Nepal – the country of the Buddha and the Mt. Everest

Peace comes from within. Do not seek it without – Buddha

Posts Tagged ‘Cyber war’

‘Spamhaus mafia tactics – main threat to Internet freedom’: CyberBunker explains largest cyber-attack

Posted by Ram Kumar Shrestha on March 28, 2013

Spamhaus is a major censorship organization only pretending to fight spam, a CyberBunker spokesman said in an RT exclusive. Sven Olaf Kamphuis claimed that as a constant bully of Internet service providers Spamhaus has only itself to blame for the attack.

In a Skype interview with RT, Kamphuis denied that CyberBunker was the organization behind the historical attack, pointing the finger at a large collective of internet providers around the globe called Stophaus.com.

Spamhaus has blackmailed a number of internet service providers and carriers into disconnecting clients without court orders or any legal process, Kamphuis says. Basically, he accuses them of claiming people are spammers when they are not.

“They do it on a regular basis,” Kamphuis said. “If people do not comply with their demands they just list the entire internet provider.”

Kamphuis claims they use “mafia tactics” and have a list of internet users that they do not like, which features a lot of users from China and Russia because they allegedly believe that a lot of spammers and criminals in these two countries use the internet to facilitate crime.

Spamhaus first reported massive DDoS attacks on March 20. At one point Spamhaus servers were flooded with 300 billion bits per second (300Gbps) of data, making it the largest registered attack of this kind in the history of the internet, according to Kaspersky anti-virus giant’s experts.

Image from cyberbunker.com
Image from cyberbunker.com

“The data flow generated by such an attack may affect intermediate network nodes when it passes them, thus impeding operations of normal web services that have no relation to Spamhaus or CyberBunker,”corporate communications manager at Kaspersky, Yuliya Krivosheina, wrote in a statement for RT.“Therefore, such DDoS attack may affect regular users as well, with network slowdown or total unavailability of certain web resources being typical symptoms.” Read the rest of this entry »

Advertisements

Posted in Global | Tagged: , , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Cyber-war between U.S., China

Posted by Ram Kumar Shrestha on February 20, 2013

Acting Commerce Secretary Rebecca Blank explains President Obama's cybersecurity policy after an executive order designed to combat cyber-terrorism was issued last week. Photo: Ann Heisenfelt, Associated Press

Acting Commerce Secretary Rebecca Blank explains President Obama’s cybersecurity policy after an executive order designed to combat cyber-terrorism was issued last week. Photo: Ann Heisenfelt, Associated Press

By James Temple

A prominent computer security firm has traced the activity of one of the world’s most sophisticated hacking groups to the gates of the Chinese military, underscoring critical weaknesses in both our cyber-defenses and trade policies.

Mandiant’s detailed 60-page analysis, first reported in the New York Times on Sunday, adds to the mounting evidence that Beijing plays a direct hand in ongoing espionage of U.S. corporations.

The Alexandria, Va., security firm explained that attacks from the group it calls APT1, or Comment Crew, originate in the same geographic location as the People’s Liberation Army Unit 61398, on the edge of Shanghai. The two groups also appear to share missions, capabilities, resources, tactics and technology infrastructure.

“It is time to acknowledge the threat is originating in China,” the company said.

China declined to do so, however, denying the allegations and labeling the report “unprofessional.”

But Mandiant’s analysis follows a string of reports linking corporate cyber-attacks to China in recent weeks, including ones aimed at the New York TimesWall Street Journal, Washington Post and others. The report is also consistent with the U.S. government’s own findings. Read the rest of this entry »

Posted in Global | Tagged: , , , , , , , , , , , , , , , , , , , , | Leave a Comment »

Plan X: Pentagon’s blueprint for full-fledged cyberwar

Posted by Ram Kumar Shrestha on June 1, 2012

AFP Photo / HO / DoD

AFP Photo / HO / DoD

The wheels of the war machine are ever turning inside the Pentagon, but the Defense Department’s latest endeavor won’t involve fighter jets and armored tanks. The DoD is putting aside billions to enhance its cyberwar capabilities.

