Keyword: cyberwarfare

Brevity: Headers | « Text »
  • You Nork Bastards Will Pay For This

    11/06/2009 10:36:59 PM PST · by myknowledge · 12 replies · 697+ views
    Strategy Page ^ | November 4, 2009
    November 4, 2009: South Korea has confirmed suspicions that Internet based attacks earlier this year came from "the norks" (North Korea). The South Korean NIS (National Intelligence Service) has completed its investigation of the route the July attacks took, and has traced the origin back to the North Korean Ministry of Post and Telecommunications facilities. While there was no apparent damage from the July attacks (which hit government sites in South Korea and the United States), similar attacks have made away with secret data. For example, the South Korean military recently reported that someone hacked into a classified network, and...
  • North Korea Fingered Again in Hacking 'Revelations'

    10/18/2009 5:41:31 PM PDT · by Cindy · 4 replies · 408+ views ^ | 18 October 2009 at 15:17 | Tim Stevens
    SNIPPET: "After the 4 July DDoS attacks, wrongly attributed to North Korea, it’s wise to treat reports of DPRK security hacks with some caution. Nevertheless, The Korea Times reports the following: Classified Info on Dangerous Chemicals Hacked Hackers stole classified information on dangerous chemicals in their raid on the South Korean army computer network in what was believed to be an attack by North Korea, Yonhap News Agency reported Saturday, quoting government officials." SNIPPET: "The Sydney Morning Herald adds more information: A North Korea cyber warfare unit hacked into a South Korean military command earlier this year and stole some...
  • NKorea looks to unconventional warfare: US general

    09/30/2009 6:05:37 PM PDT · by ErnstStavroBlofeld · 4 replies · 708+ views
    Space War ^ | 9/29/2009 | AFP
    North Korea is increasingly focused on cyber warfare, improvised explosives and missile technology as the regime fears it would be defeated in a direct confrontation with US and South Korean forces, a US commander said on Tuesday. The emphasis on unconventional methods comes amid signs North Korean leader Kim Jong-Il appears to be firmly "in charge" and in decent health, General Walter Sharp, commander of US forces in Korea, told reporters on Tuesday. "I think the North Koreans probably realized they could not win in a normal conventional all-out attack," Sharp said. Given the strength of South Korean and US...
  • Could The Feds Seize The Internet?

    09/02/2009 5:34:24 PM PDT · by Kaslin · 28 replies · 2,524+ views
    IBD Editorials ^ | September 2, 2009 | INVESTORS BUSINESS DAILY Staff
    Security: A Senate bill lets the president "declare a cybersecurity emergency" relating to "nongovernmental" computer networks and do what's needed to respond to the threat. Didn't they just collect our e-mail addresses?We wish this was just a piece of the fictional "Dr. Strangelove" that fell to the cutting-room floor, but it's not. It is a real piece of disturbingly vague legislation sponsored by Sens. Jay Rockefeller, D-W.Va., Bill Nelson, D-Fla., and Olympia Snowe, R-Maine. Senate Bill 773 would grant the administration emergency powers (where have we heard that before?) in the event of a cyberemergency that the president would have...
  • Federal agency Web sites knocked out by massive, resilient cyber attack

    07/07/2009 8:36:00 PM PDT · by STARWISE · 19 replies · 1,421+ views
    Chicago Tribune/AP ^ | 7-7-09 | Lolita Baldor
    A widespread and unusually resilient computer attack that began July 4 knocked out the Web sites of several government agencies, including some that are responsible for fighting cyber crime, The Associated Press has learned. The Treasury Department, Secret Service, Federal Trade Commission and Transportation Department Web sites were all down at varying points over the holiday weekend and into this week, according to officials inside and outside the government. Some of the sites were still experiencing problems Tuesday evening. Cyber attacks on South Korea government and private sites also may be linked, officials there said. U.S. officials refused to publicly...
  • China's 'secure' OS Kylin - a threat to U.S. offensive cyber capabilities?

    06/02/2009 11:58:03 PM PDT · by Cindy · 8 replies · 518+ views ^ | May 13, 2009, 6:23 am | Dancho Danchev
    May 13th, 2009 China's 'secure' OS Kylin - a threat to U.S offensive cyber capabilities? Posted by Dancho Danchev @ 6:23 am Categories: Browsers, Complex Attacks, Governments, Hackers, Kernel-level Exploits... Tags: China, Operating System, Operating Systems, Linux, Software... Picture a cyber warfare arms race where the participating countries have spent years of building offensive cyber warfare capabilities by exploiting the monoculture on one another’s IT infrastructure. Suddenly, one of the countries starts migrating to a hardened operating system of its own, and by integrating it on systems managing the critical infrastructure it successfully undermines the offensive cyber warfare capabilities developed...
  • Code-cracking and computers ( WWII and German Codes )

