Dec 19

Related info:

- The Interview Is “Desperately Unfunny”, “Will Flop” If Not Cancelled According To Leaked Sony Emails


mlk-obama-dream-versus-nightmare

- Obama chides Sony’s decision to nix film, says US must retaliate and pass cyber act (RT, Dec 19, 2014):

Sony Pictures Entertainment should have touched base with the White House before deciding to cancel the release of a controversial movie, United States President Barack Obama said Friday.

Weighing in on the major Sony scandal only hours after federal investigators attributed the recent hack to North Korea, Pres. Obama said the Hollywood studio was wrong to pull “The Interview,” a satirical film containing a plot to kill North Korean Pres. Kim Jong Un that was scheduled to be released on Christmas Day.

At the same time, though, Obama said the attack should serve as a wake-up call to Congress and prompt lawmakers in Washington, DC to get serious about implementing cybersecurity legislation in the wake of what is only the latest hack to be endured by a major American company. Continue reading »

Tags: , , , , , , , ,

May 20

- China Publishes Data Claiming US Is World’s Largest Cyber Attacker (ZeroHedge, May 20, 2014):

Well that didn’t take long. Having already responded angrily to the US charging 5 military officers with cyber espionage, China has published details of the US cyber attacks:

  • *CHINA CALLS U.S. THE BIGGEST ATTACKER OF CYBER SPACE: XINHUA

From 3/19 to 5/18, they claim to have found 135 host computers in the US carrying 563 phishing pages targeting Chinese sites that directly controlled 1.18 million computers. But Jay Carney said earlier that “the US does not engage in economic espionage.”

As Xinhua reports, Continue reading »

Tags: , , , , , , , ,

Mar 13

- The Most Evil And Disturbing NSA Spy Practices To-Date Have Just Been Revealed (Liberty Blitzkrieg, March 12, 2014):

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party.

– From Glenn Greenwald’s latest article: How the NSA Plans to Infect Millions of Computers with Malware

The latest piece from Greenwald and company on the unconstitutional spy practices of the NSA may represent the most dangerous and disturbing revelations yet. It’s hard for shadiness at the NSA to surprise me these days, but there was only one word that kept repeating over and over in my head as I read this: EVIL.

As a quick aside, Greenwald points out in the quote above how spam emails are used by the NSA to bait you into clicking dangerous links. This is a timely revelation considering I received one such email yesterday from a friend of mine. The email was sent to a wide list of let’s say “liberty-minded people” and webmasters associated with very popular sites. The link seemed shady so I texted him to ask if he had sent it. He hadn’t.

Continue reading »

Tags: , , , , , , , , , , , , , , , , , ,

Jan 22

- Cyber attack that sent 750k malicious emails traced to hacked refrigerator, TVs and home routers (The Age/AFP, Jan 20, 2014):

Call it the attack of the zombie refrigerators.

Computer security researchers say they have discovered a large “botnet” which infected internet-connected home appliances and then delivered more than 750,000 malicious emails.

Continue reading »

Tags: , , , ,

Jan 12

Flashback:

- DHS Insider Update … Looks Like “It’s About To Get Very Ugly” … Very Soon!!!

- Breaking News: DHS Insider: It’s About To Get Very Ugly

- DHS Insider: ‘There Won’t Be Any Meaningful Deal About The Fiscal Crisis. This Is Planned … The Coming Collapse Of The U.S. Dollar Is A Done Deal.’

- DHS Insider On The Catastrophic State Of America

Possibly related info:

- Arnie Gundersen On U.S. Gov’t Buying 14 Million Potassium Iodide Pills (Used During Nuclear Disasters)

- Feds Want To Buy 14 Million Potassum Iodide Tablets

- US Military Is Stocking Up On A Massive Amount Of Anti-Radiation Pills In Preparation For Nuclear Fallout


us-constitution-dhs

- DHS insider gives final warning (Canada Free Press, Dec 29, 2013):

Under the cover and amid the distraction of the Christmas bustle, I had my last “official” contact with a source inside the Department of Homeland Security known as “Rosebud” in my writings. My source is leaving his position, retiring along with numerous others choosing to leave this bureaucratic monstrosity.

