May 20

- China Publishes Data Claiming US Is World’s Largest Cyber Attacker (ZeroHedge, May 20, 2014):

Well that didn’t take long. Having already responded angrily to the US charging 5 military officers with cyber espionage, China has published details of the US cyber attacks:

  • *CHINA CALLS U.S. THE BIGGEST ATTACKER OF CYBER SPACE: XINHUA

From 3/19 to 5/18, they claim to have found 135 host computers in the US carrying 563 phishing pages targeting Chinese sites that directly controlled 1.18 million computers. But Jay Carney said earlier that “the US does not engage in economic espionage.”

As Xinhua reports, Continue reading »

Tags: , , , , , , , ,

Mar 13

- The Most Evil And Disturbing NSA Spy Practices To-Date Have Just Been Revealed (Liberty Blitzkrieg, March 12, 2014):

In some cases the NSA has masqueraded as a fake Facebook server, using the social media site as a launching pad to infect a target’s computer and exfiltrate files from a hard drive. In others, it has sent out spam emails laced with the malware, which can be tailored to covertly record audio from a computer’s microphone and take snapshots with its webcam. The hacking systems have also enabled the NSA to launch cyberattacks by corrupting and disrupting file downloads or denying access to websites.

The man-in-the-middle tactic can be used, for instance, to covertly change the content of a message as it is being sent between two people, without either knowing that any change has been made by a third party.

– From Glenn Greenwald’s latest article: How the NSA Plans to Infect Millions of Computers with Malware

The latest piece from Greenwald and company on the unconstitutional spy practices of the NSA may represent the most dangerous and disturbing revelations yet. It’s hard for shadiness at the NSA to surprise me these days, but there was only one word that kept repeating over and over in my head as I read this: EVIL.

As a quick aside, Greenwald points out in the quote above how spam emails are used by the NSA to bait you into clicking dangerous links. This is a timely revelation considering I received one such email yesterday from a friend of mine. The email was sent to a wide list of let’s say “liberty-minded people” and webmasters associated with very popular sites. The link seemed shady so I texted him to ask if he had sent it. He hadn’t.

Continue reading »

Tags: , , , , , , , , , , , , , , , , , ,

Jan 22

- Cyber attack that sent 750k malicious emails traced to hacked refrigerator, TVs and home routers (The Age/AFP, Jan 20, 2014):

Call it the attack of the zombie refrigerators.

Computer security researchers say they have discovered a large “botnet” which infected internet-connected home appliances and then delivered more than 750,000 malicious emails.

Continue reading »

Tags: , , , ,

Jan 12

Flashback:

- DHS Insider Update … Looks Like “It’s About To Get Very Ugly” … Very Soon!!!

- Breaking News: DHS Insider: It’s About To Get Very Ugly

- DHS Insider: ‘There Won’t Be Any Meaningful Deal About The Fiscal Crisis. This Is Planned … The Coming Collapse Of The U.S. Dollar Is A Done Deal.’

- DHS Insider On The Catastrophic State Of America

Possibly related info:

- Arnie Gundersen On U.S. Gov’t Buying 14 Million Potassium Iodide Pills (Used During Nuclear Disasters)

- Feds Want To Buy 14 Million Potassum Iodide Tablets

- US Military Is Stocking Up On A Massive Amount Of Anti-Radiation Pills In Preparation For Nuclear Fallout


us-constitution-dhs

- DHS insider gives final warning (Canada Free Press, Dec 29, 2013):

Under the cover and amid the distraction of the Christmas bustle, I had my last “official” contact with a source inside the Department of Homeland Security known as “Rosebud” in my writings. My source is leaving his position, retiring along with numerous others choosing to leave this bureaucratic monstrosity.

For this contact, my source took unprecedented measures to be certain that our contact was far off the radar of prying government eyes and ears. I was stunned at the lengths he employed, and even found myself somewhat annoyed by the inconvenience that his cloak-and-dagger approach caused. It was necessary, according to my source, because all department heads under FEMA and DHS are under orders to identify anyone disclosing any information for termination and potential criminal prosecution.