    05/31/2009 9:41:54 AM PDT · by Ernest_at_the_Beach · 39 replies · 1,375+ views
    BBC ^ | Thursday, 6 November 2008 | Mark Ward Technology correspondent, BBC News
    By the end of WWII, 11 Colossus machines were in use Bletchley Park is best known for the work done on cracking the German codes and helping to bring World War II to a close far sooner than might have happened without those code breakers. But many believe Bletchley should be celebrated not just for what it ended but also for what it started - namely the computer age. The pioneering machines at Bletchley were created to help codebreakers cope with the enormous volume of enciphered material the Allies managed to intercept. The machine that arguably had the greatest influence...
  • China Updates Government,Military Computers With New Secure Operating System

    05/14/2009 3:24:53 PM PDT · by Flavius · 22 replies · 749+ views
    nas ^ | 5/14/09 | nasdaq
    -China has installed a secure operating system known as " Kylin" on government and military computers designed to be impenetrable to U.S. military and intelligence agencies, The Washington Times reported on Tuesday. The newspaper said the existence of the secure operating system was disclosed to Congress during recent hearings that included new details on how China's government is preparing to wage cyberwarfare with the U.S.
  • The First War In Cyberspace

    05/26/2009 3:29:39 AM PDT · by Scanian · 5 replies · 652+ views
    The American Thinker ^ | May 26, 2009 | Ed Timperlake
    Cyberwar is now a fact of life in 21st Century wars. Actual and potential enemies of America already know the dimensions of Cyberwar and have moved into full combat. With a real world combat engagement in Georgia and Estonia, the Russians have shown skill. Make no mistake; in certain arenas the Russians are smart and capable, and as the invasion of Georgia shows, ruthless. They have world class scientists and engineers. It is well known they are excellent Cyber Warfighters who have now also apparently harnessed their criminal hackers to augment their worldwide reach. This melding of Russian conventional military...
  • Cyberwar, Cadets Trade the Trenches for Firewalls

    05/11/2009 7:58:02 AM PDT · by Republican Party Reptile · 5 replies · 401+ views
    New York Times ^ | May 11 2009 | COREY KILGANNON and NOAM COHEN
    WEST POINT, N.Y. — The Army forces were under attack. Communications were down, and the chain of command was broken. Pacing a makeshift bunker whose entrance was camouflaged with netting, the young man in battle fatigues barked at his comrades: “They are flooding the e-mail server. Block it. I’ll take the heat for it.” These are the war games at West Point, at least last month, when a team of cadets spent four days struggling around the clock to establish a computer network and keep it operating while hackers from the National Security Agency in Maryland tried to infiltrate it...

    05/07/2009 2:57:53 PM PDT · by Cindy · 4 replies · 262+ views
    COVERT RADIO SHOW # Covert Radio Daily Blast May 7 North Korea has hackers working round the clock on cyberwarfare. Could they have been behind recent attacks on the Alaskan Air Traffic Control system? Are we prepared for Cyber Warfare? Narco Traffickers are declaring war on our cops, and the latest in the coming war between Georgia and Russia.
  • Report: NKorea Operating Cyber Warfare Unit

    05/04/2009 9:42:12 PM PDT · by james500 · 13 replies · 626+ views
    AP ^ | 5/4/2009
    North Korea runs a cyber warfare unit that tries to hack into U.S. and South Korean military networks to gather confidential information and disrupt service, a news report said Tuesday. The North's military has expanded the unit, staffing it with about 100 personnel, mostly graduates of a Pyongyang university that teaches computer skills, Yonhap news agency reported, citing an intelligence agency it didn't identify. South Korea's Defense Ministry said it is aware that Pyongyang has been training hackers in recent years but did not provide details and had no other comment. The National Intelligence Service — South Korea's main spy...
  • China's Cybertooth Tigers

    04/17/2009 6:43:46 PM PDT · by Kaslin · 510+ views
    IBD Editorials ^ | April 17, 2009
    National Defense: America's electrical grid may have been implanted with cyber-"bombs" waiting to go off. Russia and China are preparing for a new kind of warfare. Where will you be when the lights go out?On April 1, as part of our "Inside The Stimulus" series, we said the proposed "smart grid" designed to monitor electrical use and distribution would make it easier for hackers to break in and possibly disable parts or all of it. Turns out this was no April Fool's joke. A few weeks ago the Pentagon released its 2008 report to Congress titled "Military Power of the...
  • Army, Navy, Air Force, and Cyber—Is it Time for a Cyberwarfare Branch of Military?

