Category Encryption

Evolution Of U.S. Cyber Operations And Information Warfare

Evolution Of U.S. Cyber Operations And Information Warfare divergentoptions.org · by Divergent Options · May 25, 2017 Brett Wessley is an officer in the U.S. Navy, currently assigned to U.S. Pacific Command. The contents of this paper reflect his own personal views and are not necessarily endorsed by U.S. Pacific Command, Department of the Navy or Department of […]

U.S. Military Satellites In Crisis As Foreign Weapons Advance And Proliferate; We Must Practice Going To War Disconnected Or, In An Environment Where Our Networks Are Severely Degraded — Otherwise, We Are Inviting A Nasty Strategic Surprise

U.S. Military Satellites In Crisis As Foreign Weapons Advance And Proliferate; We Must Practice Going To War Disconnected Or, In An Environment Where Our Networks Are Severely Degraded — Otherwise, We Are Inviting A Nasty Strategic Surprise   http://www.fortunascorner.com        Bill Gertz had an article with the title above in the Wednesday, May […]

In Computer Attacks, Clues Point To Frequent Culprit: North Korea

Excerpts: Security experts at Symantec, which in the past has accurately identified attacks mounted by the United States, Israel and North Korea, found early versions of the ransomware, called WannaCry, that used tools that were also deployed against Sony Pictures Entertainment, a Bangladesh Central Bank last year and a Polish bank in February. American officials […]

North Korea May Have Been Behind Global Cyber Hack (WannaCry) Which Brought NHS To Its Knees

     If North Korea is indeed behind this attack/hack, was this a trial run in preparation for a much larger/devastating cyber attack — should hostilities break out between Washington and the West over Pyongyang’s pursuit of an  Intercontinental Ballistic Missile capable of carrying and delivering a nuclear warhead.       And, even if […]

To Curb North Korea, Target Its Cyber Arsenal

Thousands of North Korean tech workers, hackers and cyber criminals operate on Chinese soil, where they benefit from China’s superior bandwidth and network capability, according to a recent long-term study. | Getty To Curb North Korea, Target Its Cyber Arsenal, Experts Say By MARTIN MATISHAK 05/15/17 05:02 AM EDT https://www.politicopro.com/cybersecurity/story/2017/05/to-curb-north-korea-target-its-cyber-arsenal-experts-say-156808 The U.S. should explore another potential […]

Mysterious Hacking Collective Known As The ‘Shadow Brokers’ Stole NSA Super Weapon, And Caused Global Cyber Attack That Is Causing Chaos In 74 Countries — Dry Run For A Much Larger, Devastating Attack? What Will al Qaeda & ISIS Take Away From This?

Mysterious Hacking Collective Known As The ‘Shadow Brokers’ Stole NSA Super Weapon, And Caused Global Cyber Attack That Is Causing Chaos In 74 Countries — Dry Run For A Much Larger, Devastating Attack?  What Will al Qaeda & ISIS Take Away From This?   http://www.fortunascorner.com        By now, all of you are probably […]

NYU Accidentally Exposed Military Code-Breaking Project To The Entire Internet

  https://theintercept.com/2017/05/11/nyu-accidentally-exposed-military-code-breaking-computer-project-to-entire-internet/   NYU Accidentally Exposed Military Code-breaking Computer Project to Entire Internet May 11 2017, 10:57 a.m.   In early December 2016, Adam was doing what he’s always doing, somewhere between hobby and profession: looking for things that are on the internet that shouldn’t be. That week, he came across a server inside New York University’s famed Institute for […]

NSA Chief: This Is What A Worst-Case Cyber Attack Scenario Looks Like

NSA Chief: This Is What A Worst-Case Cyber Attack Scenario Looks Like By Steve Ranger, www.zdnet.com View Original May 9th, 2017 U.S. Cyber Command and NSA head admiral Michael Rogers has set out what a worst-case scenario for a cyberattack against the US would look like. In response to a question from Senator John McCain at a Senate […]

Cyber Thieves Now Exploiting SS7 Flaws To Hack Smartphone Two-Factor Authentication Systems; Systems That Can Secretly Track Your Movements Via Your Cellphone For Sale On The Web

Cyber Thieves Now Exploiting SS7 Flaws To Hack Smartphone Two-Factor Authentication Systems; Systems That Can Secretly Track Your Movements Via Your Cellphone For Sale On The Web www.fortunascorner.com      “Every breath you take, every move you make, move you make, every step you take…..I’ll be watching you,” are the lyrics to the 1983 song, ‘Every […]

U.S. Military Cyber Operation To Attack ISIS Last Year Sparked Heated Debate Over Alerting Allies

U.S. Military Cyber Operation To Attack ISIS Last Year Sparked Heated Debate Over Alerting Allies By Ellen Nakashima, www.washingtonpost.com View Original May 9th, 2006 Cyber Command and National Security Agency chief Adm. Michael S. Rogers testifies on Capitol Hill in early January.Photo by: Evan Vucci/Associated Press A secret global operation by the Pentagon late last year to […]