The Pentagon’s Defense Advanced Research Projects Agency, DARPA, is turning towards the private sector and America’s next generation of computer wiz-kids to recruit forces for its next war. A report released Thursday by the Washington Post reveals that DARPA is looking to invest $1.54 billion during the next five years to up its online abilities, with $110 million going directly to a program dubbed Plan X, but unlike before it won’t be budgeted necessarily for thwarting acts of cyberterrorism. Instead the Pentagon is itching to ensure that America can carry out an offensive cyberwar on other nations rather than just readying the US to defend itself against a similar assault from abroad.

Experts say that, if the Pentagon’s plans come to fruition, it will put America at the forefront in terms of cyberwar capabilities. And although it might be a success in the eyes of Congress and corporations with a vested interest in protecting America’s cyber infrastructure, the powers that the Pentagon wants could be bigger than anyone can imagine. Read the rest of this entry »

Posted in Global | Tagged: , , , , , , | Leave a Comment »

Cyber war and peace

Posted by Ram Kumar Shrestha on April 22, 2012

Greater dependence on networked computers and communication leaves the US more vulnerable to attack than others.

Cyber warfare is the one of the most dramatic potential threats to be faced [EPA]

Cambridge, MA – Two years ago, a piece of faulty computer code infected Iran’s nuclear programme and destroyed many of the centrifuges used to enrich uranium. Some observers declared this apparent sabotage to be the harbinger of a new form of warfare, and United States Secretary of Defence Leon Panetta has warned citizens of the danger of a “cyber Pearl Harbour” attack on the US. But what do we really know about cyber conflict?

The cyber domain of computers and related electronic activities is a complex man-made environment, and human adversaries are purposeful and intelligent. Mountains and oceans are hard to move, but portions of cyberspace can be turned on and off by throwing a switch. It is far cheaper and quicker to move electrons across the globe than to move large ships long distances.


Political shift

The costs of developing those vessels – multiple carrier task forces and submarine fleets – create enormous barriers to entry, enabling US naval dominance. But the barriers to entry in the cyber domain are so low that non-state actors and small states can play a significant role at low cost. Read the rest of this entry »

Posted in Article | Tagged: , , , , | Leave a Comment »

Cyber War Threat: US to fight enemy it created itself

Posted by Ram Kumar Shrestha on February 25, 2012

Posted in Videos | Tagged: , , | Leave a Comment »

Cyber war leads to capture of CIA spy in Iran

Posted by Ram Kumar Shrestha on December 19, 2011

A grab taken from a video aired by the official Iranian state TV on December 18, 2011 shows one of several photos of a young man alleged to be a captured CIA spy of Iranian origin confessing to a "mission" to infiltrate the intelligence ministry, wearing a traditional Arab garb (AFP Photo)

The budding cyber war between America and Iran could be quickly transcending off of computer networks and into the real world, with the US allegedly putting boots on the ground. Iranian state television is reporting that they’ve captured a CIA spy.

Overseas media reported over the weekend that Amir Mirza Hekmati, a 20-something American man of Iranian heritage, was abducted by Iranian forces, to whom he confessed that he has been in cahoots with the Central Intelligence Agency.

According to a taped confession offered up by Hekmati, the spy was apprehended by Iranian intelligence after being dispatched into the country from a US base in neighboring Afghanistan. The spy says he had been working out of Bagram near the country’s border with Iran in preparation for a CIA-led mission that has been years in the making, but despite assurance from American authorities that his cover would not be blown, Iranian intelligence intercepted him and is now holding him captive.

As RT reported last week, Israeli news agency Debka is suggesting that Iranian intelligence has managed to not just crack into the computer networks of at least one American spy drone but also CIA headquarters in Langley, Virginia outside of Washington DC. Following the downing of a top-secret RQ-170 Sentinel stealth drone aircraft over Iran earlier this month, military officials speaking under condition of anonymity to Debka say that such a take-down could only have been conducted by infiltrating the command center inside the actual CIA compound.

Insiders suggest that it would take the exact coordinates and times of the dispatched drone for Iranian intelligence to hijack the craft, which went down on December 4. With Hekmati now being apprehended after a decade of briefing by way of the Department of Defense, it only further establishes that Iran has indeed infiltrated the American intelligence community, causing concern for all involved that the cyber war between nations is quickly escalating to a battle involving not just robotic planes but soldiers, spies and international, undercover attacks. Read the rest of this entry »

Posted in International | Tagged: , , , , , , , , , | Leave a Comment »

Anonymous declares cyber war on Congress over indefinite detention act

Posted by Ram Kumar Shrestha on December 18, 2011

Anonymous declares cyber war on Congress over indefinite detention act

Hacktivists are continuing their mission to take on politicians causing the collapse of constitutional rights in America, with operatives from the online collective Anonymous keeping up a campaign against the signers of controversial legislation.

