recentpopularlog in

jerryking : u.s._cyber_command   8

Cyberattacks Put Russian Fingers on the Switch at Power Plants, U.S. Says
MARCH 15, 2018 | The New York Times | By NICOLE PERLROTH and DAVID E. SANGER.

The Trump administration accused Russia on Thursday of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.....Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.....Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.
Russia  security_&_intelligence  cyberattacks  vandalism  cyber_security  power_grid  infrastructure  NSA  vulnerabilities  hackers  U.S._Cyber_Command  David_Sanger  cyberphysical  physical_world 
march 2018 by jerryking
U.S. Cyberweapons, Used Against Iran and North Korea, Are a Disappointment Against ISIS - The New York Times
By DAVID E. SANGER and ERIC SCHMITT JUNE 12, 2017.

In 2016, U.S. cyberwarriors began training their arsenal of cyberweapons on a more elusive target, internet use by the Islamic State. Thus far, the results have been a consistent disappointment......The effectiveness of the nation’s arsenal of cyberweapons hit its limits against an enemy that exploits the internet largely to recruit, spread propaganda and use encrypted communications, all of which can be quickly reconstituted after American “mission teams” freeze their computers or manipulate their data..... the U.S. is rethinking how cyberwarfare techniques, first designed for fixed targets like nuclear facilities, must be refashioned to fight terrorist groups that are becoming more adept at turning the web into a weapon......one of the rare successes against the Islamic State belongs at least in part to Israel, which was America’s partner in the attacks against Iran’s nuclear facilities. Top Israeli cyberoperators penetrated a small cell of extremist bombmakers in Syria months ago, the officials said. That was how the United States learned that the terrorist group was working to make explosives that fooled airport X-ray machines and other screening by looking exactly like batteries for laptop computers......ISIS' agenda and tactics make it a particularly tough foe for cyberwarfare. The jihadists use computers and social media not to develop or launch weapons systems but to recruit, raise money and coordinate future attacks.

Such activity is not tied to a single place, as Iran’s centrifuges were, and the militants can take advantage of remarkably advanced, low-cost encryption technologies. The Islamic State, officials said, has made tremendous use of Telegram, an encrypted messaging system developed largely in Germany......disruptions often require fighters to move to less secure communications, making them more vulnerable. Yet because the Islamic State fighters are so mobile, and their equipment relatively commonplace, reconstituting communications and putting material up on new servers are not difficult.
ISIS  NSA  security_&_intelligence  disappointment  Israel  encryption  disruption  London  London_Bridge  tools  cyber_security  cyberweapons  vulnerabilities  terrorism  Pentagon  U.S._Cyber_Command  campaigns  David_Sanger 
june 2017 by jerryking
U.S. Cyber Command Chief on What Threats to Fear the Most - WSJ
June 19, 2016 | WSJ |

But the types of threats that we worry most about today that are new are adversaries taking full control of our networks, losing control of our networks, having a hacker appear to be a trusted user......MS. BLUMENSTEIN: Extraordinary investments are required now for cybersecurity. But looked at another way, there’s an extraordinary cost to getting it wrong.

I was talking to one of the CFOs out there who said, “Can you ask, what is the estimated loss?” Is there a total number? Or do you just know specific incidences?

On the military side, you can imagine the difficulty that would cause a commander, if he didn’t trust his own network or his data.
adversaries  cyber_security  cyber_warfare  threats  North_Korea  ISIS  network_risk  capabilities  Russia  China  Sony  data  Pentagon  U.S._Cyber_Command  cyberattacks 
june 2016 by jerryking
U.S. Directs Cyberweapons at ISIS for First Time - The New York Times
APRIL 24, 2016 | NYT | By DAVID E. SANGER.

The United States has opened a new line of combat against the Islamic State, directing the military’s six-year-old Cyber Command for the first time to mount computer-network attacks that are now being used alongside more traditional weapons....The NSA, which specializes in electronic surveillance, has for years listened intensely to the militants of the Islamic State, and those reports are often part of the president’s daily intelligence briefing. But the N.S.A.’s military counterpart, Cyber Command, was focused largely on Russia, China, Iran and North Korea — where cyberattacks on the United States most frequently originate — and had run virtually no operations against what has become the most dangerous terrorist organization in the world...The goal of the new campaign is to disrupt the ability of the Islamic State to spread its message, attract new adherents, circulate orders from commanders and carry out day-to-day functions, like paying its fighters....The N.S.A. has spent years penetrating foreign networks — the Chinese military, Russian submarine communications, Internet traffic and other targets — placing thousands of “implants” in those networks to allow it to listen in.

But those implants can be used to manipulate data or to shut a network down. That frequently leads to a battle between the N.S.A. civilians — who know that to make use of an implant is to blow its cover — and the military operators who want to strike back. N.S.A. officials complained that once the implants were used to attack, the Islamic State militants would stop the use of a communications channel and perhaps start one that was harder to find, penetrate or de-encrypt.
ISIS  cyber_warfare  NSA  security_&_intelligence  terrorism  cyberweapons  exploits  hackers  software_bugs  vulnerabilities  Pentagon  U.S._Cyber_Command  campaigns  David_Sanger 
april 2016 by jerryking
L. Gordon Crovitz: White Hats vs. Black Hats - WSJ.com
August 4, 2013 | WSJ | By L. GORDON CROVITZ.

The NSA says 42 terror-related plots have been disrupted, thanks to its surveillance program.

In the language of computer hacking, the good guys are "white hats," who identify weaknesses in systems so they can be fixed. "Black hats" are the ones who take advantage of weaknesses in systems.......A white-hat hacker would point out what happens when intelligence agencies fail to monitor communications data. Gen. Alexander pointed out that the 9/11 plots succeeded because of avoidable intelligence failures, citing the example of an intercept of a phone call from Yemen involving one of the 9/11 hijackers. "We didn't have the tools and capabilities to see that he was actually in California," Gen. Alexander said. "The intelligence community failed to connect those dots."
black_hats  NSA  security_&_intelligence  surveillance  9/11  privacy  L._Gordon_Crovtiz  terrorism  U.S._Cyber_Command  connecting_the_dots  white_hats 
august 2013 by jerryking
Who Controls The Internet?
Oct 9, 2010 | Financial Times pg. 14 | Misha Glenny. US
Cyber Command is the Pentagon command charged with defending the US
against catastrophic internet-based attacks. Fully operational from last
week, it is the latest in a series of dramatic moves across the world
aimed at monitoring and controlling how all of us use the web...Western
governments cite three central threats that justify the increased
presence of military, intelligence and law enforcement agencies in
cyberspace - crime, commercial espionage and warfare....Misha Glenny's
"McMafia: Seriously Organised Crime" is published by Vintage.
GCHQ  cyber_warfare  cyber_security  threats  ProQuest  Pentagon  catastrophic_risk  organized_crime  industrial_espionage  Stuxnet  books  U.S._Cyber_Command 
october 2010 by jerryking

Copy this bookmark:





to read