Continue reading »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Dec 06

- Big Banks Are Being Hit With Cyberattacks “Every Minute Of Every Day” (Economic Collapse, Dec 4, 2013):

What would you do if you logged in to your bank account one day and it showed that you had a zero balance and that your bank had absolutely no record that you ever had any money in your account at all?  What would you do if hackers shut down all online banking and all ATM machines for an extended period of time?  What would you do if you requested a credit report and discovered that there were suddenly 50 different versions of “you” all using the same Social Security number?  Don’t think that these things can’t happen.  According to Symantec, there was a 42 percent increase in cyberattacks against U.S. businesses last year.  And according to a recent report in the Telegraph, big banks are being hit with cyberattacks “every minute of every day”.  These attacks are becoming more powerful and more sophisticated with each passing year.  Most of the time the general public never hears much about the cyberattacks that are actually successful because authorities are determined to maintain confidence in the banking system.  But if people actually knew the truth about what was going on, they would not have much confidence at all.

Continue reading »

Tags: , , ,

Nov 12

- Stuxnet infected Russian nuclear plant (SC Magazine, Nov 8, 2013):

Jumped airgap, Kaspersky boss says.

Stuxnet had ‘badly infected’ the internal network of a Russian nuclear plant after the sophisticated malware caused chaos in Iran’s uranium facilities in Natanz.

The malware, widely considered to have been developed by the US Government as a means to disrupt Iran’s uranium enrichment plans, had crossed a physically separated ‘air-gapped’ network in the Russian plant after it was carried across on a USB device.

Eugene Kaspersky, the charismatic boss of the Russian antivirus company bearing his name, said a staffer at the unnamed nuclear plant informed him of the infection.

Continue reading »

Tags: , , , , , ,

Sep 01

- Big Sis Says Cyber Attack WILL Bring Down Power Grid: ‘When Not If’ (Activist Post, Aug 30, 2013)

Flashback:

- Congressman Ron Paul on  the Cyber Security Act: ‘They are doing everything in the world to control the internet.’

- Law Professor: Counter Terrorism Czar Told Me There Is Going To Be An i-9/11 And An i-Patriot Act;

Lawrence Lessig, a respected Law Professor from Stanford University told an audience at this years Fortune’s Brainstorm Tech conference in Half Moon Bay, California, that “There’s going to be an i-9/11 event” which will act as a catalyst for a radical reworking of the law pertaining to the internet.


Tags: , , , , , , , , , , , ,

Aug 03

Flashback.


- Meet The Man In Charge Of America’s Secret Cyber Army (In Which ‘Bonesaw’ Makes A Mockery Of PRISM):

Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh.

This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize. Never before has anyone in America’s intelligence sphere come close to his degree of power, the number of people under his command, the expanse of his rule, the length of his reign, or the depth of his secrecy. A four-star Army general, his authority extends across three domains: He is director of the world’s largest intelligence service, the National Security Agency; chief of the Central Security Service; and commander of the US Cyber Command. As such, he has his own secret military, presiding over the Navy’s 10th Fleet, the 24th Air Force, and the Second Army.

Schematically, Alexander’s empire consists of the following: virtually every piece in America’s information intelligence arsenal.

 

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Jun 24

Snowden exposed the U.S. government illegally and unconstitutionally spying on its citizens, …

… gets charged for spying.

Now that makes perfect sense, doesn’t it?

FYI.


- China’s Xinhua news agency condemns US ‘cyber-attacks’ (BBC News, June 23, 2013):

China’s official Xinhua news agency has condemned the US over continuing revelations about Washington’s surveillance activities by intelligence fugitive Edward Snowden.

In a commentary, it said the US had turned out to be the “biggest villain in our age”.

Xinhua says the latest allegations in the South China Morning Post, along with previous disclosures, are “clearly troubling signs”.

They demonstrate that the United States, which has long been trying to play innocent as a victim of cyber-attacks, has turned out to be the biggest villain in our age,” says Xinhua.

It owes too an explanation to China and other countries it has allegedly spied on. It has to share with the world the range, extent and intent of its clandestine hacking programs.”

Xinhua says the Snowden developments provide support for China’s position on cybersecurity.

“Both the United States and China, together with many other countries, are victims of hacking. For the uncharted waters of the Internet age, these countries should sit down and talk through their suspicions,” says Xinhua.

“With good intentions, they can even work for the establishment of certain rules that help define and regulate Internet activities and mechanisms that can work out their differences when frictions do arise.”

- China slams US as world’s biggest villain for cyber espionage (PressTV, June 23, 2013):

China’s official news agency has slammed the United States as the world’s “biggest villain” following new revelations about Washington’s cyber espionage against Chinese companies and institutions.

