- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged cyber warfare
US Government Ignores External Threats While Creating Fake Internal Threats
From Wired.com:
P4x says he was later contacted by the FBI but was never offered any real help to assess the damage from North Korea’s hacking or to protect himself in the future. Nor did he ever hear of any consequences for the hackers who targeted him, an open investigation into them, or even a formal recognition from a US agency that North Korea was responsible. It began to feel, as he put it, like “there’s really nobody on our side.”
Chinese Hacking Team Caught Taking Over Decoy Water Plant
Posted by Gary in News, Threat Watch on 4/Aug/2013 18:26
From: MIT
A hacking group accused of being operated by the Chinese army now seems to be going after industrial control systems.
Iran Stages ‘Cyber Warfare Drill’
Posted by Gary in News, Threat Watch on 3/Jan/2013 14:14
From: Arutz Sheva
Iran has combined cyber warfare tactics and maritime war games in a drill for the first time as it stages maneuvers in the Strait of Hormuz.
Preparing for Cyber War, Without a Map
Posted by Gary in News, Threat Watch on 16/Oct/2012 17:12
From: MIT
The U.S. government has pledged to retaliate quickly if power grids or other critical elements of infrastructure are hacked—but the technology needed to do so is lacking.
Islamist group warns of new cyber attacks on U.S. banks
Posted by Gary in News, Threat Watch on 25/Sep/2012 23:15
From: Raw Story
DUBAI — An Islamist group on Tuesday said it will carry out new cyber attacks on US banking targets, according to SITE Intelligence Group, following similar attacks last week in response to an anti-Islam film.
In a statement a group of hackers calling themselves the “Cyber Fighters of Izz al-Din al-Qassam†said they planned to attack the website of Wells Fargo bank on Tuesday, that of US Bank on Wednesday and the PNC Bank on Thursday, SITE said.
Last week the websites of US banks Chase (a JPMorgan Chase affiliate) and Bank of America suffered a suspected cyber attack following threats against them by the same group.
Everyone Has Been Hacked. Now What?
Posted by Gary in Comms, Threat Watch on 6/May/2012 17:03
From; Threat Level
On Apr. 7, 2011, five days before Microsoft patched a critical zero-day vulnerability in Internet Explorer that had been publicly disclosed three months earlier on a security mailing list, unknown attackers launched a spear-phishing attack against workers at the Oak Ridge National Laboratory in Tennessee. More
Russian Hackers Attack Illinois Utility
Posted by Gary in Comms, News, Threat Watch on 19/Nov/2011 20:56
From: PopSci
The Illinois Statewide Terrorism and Intelligence Center released a “Public Water District Cyber Intrusion” report on November 10 that indicates that hackers may have had access to the system since September. Hackers using Russian IP addresses hacked the software vendor that makes the system. They were then able to access the vendor’s database of usernames and passwords, and used the stolen credentials for remote access to the SCADA system’s network. These vendors keep records of their customer’s access information for maintenance and upgrading the systems.
Two to three months before the discovery of the hack, operators noticed “glitches” in the remote access to the SCADA system. “They just figured it’s part of the normal instability of the system,” said Joe Weiss, cybersecurity expert and managing partner at Applied Control Solutions, who obtained a copy of the report. “But it wasn’t until the SCADA system actually turned on and off that they realized something was wrong.”
U.S. Military Goes Online to Rebut Extremists’ Messages
Posted by Jack Sinclair in News on 18/Nov/2011 21:04
“…The government’s expanding efforts in computer-network warfare, offense and defense are among the most secret enterprises carried out by the military and intelligence community.
To counter the adversary’s use of the Internet, American cyberwarriors have hacked into extremist chat rooms to sow confusion, or to inject poisonous code to take down militant Web sites. Sometimes, they choose not to act, but silently track the online movements of jihadists to learn their plans.
In contrast, the Digital Engagement Team operates in total sunshine: all of the online postings carry an official stamp acknowledging sponsorship by Central Command.
…“You’ve heard of the Iron Curtain, of course,†Mr. Safavi said. “We’re here to pierce the Electronic Curtain because the military has decided that it cannot cede this information space to violent extremists.â€
New Malware Brings Cyberwar One Step Closer
Posted by Gary in Comms, News, Threat Watch on 21/Oct/2011 03:29
From: MIT
A newly discovered piece of malicious code dubbed Duqu is closely related to the notorious Stuxnet worm that damaged Iran’s nuclear-enrichment centrifuges last year. Although it has no known target or author, it sets the stage for more industrial and cyberwar attacks, experts say.