For this contact, my source took unprecedented measures to be certain that our contact was far off the radar of prying government eyes and ears. I was stunned at the lengths he employed, and even found myself somewhat annoyed by the inconvenience that his cloak-and-dagger approach caused. It was necessary, according to my source, because all department heads under FEMA and DHS are under orders to identify anyone disclosing any information for termination and potential criminal prosecution.

Continue reading »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Dec 06

- Big Banks Are Being Hit With Cyberattacks “Every Minute Of Every Day” (Economic Collapse, Dec 4, 2013):

What would you do if you logged in to your bank account one day and it showed that you had a zero balance and that your bank had absolutely no record that you ever had any money in your account at all?  What would you do if hackers shut down all online banking and all ATM machines for an extended period of time?  What would you do if you requested a credit report and discovered that there were suddenly 50 different versions of “you” all using the same Social Security number?  Don’t think that these things can’t happen.  According to Symantec, there was a 42 percent increase in cyberattacks against U.S. businesses last year.  And according to a recent report in the Telegraph, big banks are being hit with cyberattacks “every minute of every day”.  These attacks are becoming more powerful and more sophisticated with each passing year.  Most of the time the general public never hears much about the cyberattacks that are actually successful because authorities are determined to maintain confidence in the banking system.  But if people actually knew the truth about what was going on, they would not have much confidence at all.

Continue reading »

Tags: , , ,

Nov 12

- Stuxnet infected Russian nuclear plant (SC Magazine, Nov 8, 2013):

Jumped airgap, Kaspersky boss says.

Stuxnet had ‘badly infected’ the internal network of a Russian nuclear plant after the sophisticated malware caused chaos in Iran’s uranium facilities in Natanz.

The malware, widely considered to have been developed by the US Government as a means to disrupt Iran’s uranium enrichment plans, had crossed a physically separated ‘air-gapped’ network in the Russian plant after it was carried across on a USB device.

Eugene Kaspersky, the charismatic boss of the Russian antivirus company bearing his name, said a staffer at the unnamed nuclear plant informed him of the infection.

Continue reading »

Tags: , , , , , ,

Sep 01

- Big Sis Says Cyber Attack WILL Bring Down Power Grid: ‘When Not If’ (Activist Post, Aug 30, 2013)

Flashback:

- Congressman Ron Paul on  the Cyber Security Act: ‘They are doing everything in the world to control the internet.’

- Law Professor: Counter Terrorism Czar Told Me There Is Going To Be An i-9/11 And An i-Patriot Act;

Lawrence Lessig, a respected Law Professor from Stanford University told an audience at this years Fortune’s Brainstorm Tech conference in Half Moon Bay, California, that “There’s going to be an i-9/11 event” which will act as a catalyst for a radical reworking of the law pertaining to the internet.


Tags: , , , , , , , , , , , ,

Aug 03

Flashback.


- Meet The Man In Charge Of America’s Secret Cyber Army (In Which ‘Bonesaw’ Makes A Mockery Of PRISM):

Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.

This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.

Schematically, Alexander’s empire consists of the following: virtually every piece in America’s information intelligence arsenal.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Jun 24

Snowden exposed the U.S. government illegally and unconstitutionally spying on its citizens, …

… gets charged for spying.

Now that makes perfect sense, doesn’t it?

FYI.


- China’s Xinhua news agency condemns US ‘cyber-attacks’ (BBC News, June 23, 2013):

China’s official Xinhua news agency has condemned the US over continuing revelations about Washington’s surveillance activities by intelligence fugitive Edward Snowden.

In a commentary, it said the US had turned out to be the “biggest villain in our age”.

Xinhua says the latest allegations in the South China Morning Post, along with previous disclosures, are “clearly troubling signs”.

They demonstrate that the United States, which has long been trying to play innocent as a victim of cyber-attacks, has turned out to be the biggest villain in our age,” says Xinhua.

