Journal: WikiLeaks Collaboration, WikiLeaks Attacked + CYBER RECAP

Respected media outlets collaborate with WikiLeaks (NewsMeat) WikiLeaks turned over all of the classified State Department cables it obtained to Le Monde, El Pais in Spain, The Guardian in Britain and Der Spiegel in Germany. The Guardian shared the material with the New York Times, and the five news organizations have been working together to …

Berto Jongman: 20 Years Late, Council on Foreign Relations Has a Stab at Thinking About Cyber + Cyber Meta-RECAP

Defending an Open, Global, Secure, and Resilient Internet Overview This CFR-sponsored Independent Task Force warns that “escalating attacks on countries, companies, and individuals, as well as pervasive criminal activity, threaten the security and safety of the Internet.” The number of “state-backed operations continues to rise, and future attacks will become more sophisticated and disruptive,” argues …

Berto Jongman: Interview with a BlackHat + Related + USA Cyber-Idiocy RECAP

Interview With A Blackhat (Part 1) 61 Replies [This interview openly discusses criminal activities from the perspective of an admitted criminal. You may find this content distressing, even offensive, but what is described in this interview is real. We know from personal experience is that these activities are happening on websites everywhere, everyday, and perhaps …

SmartPlanet: US Encouraged to Allow Private Retaliation Attacks Against Hackers — Pathetic Insanity Spurred on by Incapacity of USG — + Cyber-Idiocy Meta-RECAP

U.S. encouraged to allow firms to retaliate against hackers Throwing money at creating cyberpolice forces and technology to keep up with digital threats may not be the only tactics the U.S. will employ in the future. As a meeting between President Obama and the new president of China, Xi Jinping, draws near, former senior officials …

Stuart Umpleby: Limitations of Hand-Held Dashboards + Cyber-Brain RECAP

Before Fruit Ninja, Cybernetics By WILL WILES New York Times, November 29, 2012 EXTRACT (Conclusion) The No. 10 Dashboard taps into the same desire to master available information — a desire that has only grown as the amount of information in circulation has increased. Where Cybersyn needed dedicated national infrastructure and rooms full of equipment, …

Berto Jongman: Building Trust in Cyberspace + Robert Garigue RECAP

Building Trust in Cyberspace The EastWest Institute released Building Trust in Cyberspace, a report featuring highlights of its 3rd Worldwide Cybersecurity Summit held in New Delhi on October 30-31, 2012. More than 300 participants from 22 countries heard from cyber experts from across the globe representing both the private and public sectors. Open publication | Download (mobile …

Josh Kilbourn: US Banks Under Minor Cyber-Attack – Probable Israeli False Flag — Meanwhile US Cyber-Security Largely Vaporware + Meta-RECAP

High Alert! Millions Of Bankers Cant Bank Online. BofA Blames Hackers From Middle East. Bank Cyber Attacks By Iran? Black Monday October 1, 2012? The financial and banking industries are on high alert tonight as a massive cyberattack continues, with potentially millions of customers of Bank of America, PNC and Wells Fargo finding themselves blocked …

DefDog: The infamous ‘take down the Internet in 30 minutes’ hearing from 1998 — Tens of Billions Later, NSA and OMB Have Not Done Their Jobs, US Cyber is Wide Open and Unsafe at Any Speed + Meta-RECAP

This is the famous hearing where Mudge told senators he could K-O the Internet in 30 minutes. It was a wide-ranging discussion, though Mudge’s claim is what the media ran with at the time. Watch and ask yourself, as Trustwave’s Tom Brennan does on his Facebook page this morning: “14 Years… have we gotten better?” …

DefDog: $15 Billion for Cyber-Command, Zero for Actual Needs + Meta-RECAP

The myths behind the spending — disavowed by true subject-matter experts, manipulated by the military-industrial-congressional complex (MICC) to spend more on vaporware…. RSA Conference: On the Subject of Cyber War and Industrial Espionage Talk of an impending ‘Cyber Pearl Harbor’ is not an uncommon image evoked during discussions of cyber threats to the critical infrastructure …

Berto Jongman: War of the Cyber Worm Plus Meta-RECAP

War of the cyber worm: the most destructive attack on the internet Cyber criminals no longer target your computer – they threaten society itself. This is the story of how a few self-selecting techno geeks fought the most devious and destructive attack ever launched on the web. Mark Bowden The Observer, 18 February 2012 A …

Mario Profaca: US Lacks Cyber-Intelligence + RECAP

US lacks serious cyber intelligence Study says US government, business need to kick network security up a notch Michael Cooney Network World, 12 September 2011 There is an urgent need for businesses and our government to develop high-level cyber intelligence as a way to combat the unacceptable levels of online security threats because the current …

Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

Army Times article, second below, reports what the beginning of what I expect will be a major decline in functionality of Army computer systems.  While some sort of institutional response to the alleged Wikileaks traitor, Specialist Bradley Manning, is appropriate, I don’t think this is it.  This is a simplistic approach, the sort of thing …

DefDog: Senators from Both Parties Lie to America About Russian Hacking and Role of Cyber Command (Also Known as Clown Command) in “Preventing” What Did Not Happen…

Senators from both political parties on Thursday praised the military’s cyber force for helping secure last year’s midterm elections, with one suggesting it was largely due to U.S. Cyber Command that the Russians failed to affect the 2018 vote. From experience, Cyber Command does not know the difference between TCP/IP and UDP….they are not capable …

Mongoose: Syria False Flag 2013 Historical Recap – CIA, Qatar, UK Arranged Gas Attacks as a Pretext for US Invasion

Historical (2013), highly relevant to what is happening today. Major Evidence Syrian Chemical Attack Staged by US-backed Terrorists On January 25, 2013, CyberwarNews published the story of a Malaysian hacker called JAsIrX who posted hacked emails to various file sharing websites from the UK-based private military contracting company, Britam Defence. A note included from the …

Berto Jongman: Modernizing Analytical Training + Robert Steele & RECAP

Modernizing Analytical Training for the 21st Century Senior US intelligence leaders are starting to doubt whether ‘experts’ are the best forecasters of emerging risks. Regina Joseph, however, has other culprits in mind. Familiar cultural and bureaucratic obstacles may be more to blame for the foresight training and analysis problems intelligence agencies face today.