“This is definitely a troubling development on a number of levels,” says Ronald Deibert, director of Citizen Lab, an Internet think-tank at the University of Toronto who leads research on cyberwarfare, censorship, and espionage. “In the context of the militarization of cyberspace, policymakers around the world should be concerned.”
Indeed, the spread of such code could be destabilizing. The Pentagon’s cyberwar strategy, for example, makes clear that computer attacks on industrial and civilian infrastructure like chemical factories or power grids as well as military networks could be regarded as equivalent to a conventional bombing or other attack, if civilians were endangered.
Cyber combat: act of war
Posted by Gary in Comms, Threat Watch on 3/Jun/2011 14:42
From: WSJ via Kurzweil AI
Cyber combat: act of war
June 1, 2011
Source: Wall Street Journal — May 31, 2011
The Pentagon has concluded that computer sabotage coming from another country can constitute an act of war, opening the door for the U.S. to respond using traditional military force.
Pentagon officials believe the most sophisticated computer attacks require the resources of a government. For instance, the weapons used in an assault such as taking down a power grid would likely have been developed with state support.
Defense officials refuse to discuss potential cyber adversaries, although military and intelligence officials say they have identified previous attacks originating in Russia and China.
Topics: Computers/Infotech/UI | Survival/Defense
China and its Double-edged Cyber-sword
Posted by Brian in Comms, Threat Watch on 10/Dec/2010 09:25
China and its Double-edged Cyber-sword is republished with permission of STRATFOR.
By Sean Noonan
A recent batch of WikiLeaks cables led Der Spiegel and The New York Times to print front-page stories on China’s cyber-espionage capabilities Dec. 4 and 5. While China’s offensive capabilities on the Internet are widely recognized, the country is discovering the other edge of the sword.
China is no doubt facing a paradox as it tries to manipulate and confront the growing capabilities of Internet users. Recent arrests of Chinese hackers and People’s Liberation Army (PLA) pronouncements suggest that China fears that its own computer experts, nationalist hackers and social media could turn against the government. While the exact cause of Beijing’s new focus on network security is unclear, it comes at a time when other countries are developing their own defenses against cyber attacks and hot topics like Stuxnet and WikiLeaks are generating new concerns about Internet security.
One of the U.S. State Department cables released by WikiLeaks focuses on the Chinese-based cyber attack on Google’s servers that became public in January 2010. According to a State Department source mentioned in one of the cables, Li Changchun, the fifth highest-ranking member of the Communist Party of China (CPC) and head of the Party’s Propaganda Department, was concerned about the information he could find on himself through Google’s search engine. He also reportedly ordered the attack on Google. This is single-source information, and since the cables WikiLeaks released do not include the U.S. intelligence community’s actual analysis of the source, we cannot vouch for its accuracy. What it does appear to verify, however, is that Beijing is regularly debating the opportunities and threats presented by the Internet. Read the rest of this entry »
Cyber Warfare
Posted by Gary in Comms, Threat Watch on 8/Dec/2010 17:07
From IDGA
Over the last year there have been multiple instances of breaches in cyber security in the DoD and government. Most recently a report detailing the fact that in April massive amounts of internet data traffic was re-routed through servers in China which then had access to the potentially sensitive information. The incident which lasted 18 minutes was traced back to China Telecom, a state owned telecommunications firm. The data included information from .mil and .gov sources as well as large corporations such as Microsoft and IBM.
It is not clear if any compromising information was gained from this effort or how or if any of the gathered data will be used. But it is concerning for many of the agencies and companies involved as they are unsure of where they stand or what could potentially be used against them in the future.
This is not an isolated incident and the U.S. government and the Pentagon have been battling cyber attacks, hacking, and other forms of internet crime for years now. However, in the last several years these attacks are growing in number and sophistication and are resulting in security breaches that could have grave consequences. Many seem to be coming from sources in Eastern Europe including Russia and an increasing number from China. However, it is unclear whether these attacks can be linked to government intelligence networks or are a result of cyber terrorists operating on their own personal agenda.