“These, along with previous allegations, are clearly troubling signs. They demonstrate that the United States, which has long been trying to play innocent as a victim of cyber attacks, has turned out to be the biggest villain in our age,” said a commentary published in the Xinhua news agency on Sunday.

Continue reading »

Tags: , , , , , , , , , , , , , , , , , , , , ,

Jun 23

- Meet The Man In Charge Of America’s Secret Cyber Army (In Which “Bonesaw” Makes A Mockery Of PRISM)

With his revelations exposing the extent of potential, and actual, pervasive NSA surveillance over the American population, Edward Snowden has done a great service for the public by finally forcing it to answer the question: is having Big Brother peek at every private communication and electronic information, a fair exchange for the alleged benefit of the state’s security. Alas, without further action form a population that appears largely numb and apathetic to disclosures that until recently would have sparked mass protests and toppled presidents, the best we can hope for within a political regime that has hijacked the democratic process, is some intense introspection as to what the concept of “America” truly means.

However, and more importantly, what Snowden’s revelations have confirmed, is that behind the scenes, America is now actively engaged in a new kind of war: an unprecedented cyber war, where collecting, deciphering, intercepting, and abusing information is the only thing that matters and leads to unprecedented power, and where enemies both foreign and domestic may be targeted without due process based on a lowly analyst’s “whim.”

It has also put spotlight on the man, who until recently deep in the shadows, has been responsible for building America’s secret, absolutely massive cyber army, and which according to a just released Wired profile is “capable of launching devastating cyberattacks. Now it’s ready to unleash hell.”

Meet General Keith Alexander, “a man few even in Washington would likely recognize”, which is troubling because Alexander is now quite possibly the most powerful person in the world, that nobody talks about. Which is just the way he likes it. Continue reading »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

May 28

- A list of the U.S. weapons designs and technologies compromised by hackers (Washington Post, May 28, 2013):

Weapon designs and technologies compromised

The following is reproduced from the nonpublic version of the Defense Science Board report “Resilient Military Systems and the Advanced Cyber Threat”:

Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitation

SYSTEM DESIGNS

Terminal High Altitude Area Defense

Patriot Advanced Capability-3

Extended Area Protection and Survivability System (EAPS)

F-35

V-22

C-17

Continue reading »

Tags: , , , , , , ,

May 28

Update:

- Here Is The Very Long List Of U.S. Weapons Designs And Technologies Compromised By Chinese Hackers


The charge by a defense panel comes a month visit by China’s president to Calif.


Chinese hackers have allegedly compromised the designs of top weapons systems, including the F-35 Joint Strike Fighter, The Washington Post reports. This photo from Northrop Grumman Corp., shows a pre-production model of the F-35 Joint Strike Fighter.

- Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies (Washington Post, May 28, 2013):

Designs for many of the nation’s most sensitive advanced weapons systems have been compromised by Chinese hackers, according to a report prepared for the Pentagon and to officials from government and the defense industry.Among more than two dozen major weapons systems whose designs were breached were programs critical to U.S. missile defenses and combat aircraft and ships, according to a previously undisclosed section of a confidential report prepared for Pentagon leaders by the Defense Science Board.

Tags: , , , , , , , , , , ,

Mar 09

- US considering pre-emptive cyberattacks (DW, Feb 2, 2013):

Media reports claim that the US is secretly claiming the right to launch pre-emptive cyberattacks in “credible threat” scenarios, in the wake of the attacks on US media outlets. But how credible are those threats?

The damage done by cyberattacks is not always immediately apparent, even after they have been carried out. Many were surprised when the New York Times, the Wall Street Journal and the Washington Post announced recently that they had been hit for over four months by cyberattacks, in part coming from China. Perhaps more alarmingly, the US Department of Homeland Security said that one power station had been knocked out for weeks by a cyberattack, though it declined to say which.

The US has of course launched a number of digital onslaughts of its own, most notably on Iran’s nuclear enrichment facilities. And that attack was not risk-free, as the so-called Stuxnet virus injected into Iranian systems ended up being leaked onto the Internet and copied millions of times.

Continue reading »

Tags: , , , , , , , , , ,

Feb 21

- Cyber-assault HQ: how US is under attack from this office in Shanghai (Independent, Feb 19, 2013):

A barrage of malicious cyber-attacks against computer networks in the United States and other countries over several years has been sourced by a private US security firm to a single building on the fringes of Shanghai, which, it says, is occupied by the Chinese military.

