News you may have missed #397

Bookmark and Share

News you may have missed #350

Bookmark and Share

News you may have missed #347

  • CIA drones now target non-listed targets in Pakistan. It used to be the case that the CIA unmanned drone attacks in Pakistan were directed at confirmed Taliban senior operatives. But an American official has said that the CIA does “not always have their names”. Instead, the Agency targets them based on their “actions over time” that make it “obvious that they are a threat”.
  • Democrat Senator presses Obama for more NSA powers. Senator Barbara Mikulski (D-MD) is pressing the Obama Administration to give the National Security Agency more power to oversee privately owned portions of the Internet. Speaking on Thursday, Mikulski complained that “we don’t know who the hell is in charge” over the security of private networks.
  • Lebanese officer charged as Israel spy may get death. A Lebanese prosecutor has requested the death penalty for Gazwan Shahin, an army colonel charged with having provided Israel’s spy agency with pictures, information and coordinates of Lebanese civil and military posts during and after the 2006 Israeli invasion of Lebanon.

Bookmark and Share

News you may have missed #336

  • CIA tech arm invests in camera lens start-up. The CIA’s venture-capital investment arm, In-Q-Tel, has struck again. This time it has funded LensVector, a hi-tech start-up that specializes in micro-camera technology for cell phones.
  • NSA cyberdefense exercise underway. Detailed status report on the National Security Agency’s 10th annual Cyber Defense Exercise, a competition that pits students from a series of US military academies against each other –and against the competition’s leaders at NSA– in a bid to see who has the best cyberdefense skills.
  • US spy researchers working on computational intel. IARPA, the US intelligence community’s research arm, is apparently working on a new program, called Aggregative Contingent Estimation, which aims to create a computational model that can enhance human hypotheses and predictions, by catching inevitable biases and accounting for selective memory and stress in intelligence analysis.

Bookmark and Share

Study points to Chinese city as ‘world capital’ of cyberespionage

Shaoxing

Shaoxing

By IAN ALLEN| intelNews.org |
A major traffic analysis of cyberespionage attacks has identified a provincial urban center in southeast China as ‘the world capital’ of cyberespionage. The survey, conducted by cybersecurity firm Symantec, studied the origination points and targets of 12 billion malicious emails. It concluded that nearly one third of all email-based cyberespionage attacks originate from the People’s Republic of China –a percentage far larger than previously thought. It also traced most Chinese cyberespionage attacks to Shaoxing, a city of over four million residents in China’s southeaster Zhejiang province. The Symantec study said that large-scale Chinese cyberespionage attacks appear to be systematic and concentrate on carefully selected targets, such as defense policy experts and human rights activists. Read more of this post

Senate bill proposes closer links between US spies, private sector

Olympia Snowe

Olympia Snowe

By IAN ALLEN| intelNews.org |
A bipartisan bill, unveiled yesterday in the US Senate, proposes closer links between US intelligence agencies and private sector companies active in areas of “critical infrastructure”. Drafted and proposed by Republican senator Olympia Snowe and Democrat Jay Rockefeller, the legislation builds on concerns by government officials that US energy and telecommunications systems may not be able to sustain a concentrated cyber-attack by a foreign government agency or organized cybercriminal group. The major practical problem in terms of the government protecting these systems is that most have been deregulated since the Reagan era, and are now almost entirely under the control of private corporations. According to the bill, the US government would have to define the term “critical infrastructure”, and then designate the companies in control of such infrastructure networks as “critical partners” in protecting strategic national interests. Read more of this post

News you may have missed #305

Bookmark and Share

News you may have missed #302 (NSA edition)

Bookmark and Share

Analysis: Google-NSA partnership part of broader trend

Google

Google

By IAN ALLEN | intelNews.org |
We reported last week the apparent alliance between the Google Corporation and the US National Security Agency, which is the main US government organization tasked with communications interception, as well as communications security. The partnership, which began soon after Google’s decision to close down its venture business in China, where its operations came repeatedly under cyber-attack, has caused considerable controversy among civil liberties advocates. But an op-ed in the US-based Federal News Radio website describes it as the beginning of a new trend, which is likely to intensify. Read more of this post

News you may have missed #0286 (Internet edition)

  • Email trojan targeted at US .gov, .mil accounts. A Trojan-containing email, which is spoofed so that it appears to have been sent by the US National Intelligence Council, appears to have been directed solely at US government and military email accounts.
  • Analysis: Smuggling secret information through VOIP. Voice over Internet Protocol (VOIP) systems use a series of protocols to essentially create an open, unmediated link between two computers. VOIP applications also provide a way to make sure the packets are ordered quickly and correctly. And that’s a goldmine for anyone trying to send hidden messages.
  • ACLU concerned about Google-NSA partnership. Google corporation has turned to the US National Security Agency for assistance in warding off cyberattacks. But the American Civil Liberties Union is among several organizations that view the partnership as “troubling”.

Bookmark and Share

Comment: Are Clinton’s Cyberattack Protests Hypocritical?

Hillary Clinton

Hillary Clinton

By JOSEPH FITSANAKIS* | intelNews.org |
The Chinese have accused the US government of hypocrisy in criticizing Beijing for its alleged role in organized hacking attacks, which recently drove Google to abandon its operations in China. Speaking last Thursday, US Secretary of State Hillary Clinton argued that “[c]ountries or individuals that engage in cyberattacks should face consequences and international condemnation”. But a subsequent editorial in government-owned The People’s Daily essentially said that China is not the only country that engages in cyberwarfare; the US does it too. Is this true? Most likely, yes. Read more of this post

Analysis: The meaning of China’s cyber-attack on Google

Google

Google

By IAN ALLEN | intelNews.org |
Google’s recent decision to close down its venture business in China, after its operations there repeatedly came under cyber-attack, has received plenty of media attention. But most non-experts find it difficult to understand why these cyber-attacks were important enough to cause Google to abandon what is admittedly one of the world’s most lucrative online user markets. An excellent analysis in The New York Times explains the significance and meaning of the cyber-attacks. It turns out that, traditionally, cyber-rogues have been interested in detecting or building back doors (known as Trojan Horses) in commercial software, such as Microsoft’s Internet Explorer or Word, in order to replicate them, and make money selling pirate copies. But the types of attacks that caused Google’s flight from China were different. The instigators of these attacks, which were very sophisticated, seemed to want to gain access to widely used Google applications so that they could spy on their users. Read more of this post

News you may have missed #0259

Bookmark and Share

Comment: Did Russian Intelligence Hack Climate-Change Emails?

Tomsk, Siberia

Tomsk, Siberia

By JOSEPH FITSANAKIS* | intelNews.org |
For over a fortnight, the world’s news services have focused on the so-called ‘Climategate’, the hundreds of University of East Anglia’s Climatic Research Unit emails that were hacked from the university’s server and leaked onto the Internet. The stolen emails, some of which date back to 1996, have reignited conspiracy theories about the role of human activity in climate change. But there is surprisingly little discussion about who hacked into the university’s server and stole the personal emails.

Read more of this post

News you may have missed #0206

Bookmark and Share