade – could have on the national grid system, on which the Department of Defense has a 99 percent dependency. The other concern...
  • LulzSec: the members and the enemies

    06/25/2011 6:35:43 AM PDT · by Bad~Rodeo · 10 replies
    Guardian ^ | Friday 24 June 2011 | Josh Halliday
    While Sabu and Topiary are firmly on the inside, the likes of The Jester and LulzSec Exposed are most certainly notInside Sabu Apparent founder and leader of LulzSec, he is a long-time hacktivist associated with senior Anonymous members. Decides who can join the group and who should be targeted. Attempts by rivals to uncover details about his real-life identity suggest he is a 30-year-old IT consultant skilled in the Python programming language who has lived in New York. The timing of some his tweets – tweeting "goodnight all" at 0700 BST, or 0200 New York time – implies he is...
  • LulzSec 'Leader' Turns on Fellow Hacktivists: Feds

    03/06/2012 9:02:03 PM PST · by Olog-hai · 7 replies
    ABC News via Yahoo News ^ | March 6, 2012 | RICHARD ESPOSITO, AARON KATERSKY and PIERRE THOMAS
    Six members of the suspected computer hacking groups affiliated with Anonymous were charged—including the suspected ring leader, who directed the entire operation from a Manhattan apartment complex—after it was revealed one of the group's most high profile members has been working with federal authorities for months. Hector Monsegur, a 28-year-old American believed to use the name "Sabu" on the internet, was arrested by federal agents last year and has been cooperating with law enforcement ever since, officials said. He pleaded guilty last August, a plea unsealed in federal court in Lower Manhattan today. At least four of the five other...
  • Anonymous Claims They Hacked GOP On Election Day

    11/18/2012 3:52:41 PM PST · by 2ndDivisionVet · 63 replies
    Breitbart TV ^ | November 18, 2012
    Mitt Romney's Republican Get Out the Vote system (ORCA) had a meltdown on Election Day leaving some campaign workers wandering around with nothing to do. Now Anonymous has released a video claiming responsibility for jamming ORCA...
  • Anti-Jihad Ads Considered Constitutional

    10/01/2012 2:02:13 PM PDT · by Cindy · 67 replies
    COLLEGIAN.csufresno.edu - Top Opinion Story ^ | September 24, 2012 | Liana Whitehead
    SNIPPET: "New York City is the center of a public uproar as Internet blogger Pamela Gellar rises with an “anti-jihad” ad campaign." SNIPPET: "Gellar and her group are protesting the Jihad, which in definition is the religious duty of Muslims. According to the Dictionary of Islam, jihad is defined as “A religious war with those who are unbelievers in the mission of Muhammad . . . enjoined especially for the purpose of advancing Islam and repelling evil from Muslims.” The literal meaning of jihad, according to the British Broadcasting Network, “is struggle or effort, and it means much more than...
  • Microsoft Fights Flame Malware With Certificate Killer

    06/14/2012 1:25:27 PM PDT · by OldEarlGray · 6 replies
    InformationWeek ^ | 05 Jun 2012 | Mathew J. Schwartz
    Microsoft identified the culprit Sunday when it released a security bulletin warning that "unauthorized digital certificates could allow spoofing." Its related Windows update revokes trust for three fraudulent certificate authority (CA) certificates: two Microsoft Enforced Licensing Intermediate PCA certificates, as well as the Microsoft Enforced Licensing Registration Authority CA. The revelation that Flame included the ability to pass off fake Windows updates is yet more evidence of that Flame, in Gostev's words, "is one of the most interesting and complex malicious programs we have ever seen." Indeed, the certificate flaw gave Flame's creators a way to attack all versions of...
  • Patch Tuesday: Microsoft raises alert for dangerous IE, Windows flaws

    06/13/2012 9:39:00 PM PDT · by OldEarlGray · 77 replies
    ZDnet ^ | 12 Jun 2012 | Ryan Naraine
    Summary: Microsoft expects to see exploit code targeting at least one of the vulnerabilities within the next 30 days. Microsoft today warned that cyber-criminals could soon aim exploits at critical security flaws in Internet Explorer browser and Windows to hijack and take complete control of vulnerable machines. The warning comes as part of this month’s Patch Tuesday where Microsoft released 7 bulletins with fixes for at least 26 documented vulnerabilities affecting the Windows ecosystem. The company is urging users to pay special attention to MS12-037 and MS12-036, which provides cover for “remote code execution” vulnerabilities that could be used in...
  • Germany confirms existence of operational cyberwarfare unit

    06/11/2012 1:17:04 AM PDT · by Olog-hai · 3 replies
    DPA via Stars and Stripes ^ | June 5, 2012 | Michael Fischer, Joerg Blank and Christoph Dernbach
    German authorities confirmed Tuesday in a parliamentary document that their military possesses a top secret cyberwarfare unit which is already operational, but gave no details of how big it is or what kind of attacks it could conduct. The German armed forces have been working for 20 years to defend the country's computer networks from external attack, but have never disclosed before that they have an offensive capacity as well.The existence of the unit, set up in 2006, was disclosed in a six-page paper presented to the parliamentary committee on defense in Berlin. … Legislators from both the government and...
  • 'End of the world as we know it': Kaspersky warns of cyber-terror apocalypse