It owes too an explanation to China and other countries it has allegedly spied on. It has to share with the world the range, extent and intent of its clandestine hacking programs.”

Xinhua says the Snowden developments provide support for China’s position on cybersecurity.

“Both the United States and China, together with many other countries, are victims of hacking. For the uncharted waters of the Internet age, these countries should sit down and talk through their suspicions,” says Xinhua.

“With good intentions, they can even work for the establishment of certain rules that help define and regulate Internet activities and mechanisms that can work out their differences when frictions do arise.”

- China slams US as world’s biggest villain for cyber espionage (PressTV, June 23, 2013):

China’s official news agency has slammed the United States as the world’s “biggest villain” following new revelations about Washington’s cyber espionage against Chinese companies and institutions.

“These, along with previous allegations, are clearly troubling signs. They demonstrate that the United States, which has long been trying to play innocent as a victim of cyber attacks, has turned out to be the biggest villain in our age,” said a commentary published in the Xinhua news agency on Sunday.

Continue reading »

Tags: , , , , , , , , , , , , , , , , , , , , ,

Jun 23

- Meet The Man In Charge Of America’s Secret Cyber Army (In Which “Bonesaw” Makes A Mockery Of PRISM)

With his revelations exposing the extent of potential, and actual, pervasive NSA surveillance over the American population, Edward Snowden has done a great service for the public by finally forcing it to answer the question: is having Big Brother peek at every private communication and electronic information, a fair exchange for the alleged benefit of the state’s security. Alas, without further action form a population that appears largely numb and apathetic to disclosures that until recently would have sparked mass protests and toppled presidents, the best we can hope for within a political regime that has hijacked the democratic process, is some intense introspection as to what the concept of “America” truly means.

However, and more importantly, what Snowden’s revelations have confirmed, is that behind the scenes, America is now actively engaged in a new kind of war: an unprecedented cyber war, where collecting, deciphering, intercepting, and abusing information is the only thing that matters and leads to unprecedented power, and where enemies both foreign and domestic may be targeted without due process based on a lowly analyst’s “whim.”

It has also put spotlight on the man, who until recently deep in the shadows, has been responsible for building America’s secret, absolutely massive cyber army, and which according to a just released Wired profile is “capable of launching devastating cyberattacks. Now it’s ready to unleash hell.”

Meet General Keith Alexander, “a man few even in Washington would likely recognize”, which is troubling because Alexander is now quite possibly the most powerful person in the world, that nobody talks about. Which is just the way he likes it. Continue reading »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

May 28

- A list of the U.S. weapons designs and technologies compromised by hackers (Washington Post, May 28, 2013):

Weapon designs and technologies compromised

The following is reproduced from the nonpublic version of the Defense Science Board report “Resilient Military Systems and the Advanced Cyber Threat”:

Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitation

SYSTEM DESIGNS

Terminal High Altitude Area Defense

Patriot Advanced Capability-3

Extended Area Protection and Survivability System (EAPS)

F-35

V-22

C-17

Continue reading »

Tags: , , , , , , ,

May 28

Update:

- Here Is The Very Long List Of U.S. Weapons Designs And Technologies Compromised By Chinese Hackers


The charge by a defense panel comes a month visit by China’s president to Calif.


Chinese hackers have allegedly compromised the designs of top weapons systems, including the F-35 Joint Strike Fighter, The Washington Post reports. This photo from Northrop Grumman Corp., shows a pre-production model of the F-35 Joint Strike Fighter.

- Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies (Washington Post, May 28, 2013):

Designs for many of the nation’s most sensitive advanced weapons systems have been compromised by Chinese hackers, according to a report prepared for the Pentagon and to officials from government and the defense industry.Among more than two dozen major weapons systems whose designs were breached were programs critical to U.S. missile defenses and combat aircraft and ships, according to a previously undisclosed section of a confidential report prepared for Pentagon leaders by the Defense Science Board.