A 60-page report released by Mandiant, a Virginia-based firm that specialises in cyber-espionage, concludes that hundreds or perhaps thousands of English-speaking Chinese computer experts toil daily inside the anonymous-looking 12-storey building in the Pudong district of Shanghai. ‘Unit 61398’, as it is known, hacks into foreign networks on behalf of the People’s Liberation Army (PLA), Mandiant alleges.

“The nature of Unit 61398’s work is considered by China to be a state secret; however, we believe it engages in harmful computer network operations,” the security firm said in the report, which drew instant rebukes from the Chinese government. “It is time to acknowledge the threat that is originating in China, and we wanted to do our part to arm and prepare security professionals to combat that threat effectively.”

The company asserted that the unit, one of several in China believed to be involved in invading overseas computer systems, had “stolen hundreds of terabytes of data from at least 141 organisations across a diverse set of industries beginning as early as 2006”.  While most of the activity targeted corporations in the United States are smaller number is located in Canada and Britain, it said.

- US ready to strike back against China cyberattacks (AP, Feb 19, 2013):

WASHINGTON (AP) – As public evidence mounts that the Chinese military is responsible for stealing massive amounts of U.S. government data and corporate trade secrets, the Obama administration is eyeing fines and other trade actions it may take against Beijing or any other country guilty of cyberespionage.

According to officials familiar with the plans, the White House will lay out a new report Wednesday that suggests initial, more-aggressive steps the U.S. would take in response to what top authorities say has been an unrelenting campaign of cyberstealing linked to the Chinese government. The officials spoke on condition of anonymity because they were not authorized to speak publicly about the threatened action.

The White House plans come after a Virginia-based cybersecurity firm released a torrent of details Monday that tied a secret Chinese military unit in Shanghai to years of cyberattacks against U.S. companies. After analyzing breaches that compromised more than 140 companies, Mandiant has concluded that they can be linked to the People’s Liberation Army’s Unit 61398.

- China denies cyber attack allegations (BBC News, Feb 20, 2013)

Tags: , , , , , ,

Feb 05

- Pre-Emptive Cyber-Wars Begun They Have (ZeroHedge, Feb 4, 2013):

As the world’s economic powers squabble over the intricacies of cause and effect in a vicious cycle of currency devaluation and domestic economic defense; it appears, NYTimes reports, that the US is leading the way in another direction. A secret legal review on the use of America’s growing arsenal of cyberweapons has concluded that President Obama has the broad power to order a pre-emptive strike if the United States detects credible evidence of a major digital attack looming from abroad – i.e. if we ‘suspect’ someone is going to hack us, we can hack them. In what appears to be Stuxnet’s bigger (and scarier) brother,one official noted, “there are levels of cyberwarfare that are far more aggressive than anything that has been used or recommended to be done.” New policies will also govern how the intelligence agencies can carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code – even if there is no declared war. Cyberweaponry is the newest and perhaps most complex arms race under way, based in Cyber Command at The Pentagon, with the unspoken question being, ‘What are we going to do about China?’

Via NY Times
,

A secret legal review on the use of America’s growing arsenal of cyberweapons has concluded that President Obama has the broad power to order a pre-emptive strike if the United States detects credible evidence of a major digital attack looming from abroad, according to officials involved in the review. Continue reading »

Tags: , , , , , , , ,

Feb 05

- Secret rules to let Obama order ‘pre-emptive’ cyber attacks (PressTV, Feb 4, 2013):

A secret legal review on the use of America’s growing arsenal of cyberweapons has concluded that President Obama has the broad power to order a pre-emptive strike if the United States detects credible evidence of a major digital attack looming from abroad, according to officials involved in the review.

That decision is among several reached in recent months as the administration moves, in the next few weeks, to approve the nation’s first rules for how the military can defend, or retaliate, against a major cyberattack.

New policies will also govern how the intelligence agencies can carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code – even if there is no declared war.

Continue reading »

Tags: , , , , , , , , , , ,

Nov 22

- NSA Refuses To Release Secret Obama Directive On Cybersecurity (Infowars, Nov 21, 2012):

Order may allow military takeover of internet

The National Security Agency has refused to release details of a secret presidential directive which experts believe could allow the military and intelligence agencies to operate on the networks of private companies, such as Google and Facebook.