    06/08/2012 9:46:07 AM PDT · by SomeCallMeTim · 51 replies
    RT.com ^ | June 6, 2012 | Sergey Guneev
    After his eponymously-named lab discovered Flame, "the most sophisticated cyber weapon yet unleashed," Eugene Kaspersky believes that the evolving threat of “cyber terrorism” could spell the end of life on Earth as we know it. ­Doomsday scenarios are a common occurrence in 2012, but coming from a steely-eyed realist like Eugene Kaspersky, his calls for a global effort to halt emerging cyber threats should raise alarm bells. A global Internet blackout and crippling attacks against key infrastructure are among two possible cyber-pandemics he outlined."It's not cyber war, it's cyber terrorism, and I'm afraid the game is just beginning. Very soon,...
  • Obama Order Sped Up Wave of Cyberattacks Against Iran (taking credit for Stuxnet)

    06/01/2012 8:49:33 AM PDT · by Sir Napsalot · 22 replies
    NY Times ^ | 6-1-2012 | DAVID E. SANGER
    WASHINGTON — From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program. Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games — even after an element of the program accidentally became public in the summer of 2010 ...
  • U.S. senators: Al Qaeda calls for 'electronic jihad'

    05/27/2012 1:08:39 AM PDT · by Innovative · 11 replies
    CNN ^ | May 23, 2012 | CNN Wire Staff
    An al Qaeda video calling for "electronic jihad" illustrates the urgent need for cybersecurity standards for the most critical networks in the United States, a group of senators said. The video calls for cyberattacks against networks such as the electric grid and compares vulnerabilities in the United States' critical cyber networks to the vulnerabilities in the country's aviation system before 9/11, according to a statement Tuesday from the Senate Committee on Homeland Security and Governmental Affairs. "This is the clearest evidence we've seen that Al Qaeda and other terrorist groups want to attack the cyber systems of our critical infrastructure,"...
  • NORAD, Northcom launch joint cyber division

    05/25/2012 9:23:58 AM PDT · by Mich1193 · 2 replies
    gcn.com ^ | May 22, 2012 | GCN.com
    A new cyber division, jointly managed by the North American Aerospace Defense Command (NORAD) and U.S. Northern Command’s (Northcom) Operations Division, is up and running after approval by Defense Secretary Leon Panetta earlier this month. The U.S. Northern Command Joint Cyber Center (JCC) has three main missions: improving cyber domain situational awareness, improving the defense of the commands’ networks, and providing cyber consequence response and recovery support to civil authorities upon request, according to an announcement from the joint center. The division includes members from the intelligence, operations, and command and control systems divisions as well as a four- to...
  • China cyber capability puts U.S. forces at risk: report

    03/07/2012 11:27:05 PM PST · by Olog-hai · 8 replies
    Reuters ^ | Thu Mar 8, 2012 12:11am EST | Jim Wolf
    Chinese cyberwarfare would pose a "genuine risk" to the U.S. military in a conflict, for instance over Taiwan or disputes in the South China Sea, according to a report prepared for the U.S. Congress. Operations against computer networks have become fundamental to Beijing's military and national development strategies over the past decade, said the 136-page analysis by Northrop Grumman Corp released on Thursday by the U.S.-China Economic and Security Review Commission. Chinese commercial firms, bolstered by foreign partners, are giving the military access to cutting-edge research and technology, the analysis said. The Chinese military's close ties to large Chinese telecommunications...
  • Anonymous hackers claim to have crashed Justice Department website

    01/19/2012 3:19:57 PM PST · by maggief · 84 replies · 7+ views
    The Hill ^ | January 19, 2012 | Brendan Sasso
    Anonymous, the group of activist hackers, claimed to have crashed the Justice Department website on Thursday in retaliation for prosecutors shutting down the popular file-sharing site Megaupload.com. "The government takes down Megaupload? 15 minutes later Anonymous takes down government & record label sites," the group wrote on its Twitter account. A Justice Department spokesman did not confirm whether the agency had suffered a cyber attack, but justice.gov was not loading as of Thursday afternoon.
  • DECKER & TRIPLETT: Beijing’s electronic Pearl Harbor

    11/12/2011 10:35:51 PM PST · by Tolerance Sucks Rocks · 5 replies
    The Washington Times ^ | November 11, 2011 | Brett M. Decker and William C. Triplett II
    The following is an excerpt from “Bowing to Beijing” (Regnery Publishing, Nov. 14, 2011): In November 1997, Deputy Defense Secretary John Hamre testified before the Senate Subcommittee on Terrorism that “we’re facing the possibility of an electronic Pearl Harbor. … There is going to be an electronic attack on this country some time in the future.” Two years later, he told a secret session of the House Armed Services Committee, “We are at war - right now. We are in cyberwar.” Fast-forward more than a decade, to 2011. President Obama’s choice for secretary of defense, Leon Panetta, tells the Senate...
  • China State TV Alludes to U.S. Website Attacks

    08/24/2011 2:50:35 PM PDT · by lbryce · 6 replies
    Wall Street Journal ^ | August 24, 2011 | Jeremy Page
    Chinese state television has broadcast footage of what two experts on the Chinese military say appears to be a military institute demonstrating software designed to attack websites in the U.S. Although it could be a decade old or a mock-up, the 10-second segment—part of a longer report on cybersecurity—appears to be a rare example of an official source contradicting China'a repeated assertions that it doesn't engage in cyberattacks, according to Andrew Erickson and Gabe Collins of the China SignPost analytical service, which specializes in military matters. The slightest suggestion that the Chinese military has attacked U.S. websites is highly sensitive,...
  • A Cyber-Pearl Harbor On Horizon?