Tags: , , , , , , , , , , ,

Mar 09

- US considering pre-emptive cyberattacks (DW, Feb 2, 2013):

Media reports claim that the US is secretly claiming the right to launch pre-emptive cyberattacks in “credible threat” scenarios, in the wake of the attacks on US media outlets. But how credible are those threats?

The damage done by cyberattacks is not always immediately apparent, even after they have been carried out. Many were surprised when the New York Times, the Wall Street Journal and the Washington Post announced recently that they had been hit for over four months by cyberattacks, in part coming from China. Perhaps more alarmingly, the US Department of Homeland Security said that one power station had been knocked out for weeks by a cyberattack, though it declined to say which.

The US has of course launched a number of digital onslaughts of its own, most notably on Iran’s nuclear enrichment facilities. And that attack was not risk-free, as the so-called Stuxnet virus injected into Iranian systems ended up being leaked onto the Internet and copied millions of times.

Continue reading »

Tags: , , , , , , , , , ,

Feb 21

- Cyber-assault HQ: how US is under attack from this office in Shanghai (Independent, Feb 19, 2013):

A barrage of malicious cyber-attacks against computer networks in the United States and other countries over several years has been sourced by a private US security firm to a single building on the fringes of Shanghai, which, it says, is occupied by the Chinese military.

A 60-page report released by Mandiant, a Virginia-based firm that specialises in cyber-espionage, concludes that hundreds or perhaps thousands of English-speaking Chinese computer experts toil daily inside the anonymous-looking 12-storey building in the Pudong district of Shanghai. ‘Unit 61398’, as it is known, hacks into foreign networks on behalf of the People’s Liberation Army (PLA), Mandiant alleges.

“The nature of Unit 61398’s work is considered by China to be a state secret; however, we believe it engages in harmful computer network operations,” the security firm said in the report, which drew instant rebukes from the Chinese government. “It is time to acknowledge the threat that is originating in China, and we wanted to do our part to arm and prepare security professionals to combat that threat effectively.”

The company asserted that the unit, one of several in China believed to be involved in invading overseas computer systems, had “stolen hundreds of terabytes of data from at least 141 organisations across a diverse set of industries beginning as early as 2006”.  While most of the activity targeted corporations in the United States are smaller number is located in Canada and Britain, it said.

- US ready to strike back against China cyberattacks (AP, Feb 19, 2013):

WASHINGTON (AP) – As public evidence mounts that the Chinese military is responsible for stealing massive amounts of U.S. government data and corporate trade secrets, the Obama administration is eyeing fines and other trade actions it may take against Beijing or any other country guilty of cyberespionage.

According to officials familiar with the plans, the White House will lay out a new report Wednesday that suggests initial, more-aggressive steps the U.S. would take in response to what top authorities say has been an unrelenting campaign of cyberstealing linked to the Chinese government. The officials spoke on condition of anonymity because they were not authorized to speak publicly about the threatened action.

The White House plans come after a Virginia-based cybersecurity firm released a torrent of details Monday that tied a secret Chinese military unit in Shanghai to years of cyberattacks against U.S. companies. After analyzing breaches that compromised more than 140 companies, Mandiant has concluded that they can be linked to the People’s Liberation Army’s Unit 61398.

- China denies cyber attack allegations (BBC News, Feb 20, 2013)

Tags: , , , , , ,

Feb 05

- Pre-Emptive Cyber-Wars Begun They Have (ZeroHedge, Feb 4, 2013):

As the world’s economic powers squabble over the intricacies of cause and effect in a vicious cycle of currency devaluation and domestic economic defense; it appears, NYTimes reports, that the US is leading the way in another direction. A secret legal review on the use of America’s growing arsenal of cyberweapons has concluded that President Obama has the broad power to order a pre-emptive strike if the United States detects credible evidence of a major digital attack looming from abroad – i.e. if we ‘suspect’ someone is going to hack us, we can hack them. In what appears to be Stuxnet’s bigger (and scarier) brother,one official noted, “there are levels of cyberwarfare that are far more aggressive than anything that has been used or recommended to be done.” New policies will also govern how the intelligence agencies can carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code – even if there is no declared war. Cyberweaponry is the newest and perhaps most complex arms race under way, based in Cyber Command at The Pentagon, with the unspoken question being, ‘What are we going to do about China?’