As we reported last week, an article in the Washington Post, cited several US officials saying that Obama signed off on the secret cybersecurity order, believed to widely expand NSA’s spying authorities, in mid-October.

“The new directive is the most extensive White House effort to date to wrestle with what constitutes an “offensive” and a “defensive” action in the rapidly evolving world of cyberwar and cyberterrorism.” the report states.

In response to the move, lawyers with the Electronic Privacy Information Center (EPIC) filed a Freedom of Information Act (FOIA) request (PDF) demanding that the Obama administration make public the text of the directive.

Continue reading »

Tags: , , , , , , , , , , , , , , , , , ,

Nov 20

- Anonymous leaks personal information of 5,000 Israeli officials (RT, Nov 18, 2012):

Internet hacktivist group Anonymous has declared cyberwar on Israel, posting personal data of five thousand Israeli officials online.

­The group used their Anonpaste.me site to address a message to the Israeli government before linking to the page with names, ID numbers and personal emails of 5,000 officials.

The message said: “It has come to our attention that the Israeli government has ignored repeated warnings about the abuse of human rights, shutting down the internet in Israel and mistreating its own citizens and those of its neighboring countries.”


(Screenshot from anonpaste.me)

The group also said “Israeli Gov. this is/will turn into a cyberwar.”

Earlier, the group hacked over 700 hundred Israeli websites, including the Bank of Jerusalem, the Israeli Defence Ministry, the IDF blog, the President’s official website and many others.

Most of the sites remain down. Continue reading »

Tags: , , , , , , ,

Aug 03

From the article:

Their (AC/DC) songs were among the loud music played to detainees at the Guantanamo Bay prison facility in preparation for interrogations, the Associated Press reported in October 20009, citing the National Security Archive in Washington.

Let’s just say the US or Israel is really behind this cyber attack.

What would happen if Iran would do the same to us or Israel?


- Iran Nuclear Plants Hit By Virus Playing AC/DC, Website Says (Bloomberg, July 25, 2012)

Iran’s nuclear facilities have suffered a cyber attack that shut down computers and played music from the rock band AC/DC, the F-Secure Security Labs website said.

A new worm targeted Iran’s nuclear program, closing down the “automation network” at the Natanz and Fordo facilities, the Internet security site reported, citing an e-mail it said was sent by a scientist inside Iran’s Atomic Energy Organization.

The virus also prompted several of the computers on site to play the song “Thunderstruck” by AC/DC at full volume in the middle of the night, according to the e-mail, part of which is published in English on the website.

Continue reading »

Tags: , , , , , , , , , , , ,

Jun 20

See also:

- Flame Steals Data Even When Computers Are Not Connected To The Internet

- Flame Virus Developed By U.S. Government

- Kaspersky At Cyber Security Conference: ‘It’s Not Cyber War, It’s Cyber Terrorism And I’m Afraid It’s Just The Beginning Of The Game … I’m Afraid It Will Be The End Of The World As We Know It’

- Kaspersky Lab: Flame And Stuxnet Virus Share Common Origin

- Obama Ordered The Stuxnet Attack On Iran’s Nuclear Facilities – And Yes: This Is An Act Of War!

- President Obama Ordered Stuxnet Attacks On Iran Nuclear Facilities

- US And Israel Created Stuxnet, Lost Control Of It

- Flame Super-Virus Threatening To Cripple Entire Nations Has ‘Hallmarks Of The NSA’


- Israel, US collaborated in creation of ‘Flame’ virus to slow Iran’s nuke efforts, report says (FOX News, June 19, 2012):

Israel and the United States collaborated in the development of the powerful computer virus dubbed the “Flame,” which briefly affected Iran’s key oil industry, an official with knowledge of the effort said.

The Washington Post reports that the massive piece of malware, which collected critical intelligence information from Iran, was created with the aim of slowing the country’s suspected nuclear weapon development.

The Worm.Win32.Flame threat, or “Flame” for short, was likely built by the same nation-state responsible for the Stuxnet virus that targeted Iran’s nuclear power plant in 2010. Many suspect Stuxnet was the work of Israeli intelligence.