    03/13/2009 12:58:37 PM PDT · by rabscuttle385 · 22 replies · 1,506+ views
    The Army, Navy, and Air Force all maintain cyberwarfare components, but these organizations exist as ill-fitting appendages that attempt to operate in inhospitable cultures where technical expertise is not recognized, cultivated, or completely understood. The services have developed effective systems to build traditional leadership and management skills. BY LTC GREGORY CONTI & COL JOHN "BUCK" SURDU Disclaimer The views expressed in this article are those of the authors and do not reflect the official policy or position of the US Military Academy, the Department of the Army, or the US Government. At critical points in history, technological advances have driven...
  • Cyberwarfare, Version 2.009

    02/19/2009 3:53:50 AM PST · by Cindy · 9 replies · 399+ views
    (WASHINGTON TIMES) via FRONTPAGE ^ | Thursday, February 19, 2009 | By Arnaud de Borchgrave
    Cyberwarfare is waged on a massive scale the world over. Ostensibly friendly nations zap each other's electronic nerve cells frequently, and with reckless abandon. On a single day in 2008, the Pentagon was hit by would-be intruders 6 million times in 24-hour period. Before Sept. 11, 2001, the highest annual figure for cyber attacks against the Pentagon was 250,000.
  • Israel Internet PR Cyber Warriors

    02/13/2009 10:31:17 AM PST · by IsraelBeach · 3 replies · 360+ views ^ | February 13, 2009 | Lucy Tobin
    Israel's Cyber WarriorsBy Lucy Tobin The Jewish Chronicle London --- February 12, 2009 ... When Joel Leyden speaks about Israel, 90,000 people listen. His name may not be familiar, but if you have ever used Google to look up anything on the Middle East, then you have probably had your search results influenced by him. And if you are one of the 150 million users of the social networking website Facebook, then it is likely that you have read something written by him. You might even be one of the almost 100,000 members of his group called “I Support the...
  • Anticipating Threats Key to Success, Northcom Commander Says

    01/29/2009 5:08:32 PM PST · by Cindy · 4 replies · 398+ views
    AMERICAN FORCES PRESS SERVICE ^ | January 29, 2009 | By John J. Kruzel
    Note: The following text is a quote: Anticipating Threats Key to Success, Northcom Commander Says By John J. Kruzel American Forces Press Service WASHINGTON, Jan. 29, 2009 – Anticipating threats is the key to readiness, the chief of the combatant command responsible for the military role in homeland defense said. Air Force Gen. Victor E. Renuart Jr., commander of U.S. Northern Command and North American Aerospace Defense Command, said that when he took over the reins two years ago, he modified the Northcom mission statement to reflect this notion. “I added the word ‘anticipate’ in there, and that really...
  • Army Colonel Gets Spyware From N.Korea

    09/02/2008 5:14:19 PM PDT · by TigerLikesRooster · 6 replies · 303+ views
    Chosun Ilbo ^ | 09/02/08
    Army Colonel Gets Spyware From N.Korea Amid lingering controversy over the arrest of a North Korean Mata Hari, a malicious North Korean e-mail has been sent to a colonel at a field army command. Military authorities have reportedly provided the entire army with updated anti-hacking software. A military intelligence source on Monday said the e-mail was sent early last month to the colonel via China. The source added that the e-mail was programmed to automatically steal stored files if the recipient opened it. But whether military secrets were actually stolen by way of this e-mail was not known. Military authorities...
  • The Kremlin’s Virtual Army (Russian cyberwarfare)

    08/14/2008 2:31:15 PM PDT · by Dawnsblood · 1 replies · 130+ views
    Foreign Policy ^ | 8/08 | Evgeny Morozov
    It started as a fairly predictable digital conflict, mimicking the one in the real world and displaying no shortage of “conventional” cyberwarfare: Web pages were attacked, comments were erased, and photos were vandalized. A typical prank on the Georgian Foreign Ministry’s Web site visually compared Georgian President Mikheil Saakashvili with Adolf Hitler. As Russian tanks lumbered southward over mountainous Ossetian terrain, Russian netizens were seeking to dominate the digital battlefield. But sophomoric pranks and cyberattacks were only the first shots of a much wider online war in which Russian bloggers willingly enlisted as the Kremlin’s grass-roots army. For Russian netizens,...
  • Bearprints found on Georgian cyber-attacks

    08/14/2008 10:43:06 AM PDT · by Schnucki · 3 replies · 91+ views
    The Register ^ | August 14, 2008 | John Leyden
    Security researchers claim to have uncovered evidence pointing to a link between Russian state-run businesses and cyber-attacks against Georgia. Denial of service attacks against Georgian web-sites started a day before Georgian and Russian military units began fighting over the disputed region of South Ossetia. SecureWorks researcher Don Jackson said that logs showed that portions of the attack were run from command and control servers located on the networks of Russian state-operated firms Rostelecom and Comstar. These servers were not linked to previous botnet activity. "We know that the Russian government controls those servers theoretically, if they have not been 'pwned'...