Tag Archives | Cyberwar

The New Art of War: How trolls, hackers and spies are rewriting the rules of conflict

Is the Art of War different if it’s a cyberwar? Tech Republic glamorizes hackers and trolls:

Cyberwar isn’t going to be about hacking power stations. It’s going to be far more subtle, and more dangerous.

Wandering the pretty, medieval streets of Tallinn’s old town, it is hard to believe that the tiny country of Estonia has anything at all to do with cyberwarfare. But first as victim of an attack and now as home to some of the leading thinkers on how the digital battlefield will develop, the country has played a key role in its emergence and evolution.

Talinn - 08

Estonia is a country of around 1.3 million people, facing the Baltic Sea and the Gulf of Finland, it borders Latvia to the south and Russia to the east. After decades as part of the Soviet Union, it regained independence in 1991.

Even today reminders of the Soviet times still abound in the capital Tallinn.

Read the rest
Continue Reading

Edward Snowden on Cyber Warfare

“Few people have lifted the veil on cyber warfare like Edward Snowden,” write James Bamford and Tim De Chant in the introduction to their exclusive interview with Snowden for PBS:

Snowden: So this is really interesting. The NSA chief in this who replaced Keith Alexander, the former NSA director, is calling the alleged damage from the last year’s revelations to be much more insignificant than it was represented publicly over the last year. We were led to believe that the sky was going to fall, that the oceans were going to boil off, the atmosphere was going to ignite, the world would end as we know it. But what he’s saying is that it does not lead him to the conclusion that the sky is falling.

And that’s a significant departure from the claims of the former NSA director, Keith Alexander. And it’s sort of a pattern that we’ve seen where the only U.S.

Read the rest
Continue Reading

North Korea, Sony, and America’s First Losing Cyberwar

The Interview 2014 poster.jpg

I’ve been hooked on the various salacious disclosures from the hack attack on Sony Pictures Entertainment. Reading what studio executives really think of their star actors and producers is better than TMZ can make up, and the true financial performance of various movies would never, ever be disclosed outside the C-suite if not for the Pastebin uploads. The real-life plot starring North Korea’s leader Kim Jong-un, his supposed superhackers, Seth Rogen and the heads of Sony also reads like a sequel to The Orphan Master’s Son. But is it too good to be true? Wired pours some cold water on the fire:

Today Sony canceled the premiere of “The Interview” and its entire Christmas-Day release of the movie because of fears that terrorists might attack theaters showing the film.

The actions show just how much power the attackers behind the Sony hack have amassed in a short time. But who exactly are they?

Read the rest
Continue Reading

What Goes Around Comes Around: The Karma Of Political Deception

Politicians follow laws or make their own but often don’t think that one of the oldest moral admonitions applies to them: the law of karma. That’s the one, seeped in Buddhist philosophy, but accepted by other religious traditions, that says ‘what goes around comes around.’

It’s a variant of the biblical injunction to do unto others what you want others to do unto you and the notion that for every action there’s a reaction.

The concept has many interpreters including this one: “Karma is not punishment or retribution but simply an extended expression or consequence of natural acts. Karma means ‘deed’ or ‘act’ and more broadly names the universal principle of cause and effect, action and reaction, that governs all life.”

Here’s President Obama committed to high tech warfare turning the skies into a shooting gallery. The idea of course is to precisely find and target enemies using super computers and image enhancement technologies to neutralize (i.e.… Read the rest

Continue Reading

United States And Israel Confirmed As Behind Stuxnet Virus

imagesIt’s official — Barack Obama covertly made history by engaging in cyberwarfare against Iran. New York Times breaks the news:

From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.

Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet.

This account of the American and Israeli effort to undermine the Iranian nuclear program is based on interviews over the past 18 months with current and former American, European and Israeli officials involved in the program, as well as a range of outside experts. None would allow their names to be used because the effort remains highly classified, and parts of it continue to this day.

Read the rest
Continue Reading

Israel Attacked From Saudi Arabia

Photo: Oren Rozen (CC)

Photo: Oren Rozen (CC)

A cyber attack that is, and it looks like a very successful first strike. From USA Today:

A hacker network that claims to be based in Saudi Arabia paralyzed the websites of Israel’s stock exchange and national airline on Monday, escalating an international cyber war that has jolted this security-obsessed country.

Neither website contains sensitive information and trading and flights were not affected. But the ongoing salvos by hackers who use anti-Israel language in their posts has revealed how vulnerable Israel is to cyber warfare, despite its sophisticated computer security units in the military and advanced high-tech sector.

The attacks began earlier this month when hackers identifying themselves as group-xp, a known Saudi hacking group, claimed on an Israeli sports website to have gained access to 400,000 Israeli credit card accounts. The group called it a “gift to the world for the New Year” designed to “hurt the Zionist pocket.”…

[continues at USA Today]

Read the rest

Continue Reading

DARPA Waxes Poetic at Cyber Colloquium

DARPAAaron Cynic writes at Diatribe Media:

The Defense Department plans to ratchet up cyber security over the next five years, say chatter from a conference its research arm, DARPA, held on Monday. DARPA is seeking $208 million in funding to “prepare for hostile cyber acts that threaten our military capabilities,” an increase in $83 million reports Information Week. At the “cyber colloquium” in Virginia on Monday, talking heads for the DoD waxed poetic about the issues the Pentagon faces with cyber security.

“It is the makings of novels and poetry from Dickens to Gibran that the best and the worst occupy the same time, that wisdom and foolishness appear in the same age, light and darkness in the same season,” said DARPA’s director Regina Dugan, Wired reports. Former White House Security chief Richard Clarke was more blunt, saying current networks are as “porous as a colande.” Meanwhile, Wired reports DARPA also tacitly reached out to hackers at the colloquium, looking to enlist “the efforts of technical experts at unprecedented levels, including at the development of policy and legal frameworks.”

Read the full post at Diatribe Media

Read the rest

Continue Reading

Chinese Military Suspected in Hacker Attacks on U.S. Satellites

MUOSTony Capaccio and Jeff Bliss report in Bloomberg:
Computer hackers, possibly from the Chinese military, interfered with two U.S. government satellites four times in 2007 and 2008 through a ground station in Norway, according to a congressional commission. The intrusions on the satellites, used for earth climate and terrain observation, underscore the potential danger posed by hackers, according to excerpts from the final draft of the annual report by the U.S.-China Economic and Security Review Commission. The report is scheduled to be released next month. “Such interference poses numerous potential threats, particularly if achieved against satellites with more sensitive functions,” according to the draft. “Access to a satellite‘s controls could allow an attacker to damage or destroy the satellite. An attacker could also deny or degrade as well as forge or otherwise manipulate the satellite’s transmission.”
Continue Reading

The 404 Attacks – Meme or Scheme?

Nothing Is True

Photo: Mr.Bigg23 (CC)

[UPDATE: the Wikipedia page has been deleted.]

A Wikipedia article that’s been the subject of some internal argument there (based on the fact that much associated with this meme is by its nature unverifiable) was brought to my attention by one of the readers of my books. I can’t say I’m entirely enthusiastic about the possible uses that this thing might be put to in the hands of a group like Anon — though it seems to already be “their” M.O. anyway, and the dis-organization is structured along the same lines as the fictitious (?) “Mother Hive Brain” in a way that’s always amused me more than a little. In a world teetering on the brink, and in the midst of issues such as “NymWars,” this topic at the least seems finally ripe for discussion as well as action. From Wikipedia:

In practice, the 404 Attacks are a technique for disseminating disinformation through various networks.

Read the rest
Continue Reading