Continue reading »

Tags: , , , , , , , , , , , , ,

Jun 12

Related info:

- Kaspersky Lab: Flame And Stuxnet Virus Share Common Origin

- Kaspersky At Cyber Security Conference: ‘It’s Not Cyber War, It’s Cyber Terrorism And I’m Afraid It’s Just The Beginning Of The Game … I’m Afraid It Will Be The End Of The World As We Know It’

- Obama Ordered The Stuxnet Attack On Iran’s Nuclear Facilities – And Yes: This Is An Act Of War!

- President Obama Ordered Stuxnet Attacks On Iran Nuclear Facilities

- US And Israel Created Stuxnet, Lost Control Of It

- Flame Super-Virus Threatening To Cripple Entire Nations Has ‘Hallmarks Of The NSA’


- Flame virus, most sophisticated malicious code ever seen, was developed by U.S. government (Natural News, June 12, 2012):

Anyone who has spent longer than a day on a computer knows how dangerous to your hard drive malware and other malicious code can be. Most of us have fallen victim to one or the other and have cursed the day the hacker who developed it was born.

Now, according to reports, some of the most sophisticated malicious code ever developed is a product of the United States government, leaving more than a few tech experts and analysts concerned that maybe now, Washington has become a bigger info-terrorist than some of the country’s worst enemies.

Continue reading »

Tags: , , , , , , , , , , , , ,

Jun 12

Related info:

- Flame Virus Developed By U.S. Government

- Kaspersky Lab: Flame And Stuxnet Virus Share Common Origin

- Obama Ordered The Stuxnet Attack On Iran’s Nuclear Facilities – And Yes: This Is An Act Of War!

- President Obama Ordered Stuxnet Attacks On Iran Nuclear Facilities

- US And Israel Created Stuxnet, Lost Control Of It

- Flame Super-Virus Threatening To Cripple Entire Nations Has ‘Hallmarks Of The NSA’


- Nations must talk to halt “cyber terrorism”: Kaspersky (Reuters, June 6, 2012):

Eugene Kaspersky, whose lab discovered the Flame virus that has attacked computers in Iran and elsewhere in the Middle East, said on Wednesday only a global effort could stop a new era of “cyber terrorism”.

It’s not cyber war, it’s cyber terrorism and I’m afraid it’s just the beginning of the game … I’m afraid it will be the end of the world as we know it,” Kaspersky told reporters at a cyber security conference in Tel Aviv.

“I’m scared, believe me,” he said.

News of the Flame virus surfaced last week. Researchers said technical evidence suggests it was built for the same nation or nations that commissioned the Stuxnet worm that attacked Iran’s nuclear programme in 2010.

In recent months U.S. officials have become more open about the work of the United States and Israel on Stuxnet, which targeted Iran’s Natanz nuclear enrichment facility.

Continue reading »

Tags: , , , , , , , , , , , , , ,

Jun 12

Related info:

- Flame Virus Developed By U.S. Government

- Kaspersky At Cyber Security Conference: ‘It’s Not Cyber War, It’s Cyber Terrorism And I’m Afraid It’s Just The Beginning Of The Game … I’m Afraid It Will Be The End Of The World As We Know It’

- Obama Ordered The Stuxnet Attack On Iran’s Nuclear Facilities – And Yes: This Is An Act Of War!

- President Obama Ordered Stuxnet Attacks On Iran Nuclear Facilities

- US And Israel Created Stuxnet, Lost Control Of It

- Flame Super-Virus Threatening To Cripple Entire Nations Has ‘Hallmarks Of The NSA’


- Diving Into Flame, Researchers Find A Link To Stuxnet (threatpost, June 11, 2012):

Researchers digging through the code of the recently discovered Flame worm say they have come across a wealth of evidence that suggests Flame and the now-famous Stuxnet worm share a common origin.

Researchers from Kaspersky Lab say that a critical module that the Flame worm used to spread is identical to a module used by Stuxnet.a, an early variant of the Stuxnet worm that began circulating in 2009, more than a year before a later variant of the worm was discovered by antivirus researchers at the Belarussian firm VirusBlokAda. The claims are the most direct, to date, that link the Flame malware, which attacked Iranian oil facilities, with Stuxnet, which is believed to have targeted Iran’s uranium-enrichment facility at Natanz. If true, they suggest a widespread and multi-year campaign of offensive cyber attacks against multiple targets within that country.

According to the Kaspersky researchers, early versions of Stuxnet were, in fact, created out of components that were part of what they refer to as the “Flame platform”. But they believe development of the two malicious programs diverged after 2009, suggesting that two different development teams may have been working independently for a single entity to create malware with specific objectives, according to Kaspersky researchers, writing on the company’s blog, Securelist.