Via NY Times
,

A secret legal review on the use of America’s growing arsenal of cyberweapons has concluded that President Obama has the broad power to order a pre-emptive strike if the United States detects credible evidence of a major digital attack looming from abroad, according to officials involved in the review. Continue reading »

Tags: , , , , , , , ,

Feb 05

- Secret rules to let Obama order ‘pre-emptive’ cyber attacks (PressTV, Feb 4, 2013):

A secret legal review on the use of America’s growing arsenal of cyberweapons has concluded that President Obama has the broad power to order a pre-emptive strike if the United States detects credible evidence of a major digital attack looming from abroad, according to officials involved in the review.

That decision is among several reached in recent months as the administration moves, in the next few weeks, to approve the nation’s first rules for how the military can defend, or retaliate, against a major cyberattack.

New policies will also govern how the intelligence agencies can carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code – even if there is no declared war.

Continue reading »

Tags: , , , , , , , , , , ,

Nov 22

- NSA Refuses To Release Secret Obama Directive On Cybersecurity (Infowars, Nov 21, 2012):

Order may allow military takeover of internet

The National Security Agency has refused to release details of a secret presidential directive which experts believe could allow the military and intelligence agencies to operate on the networks of private companies, such as Google and Facebook.

As we reported last week, an article in the Washington Post, cited several US officials saying that Obama signed off on the secret cybersecurity order, believed to widely expand NSA’s spying authorities, in mid-October.

“The new directive is the most extensive White House effort to date to wrestle with what constitutes an “offensive” and a “defensive” action in the rapidly evolving world of cyberwar and cyberterrorism.” the report states.

In response to the move, lawyers with the Electronic Privacy Information Center (EPIC) filed a Freedom of Information Act (FOIA) request (PDF) demanding that the Obama administration make public the text of the directive.

Continue reading »

Tags: , , , , , , , , , , , , , , , , , ,

Nov 20

- Anonymous leaks personal information of 5,000 Israeli officials (RT, Nov 18, 2012):

Internet hacktivist group Anonymous has declared cyberwar on Israel, posting personal data of five thousand Israeli officials online.

­The group used their Anonpaste.me site to address a message to the Israeli government before linking to the page with names, ID numbers and personal emails of 5,000 officials.

The message said: “It has come to our attention that the Israeli government has ignored repeated warnings about the abuse of human rights, shutting down the internet in Israel and mistreating its own citizens and those of its neighboring countries.”


(Screenshot from anonpaste.me)

The group also said “Israeli Gov. this is/will turn into a cyberwar.”

Earlier, the group hacked over 700 hundred Israeli websites, including the Bank of Jerusalem, the Israeli Defence Ministry, the IDF blog, the President’s official website and many others.

Most of the sites remain down. Continue reading »

Tags: , , , , , , ,

Aug 03

From the article:

Their (AC/DC) songs were among the loud music played to detainees at the Guantanamo Bay prison facility in preparation for interrogations, the Associated Press reported in October 20009, citing the National Security Archive in Washington.

Let’s just say the US or Israel is really behind this cyber attack.

What would happen if Iran would do the same to us or Israel?


- Iran Nuclear Plants Hit By Virus Playing AC/DC, Website Says (Bloomberg, July 25, 2012)

Iran’s nuclear facilities have suffered a cyber attack that shut down computers and played music from the rock band AC/DC, the F-Secure Security Labs website said.

A new worm targeted Iran’s nuclear program, closing down the “automation network” at the Natanz and Fordo facilities, the Internet security site reported, citing an e-mail it said was sent by a scientist inside Iran’s Atomic Energy Organization.

The virus also prompted several of the computers on site to play the song “Thunderstruck” by AC/DC at full volume in the middle of the night, according to the e-mail, part of which is published in English on the website.

Continue reading »

Tags: , , , , , , , , , , , ,