Home » Posts tagged 'cyberwarfare' (Page 3)

Tag Archives: cyberwarfare

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Post Archives by Category

Russia Slams “Unprecedented, Insolent” US Cyber Threats, Vows Retaliation

Russia Slams “Unprecedented, Insolent” US Cyber Threats, Vows Retaliation

In a striking report released on Friday night by NBC, the Obama administration was reportedly “contemplating an unprecedented cyber covert action” (it remains unclear how the action is covert if Biden announced it to the world via an interview with Chuck Todd), a “wide-ranging clandestine cyber operation designed to harass and “embarrass” the Kremlin leadership”, in retaliation for alleged interference in the American presidential election, and has asked the CIA to draft plans for a “wide-ranging “clandestine” cyber operation designed to harass and “embarrass” the Kremlin leadership.”

As we reported last night, Vice President Joe Biden said that Washington is ready to respond to hack attacks allegedly conducted by Russia and designed to interfere with the upcoming US elections.

“Why haven’t we sent a message yet to Putin,” Chuck Todd, host of the “Meet the Press” show on NBC, asked Joe Biden.

“We are sending a message [to Putin]… We have a capacity to do it, and…”

“He’ll known it?” Todd interfered.

“He’ll know it. It will be at the time of our choosing, and under the circumstances that will have the greatest impact,” the US vice president replied.

The NBC sources did not elaborate on the exact measures the CIA was considering, but said the agency had already begun opening cyber doors, selecting targets and making other preparations for an operation. “Former intelligence officers told NBC News that the agency had gathered reams of documents that could expose unsavory tactics by Russian President Vladimir Putin”, NBC added.

To be sure, this “leak” of what effectively amount to a cyberwar warning was a calculated move meant to provoke further escalation in tensions between the two nations and a trial balloon to gauge Russia’s response.

…click on the above link to read the rest of the article…

Op-Ed: U.S. should think twice before retaliating against China over unfounded hacking charges

Op-Ed: U.S. should think twice before retaliating against China over unfounded hacking charges

The United States is on the brink of making another grave mistake under the name of protecting cyber security, as it is reportedly considering retaliatory measures against China for unfounded hacking accusations.

Senior U.S. government and intelligence officials were quoted by a U.S. newspaper as saying Friday that President Barack Obama’s administration has determined to retaliate against China for its alleged theft of personnel information of more than 20 million Americans from the database of the Office of Personnel Management (OPM), but the forms and specific measures of the retaliation have not been decided.

The report added that Obama has allegedly ordered his staff to come up with “a more creative set of responses,” while a U.S. official hinted that the United States will employ “a full range of tools to tailor a response.”

The decision came amid a growing chorus in the United States demonizing China as the culprit behind the massive breach of the OPM computer networks. As witnessed by most past similar cases, the U.S. government, Congress and media once again called for punishing China for this after a top U.S. intelligence official indirectly pointed a finger at China.

Obviously, cyber security has become another tool for Washington to exert pressure on China and another barrier that restrains the further development of China-U.S. relations.

Washington will be blamed for any adverse effects this might have on its ties with China, as all the U.S. accusations against China were made without providing concrete evidence.

The U.S. government was also self-contradictory for declining to directly name China as the attacker on the one hand, while deciding to target China for retaliation on the other.

…click on the above link to read the rest of the article…

 

The Terrorism Pretext: Mass Surveillance is About Money and Power

The Terrorism Pretext: Mass Surveillance is About Money and Power

“We are under pressure from the Treasury to justify our budget, and commercial espionage is one way of making a direct contribution to the nation’s balance of payments”

-Sir Colin McColl, former MI6 Chief

For years public figures have condemned cyber espionage committed against the United States by intruders launching their attacks out of China. These same officials then turn around and justify America’s far-reaching surveillance apparatus in terms of preventing terrorist attacks. Yet classified documents published by WikiLeaks reveal just how empty these talking points are. Specifically, top-secret intercepts prove that economic spying by the United States is pervasive, that not even allies are safe, and that it’s wielded to benefit powerful corporate interests.

At a recent campaign event in New Hampshire Hillary Clinton accusedChina of “trying to hack into everything that doesn’t move in America.” Clinton’s hyperbole is redolent of similar claims from the American Deep State. For example, who could forget the statement made by former NSA director Keith Alexander that Chinese cyber espionage represents the greatest transfer of wealth in history? Alexander has obviously never heard of quantitative easing (QE) or the self-perpetuating “global war on terror” which has likewise eaten throughtrillions of dollars. Losses due to cyber espionage are a rounding error compared to the tidal wave of money channeled through QE and the war on terror.

 

When discussing the NSA’s surveillance programs Keith Alexander boldly asserted that they played a vital role with regard to preventing dozens of terrorist attacks, an argument that fell apart rapidly under scrutiny. Likewise, in the days preceding the passage of the USA Freedom Act of 2015 President Obama advised that bulk phone metadata collection was essential “to keep the American people safe and secure.” Never mind that decision makers have failed to provideany evidence that bulk collection of telephone records has prevented terrorist attacks.

…click on the above link to read the rest of the article…

The cyber blitzkrieg

The cyber blitzkrieg

The forces of the perfect storm of climate change, energy tsunamis and global economic bubbles in collision are complex and varied; each with their own levels of threat and urgency. In this milieu, it’s easy to over-fixate on the more visible threats and downplay the others.

Case in point: The Iranian nuclear showdown has dominated the news and polarized the geopolitical world. While frightening, it has overshadowed another “real-time” threat of growing proportions: cyber-warfare and cyber-security.

It’s not a new threat. Our personal computers are barraged with viral assaults. The cyber firewalls of such giants as J.P. Morgan, Target, Home Depot, SONY and Anthem Health are regularly penetrated – with the loss of sensitive information on tens of millions of Americans at a crack.

It’s bad enough when hackers and criminals do their dirty deeds; it’s downright dangerous when nation states organize and deploy their cyber-forces against other nations in a harmful manner.

Cyber-warfare has escalated into a new global battlefield with ill-defined “rules of the road.” The barriers to entry are low, and serious cyber-attacks can now be conducted by tiny nations and terrorist groups against any nation or company. It’s a perfect example of using asymmetric warfare to attack a far greater force using unconventional means. Though cyber forensics are improving, identifying the source of an attack is almost as difficult as deciding on a response.

James Clapper, the Director of National Intelligence, recently reported to congress that “Cyber threats to U.S. national and economic security are increasing in frequency, scale, sophistication, and severity of impact.” He went on to identify Russia as one of the most sophisticated cyber adversaries and that cyber threats, in general, would be more of an “ongoing series of low-to-moderate level of cyberattacks from a variety of sources over time…”  One can only imagine what he might say about this in a classified briefing.

 

…click on the above link to read the rest of the article…

Olduvai IV: Courage
Click on image to read excerpts

Olduvai II: Exodus
Click on image to purchase

Click on image to purchase @ FriesenPress