Continue reading »

Tags: , , , , , , , , , ,

Jun 02

See also:

- US To Classify Major Cyber-Attacks As Acts Of War


- Obama Ordered The “Code Stux” (ZeroHedge, May 31, 2012):

When Iran’s nuclear facilities were publicly crippled in 2011 by what then was considered a revolutionary computer virus which destroys physical equipment, many immediately assumed the virus originated in Israel for obvious reasons. They were wrong. In what can be described as the first presidentially-mandated and condoned act of cyberwarfare, one circumventing the War Powers Act of course, the NYT informs us that the order to physically impair Iranian sovereignty came from none other than the Nobel Peace prize winning president: Barack Obama.

From the NYT:

From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.

Mr. Obama decided to accelerate the attacks – begun in the Bush administration and code-named Olympic Games – even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran’s Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet.

At a tense meeting in the White House Situation Room within days of the worm’s “escape,” Mr. Obama, Vice President Joseph R. Biden Jr. and the director of the Central Intelligence Agency at the time, Leon E. Panetta, considered whether America’s most ambitious attempt to slow the progress of Iran’s nuclear efforts had been fatally compromised.

“Should we shut this thing down?” Mr. Obama asked, according to members of the president’s national security team who were in the room.

Told it was unclear how much the Iranians knew about the code, and offered evidence that it was still causing havoc, Mr. Obama decided that the cyberattacks should proceed. In the following weeks, the Natanz plant was hit by a newer version of the computer worm, and then another after that. The last of that series of attacks, a few weeks after Stuxnet was detected around the world, temporarily took out nearly 1,000 of the 5,000 centrifuges Iran had spinning at the time to purify uranium.

This account of the American and Israeli effort to undermine the Iranian nuclear program is based on interviews over the past 18 months with current and former American, European and Israeli officials involved in the program, as well as a range of outside experts. None would allow their names to be used because the effort remains highly classified, and parts of it continue to this day.

For those confused – yes: this is an act of war. A New Normal war.

It appears to be the first time the United States has repeatedly used cyberweapons to cripple another country’s infrastructure, achieving, with computer code, what until then could be accomplished only by bombing a country or sending in agents to plant explosives. The code itself is 50 times as big as the typical computer worm, Carey Nachenberg, a vice president of Symantec, one of the many groups that have dissected the code, said at a symposium at Stanford University in April. Those forensic investigations into the inner workings of the code, while picking apart how it worked, came to no conclusions about who was responsible.

And still America continues to wage war, subverting the constitution, without any Congressional approval, and without even telling the population what is really happening. Because it is “for its own good.

A similar process is now under way to figure out the origins of another cyberweapon called Flame that was recently discovered to have attacked the computers of Iranian officials, sweeping up information from those machines. But the computer code appears to be at least five years old, and American officials say that it was not part of Olympic Games. They have declined to say whether the United States was responsible for the Flame attack.

The “New Normal Gulf of Tonkin“: Continue reading »

Tags: , , , , , , , , , , ,

Jun 02

Don’t miss (Flashback)!!!:

- US To Classify Major Cyber-Attacks As Acts Of War:

The Wall Street Journal, citing three officials who said they had seen the document, reported Tuesday that the strategy would classify major cyber-attacks as acts of war, paving the way for possible military retaliation.

The newspaper said that the strategy was intended in part as a warning to foes that may try to sabotage the US electricity grid, subways or pipelines.

“If you shut down our power grid, maybe we will put a missile down one of your smokestacks,” it quoted a military official as saying.


- Obama Order Sped Up Wave of Cyberattacks Against Iran (New York Times, May 1, 2012):

WASHINGTON — From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.

Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games — even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran’s Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet.

Continue reading »

Tags: , , , , , , , , , , ,

Jun 02

- Confirmed: US and Israel created Stuxnet, lost control of it (Ars Technica, June 1, 2012):

In 2011, the US government rolled out its “International Strategy for Cyberspace,” which reminded us that “interconnected networks link nations more closely, so an attack on one nation’s networks may have impact far beyond its borders.” An in-depth report today from the New York Times confirms the truth of that statement as it finally lays bare the history and development of the Stuxnet virus—and how it accidentally escaped from the Iranian nuclear facility that was its target.

