Category Cyber War

Fake Online Stores Reveal Gamblers’ Shadow Banking System

http://www.reuters.com/article/us-gambling-usa-dummies-exclusive-idUSKBN19D137 CYBER RISK | Thu Jun 22, 2017 | 4:35pm EDT Exclusive: Fake Online Stores Reveal Gamblers’ Shadow Banking System By Alasdair Pal | LONDON A network of dummy online stores offering household goods has been used as a front for internet gambling payments, a Reuters examination has found. The seven sites, operated out of Europe, purport to sell items including […]

House Bill To Restrict Pentagon Contracts With Chinese Telecoms

House Bill To Restrict Pentagon Contracts With Chinese Telecoms Huawei, ZTE Gear Pose Cyber Attack Risk Share Tweet Email Getty Images BY: Bill Gertz Follow @BillGertz June 23, 2017 2:03 pm The pending House defense bill contains new provisions that would restrict the Pentagon from buying equipment from Chinese or Russian telecommunications firms over cyber […]

Wikileaks: The CIA Can Remotely Hack Into Computers That Aren’t Even Connected To The Internet

The methods, means, and opportunities to remotely hack into devices continues to grow at the pace of Moore’s Law, or faster.  Indeed, researchers have now demonstrated that hackers can even breach your devices via an E-Cigarette.  RCP   Wikileaks: The CIA Can Remotely Hack Into Computers That Aren’t Even Connected To The internet By Keith Collins, qz.com […]

A Cyber Attack ‘The World Isn’t Ready For’

A Cyber Attack ‘The World Isn’t Ready For’ By Nicole Perlroth, www.nytimes.com View Original June 22nd, 2017 Golan Ben-Oni, of the IDT Corporation, which was attacked in April with two cyberweapons stolen from the National Security Agency. Credit Justin T. Gellerson for The New York TimesPhoto by: Justin T. Gellerson for The New York Times NEWARK — […]

Defense Strategy And The Iron Triangle Of Painful Tradeoffs

Excerpts: unavoidable iron triangle of painful tradeoffs (hereafter ITPT)   A defense strategy is an approach that ties together the goals, approaches, and resources (people, technology, dollars, etc.) that can best advance priority interests by exploiting opportunities and overcoming challenges. It must account for, and in some cases seek to shape, a complex and dynamic […]

Secret Government Report: Chelsea Manning Leaks Caused No Real Harm

As David Maxwell notes below: David Maxwell:  Note that there is a link in the article to the 2011 report that appears to be still classified.  The classification markings are lined through but there are no declassification markings on it.  Obviously government employees should not click on the link and download it. Secret Government Report: […]

Latest DoD General Officer Assignments Has Dir. DIA, LTG. Vince Stewart Taking Over As The New Deputy Dir., U.S. CYBERCOM

     Latest General Officer appointments/assignments from DoD has the Dir. of DIA, LTG. Vince Stewart, being assigned as the new, Deputy Commander, U.S. Cyber Command.  I wish him the best.  His argument that DIA is losing its relevancy; and, that there is too much bureaucratic resistance to potentially disruptive change within his agency — […]

CIA Reportedly Hacked Wi-Fi Routers For Years

CIA Reportedly Hacked Wi-Fi Routers For Years By Steven Musil, www.cnet.com View Original June 15th, 2017 The CIA has been hacking home, office and public wireless routers for years in an effort to carry out clandestine surveillance, according to classified documents seen by CNET sister site ZDNet. The intelligence agency had by mid-2012 developed implants “for roughly 25 different devices […]

ISIS Drone Program Becoming Increasingly Dangerous For U.S. Special Forces In Raqqa, Syria; Armed, Flying Drones Are The New Improvised Explosive Devices (IEDs) — And, We Can Expect This Threat To Grow In Scale, Complexity, Sophistication, & Lethality

ISIS Drone Program Becoming Increasingly Dangerous For U.S. Special Forces In Raqqa, Syria; Armed, Flying Drones Are The New Improvised Explosive Devices (IEDs) — And, We Can Expect This Threat To Grow In Scale, Complexity, Sophistication, & Lethality https://fortunascorner.com      The website ValueBit News, has a June 15, 2017 article by the title above […]

America’s Industrial Might Is Working To End The Drone Threat

America’s Industrial Might Is Working To End The Drone Threat Dan Goure June 14, 2017 TweetShareShare For more than two decades, the U.S. military owned the skies when it came to the employment of unmanned aerial systems (UAS) or drones. From the tiny, hand-launched Raven and Puma AE (All Environment) to the ubiquitous Predator and […]