    07/15/2011 5:28:21 PM PDT · by Kaslin · 24 replies
    IBD Editorials ^ | July 15, 2011 | Staff
    Security: The Pentagon has disclosed perhaps the largest theft of sensitive data by an unnamed foreign government. The threat to our electronic infrastructure is real, growing and as dangerous as a North Korean missile. In outlining America's cyberwarfare strategy last Thursday at the National Defense University, Deputy Secretary of Defense William Lynn disclosed that 24,000 sensitive files containing Pentagon data at a defense company were accessed in a cyberattack in March, likely by a foreign government. He didn't disclose the identity of that government, but in a bit of an understatement he acknowledged, "We have a pretty good idea." So...
  • North Korea recruits hackers at school

    06/20/2011 8:22:09 PM PDT · by Bad~Rodeo · 6 replies
    Aljazeera ^ | 20 Jun 2011 | Sangwon Yoon
    A child becomes computer literate at primary school. Meanwhile, North Korea's most prodigious young students are identified and trained in advanced cyberwarfare techniques As South Korea blames North Korea for a recent slew of cyberattacks, two defectors share their experiences, as a hacker and trainer of "cyberwarriors" in the reclusive communist country, with Al Jazeera shedding some light into the inner workings of the North's cyberwarfare programme. In the process, Kim Heung-kwang and Jang Se-yul also warn of the regime's concentrated efforts to bolster its cyberwarfare capabilities. The hackers' professor Kim Heung-kwang was a computer science professor in North...
  • CIA, Senate hackers gleefully promise more

    06/16/2011 6:54:35 PM PDT · by bushwon · 7 replies · 1+ views
    CNN ^ | 6/16/11 | Doug Gross
    CNN) -- They've breached or busted the websites of the CIA, PBS and the U.S. Senate, and launched at least part of an extended attack on Sony, whose PlayStation Network was brought to a grinding halt for the better part of a month. And, to hear them tell it, it's all for a laugh. Meet Lulz Security, or LulzSec, the gleeful and secretive band of hackers who appear to be responsible for a string of high-profile and sometimes embarrassing Internet attacks. Their most recent strike, and arguably the most ambitious, was a distributed denial-of-service attack Wednesday that shut down the...
  • Computer security: Is this the start of cyberwarfare?Last year's Stuxnet virus attack...

    06/09/2011 8:30:52 PM PDT · by neverdem · 6 replies
    Nature News ^ | 8 June 2011 | Sharon Weinberger
    Last year's Stuxnet virus attack represented a new kind of threat to critical infrastructure. Just over a year ago, a computer in Iran started repeatedly rebooting itself, seemingly without reason. Suspecting some kind of malicious software (malware), analysts at VirusBlokAda, an antivirus-software company in Minsk, examined the misbehaving machine over the Internet, and soon found that they were right. Disturbingly so: the code they extracted from the Iranian machine proved to be a previously unknown computer virus of unprecedented size and complexity. On 17 June 2010, VirusBlokAda issued a worldwide alert that set off an international race to track down...
  • Hackers hit Atlanta FBI

    06/09/2011 8:50:06 AM PDT · by robowombat · 8 replies
    The Atlanta Journal-Constitution ^ | June 5, 2011 | By Dan Chapman
    The FBI announced Sunday it shut down an Atlanta-based website that tracks cyber-crime after the site was compromised by a mysterious, yet increasingly audacious group of hackers. InfraGard Atlanta, a nonprofit partnership between local business, government and academic security experts and the FBI, was hacked late last week by Lulz Security. LulzSec, as it’s known on-line in cyber security channels, hijacked the InfraGard site and published the email addresses, usernames and passwords of its 180 members. On its website, LulzSec wrote that the InfraGard volunteers – which include internet security experts at Equifax, Georgia Tech, the U.S. Army, DeKalb County...
  • The Way to Fight China's Hacking

    06/04/2011 2:29:22 AM PDT · by Rudder · 6 replies
    WSJ ^ | 6/03/11 | HOLMAN W. JENKINS, JR
    Google wouldn't be human if it weren't relieved that the latest Chinese hacking incident targeted not a hole in Google's defenses but a gullibility of its customers. The proper term is "spear phishing" for the use of email cons to scam a specific, chosen individual into revealing his or her password, allowing unauthorized access to inboxes and online accounts. In a blog post this week, Google announced that the latest attacks seem to come from Jinan, China. The targets were the Gmail accounts of "senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military...