The article is adapted from journalist David Sanger’s forthcoming book, Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power, and it confirms that both the US and Israeli governments developed and deployed Stuxnet. The goal of the worm was to break Iranian nuclear centrifuge equipment by issuing specific commands to the industrial control hardware responsible for their spin rate. By doing so, both governments hoped to set back the Iranian research program—and the US hoped to keep Israel from launching a pre-emptive military attack.

Continue reading »

Tags: , , , , , , , ,

May 31

Related info:

- Flame Super-Virus Threatening To Cripple Entire Nations Has ‘Hallmarks Of The NSA’


- Iran claims to have beaten ‘Flame’ computer virus (Telegraph, May 30, 2012):

Iran claims it has defeated a powerful computer virus that has boasted unprecedented data-snatching capabilities and could eavesdrop on computer users, a senior official said.

Ali Hakim Javadi, Iran’s deputy Minister of Communications and Information Technology, told the official IRNA news agency that Iranian experts have already produced an antivirus capable of identifying and removing “Flame” from computers.

Continue reading »

Tags: , , , , , , , , , , ,

May 31

- Was Flame super-virus created in the US? Cyber weapon threatening to cripple entire nations has ‘hallmarks of the NSA’ (Daily Mail, May 31, 2012):

  • Cyber experts: Spyware too sophisticated to have come from anywhere else

The Flame computer virus which is threatening to bring countries to a standstill is too sophisticated to have been created anywhere other than the U.S., it was claimed today.

As the United Nations prepares to issue its ‘most serious warning’ to guard against the superbug, cyber experts said it carried all the markings of a U.S. espionage operation.

Specifically, they have pointed the finger at the highly secretive National Security Agency.

Continue reading »

Tags: , , , , , , , , ,

Dec 19

Flashback:

- US To Classify Major Cyber-Attacks As Acts Of War:

The Wall Street Journal, citing three officials who said they had seen the document, reported Tuesday that the strategy would classify major cyber-attacks as acts of war, paving the way for possible military retaliation.

“If you shut down our power grid, maybe we will put a missile down one of your smokestacks,” it quoted a military official as saying.

DebkaFile is the media arm of Mossad. DebkaFile predicted in 2000 that terrorists would attack the World Trade Center and we all know why its prediction has been proven to be accurate.



Central Intelligence Agency (CIA) logo in lobby of the CIA Headquarters in Langley, Virginia (AFP Photo)

- Debka: Whoever hacked the drone, hacked the CIA (RT, Dec. 17, 2011):

New reports investigating Iran’s interception of a top-secret drone craft belonging to the CIA allege that the hijacking of the stealth airship could have roots not just overseas but in Washington as well.

Ongoing reports from RT have revealed that Iranian intelligence officer claimed in recent days that the recovery of America’s RQ-170 Sentinel stealth drone on December 4 was not due to an equipment malfunction, as US authorities say happened with another craft last days later, but rather the handiwork of Iranian engineers.

As RT reported yesterday, overseas officials speaking on condition of anonymity say that they were able to crack the computers of the drone to hijack the craft and lead it to a safe landing after it caught the drone creeping over from a mission in Afghanistan. Now military sources speaking to Israel-based news outlet Debka insist that Iranian officials made their way into the drone commander centers at CIA headquarters outside of Washington in Langley, Virginia. Debka has close connections with the Israel intelligence community and in the past has been known for correctly reporting on issues of importance to the American intelligence community before US outlets.

Continue reading »

Tags: , , , , , , , , , , , ,

Jun 17

Sure!

See also:

- Every 6 Hours The NSA Collects As Much Data As Is Stored In The Entire Library of Congress.


- NSA allies with Internet carriers to thwart cyber attacks against defense firms (Washington Post, June 16, 2011):

The National Security Agency is working with Internet service providers to deploy a new generation of tools to scan e-mail and other digital traffic with the goal of thwarting cyberattacks against defense firms by foreign adversaries, senior defense and industry officials say.

The novel program, which began last month on a voluntary, trial basis, relies on sophisticated NSA data sets to identify malicious programs slipped into the vast stream of Internet data flowing to the nation’s largest defense firms. Such attacks, including one last month against Bethesda-based Lockheed Martin, are nearly constant as rival nations and terrorist groups seek access to U.S. military secrets.

Continue reading »

Tags: , , , , , , ,