As RT reported on Thursday, members of Anonymous began a campaign this week to expose information on the lawmakers who voted in favor of the National Defense Authorization Act for Fiscal Year 2012, a bill that will allow for the indefinite detention of American citizens, the reinstating of torture methods and the creation of the United States as a battlefield. Despite the implications of the act, the Senate allowed for the bill to leave Capitol Hill on Thursday, leaving only the inking of President Barack Obama’s name as the final step for ratification.

President Obama had earlier insisted on vetoing the bill, but the White House retracted that statement in the days before it cleared Congress. Before the final draft left the Senate yesterday, Sen. Carl Levin asked that a statement from the administration be added to the record in which the president’s press secretary, Jay Carney, said that the president will not be advised to strike down the bill.

On Thursday, Anonymous hacktivists launched a campaign against Senator Robert Portman, a Republican from Ohio. Not only did Portland vote in favor of NDAA FY2012, he received $272,853 from special interest groups that also backed the bill.

“Robert J. Portman, we plan to make an example of you,” an Anonymous operative posted to the Internet on Thursday. Along with the warning was personal information pertaining to the senator, including his home address and phone number. Read the rest of this entry »

Posted in Global | Tagged: , , , , , , , , , , | Leave a Comment »

China: US waging global Internet war

Posted by Ram Kumar Shrestha on June 6, 2011

China: US waging global Internet war

The Chinese military has accused the US of waging a global Internet war against multiple nations in an effort to bring down governments, citing the Arab Spring revolutions as an example.

The accusations made by scholars at the Chinese military academy follow accusations by Google that Chinese offices attempted to hack Google accounts related to US government offices, officials, journalists, activists and politicians.

Google traced the attacks to the city of Jinan known for hosting the military’s vocational school which focuses on computers and technology. The same location was also linked to an assault on Google’s systems over a year ago. China has denied responsibility for both attacks.

China is now asserting however that the US is using computer tactics via the Internet to promote regime change in the Arab world and claimed to have evidence that cyber attacks originated within the United States.

Of late, an Internet tornado has swept across the world … massively impacting and shocking the globe. Behind all this lies the shadow of America,” said an article by Ye Zheng and Zhao Baoxian, scholars from the Academy of Military Sciences. “Faced with this warm up for an Internet war, every nation and military can’t be passive but is making preparations to fight the Internet war.” Read the rest of this entry »

Posted in Global | Tagged: , , , , , , , | Leave a Comment »

You’re either with us, or you’re with WikiLeaks

Posted by Ram Kumar Shrestha on December 7, 2010

Secretary of State Hillary Clinton got one thing right last week – she described WikiLeaks’ disclosure of hundreds of thousands of classified documents as “an attack.” Indeed, it was the third such attack in five months that WikiLeaks has launched against the United States and its international partners. WikiLeaks itself has described its struggle in military terms. Founder Julian Assange recently posted a Tweet from one of his supporters declaring: “The first serious infowar is now engaged. The field of battle is WikiLeaks. You are the troops.”

Like the war on terror, we have been attacked in this new cyber war in ways we did not anticipate. Over the past decade, the U.S. government has spent billions to stop foreign adversaries from remotely penetrating our computer networks for sabotage. Instead of trying to break through these defenses, Assange pioneered a new form of cyber sabotage. He found someone who allegedly penetrated our classified systems from within, downloaded America’s secrets onto a Lady Gaga CDand gave them to Assange, who then disseminated this stolen information across the world.

Assange has made clear he intends to continue posting stolen classified information and has effectively dared the United States and the world to try and stop him. He recently announced through his lawyer that if he is arrested, he will unleash a “thermonuclear device” of completely unexpurgated government files. Think about that: Assange has threatened America with the cyber equivalent of thermonuclear war. Read the rest of this entry »

Posted in Article | Tagged: , , | Leave a Comment »

 
%d bloggers like this: