Categories » Cyberwarfare

Mask/Careto Unmasked, Shadowy Spanish Spybots Slink into Sunset

Amid continuous revelations of a variety of “Advanced Persistent Threat” (APT) hacking operations sponsored by nation states–among them Flame/Gauss/Duqu/Stuxnet, Red October, Comment Crew, Shamoon, Icefog and Dark Seoul– the major global players such as the US, Russia, and China have … Continue reading

The Syrian Electronic Army: Mediums of Disinformatics

“We are just Syrian youths who want to defend their country against the media campaign that is full of lies and fabricated news reports” The Syrian Electronic Army (SEA) most likely began at least in part as an outgrowth of … Continue reading

DARPA is Trying to Turn Cyberwar Into Child’s Play

DARPA, as expected, is coming up with many new and inventive ways of trying to rethink the cyber security challenges that DOD is plagued with. First they have developed a series of free computer and mobile app based games that, … Continue reading

FBI Asking Tech Vendors to Install Backdoors

Wickr’s Nico Sell has disclosed in a PCMag article that she was approached by the FBI at a security conference, and that an agent casually asked if she would be willing to install a backdoor for them in her company’s … Continue reading

Cyber: The Achilles’ Heel of Drones?

As Unmanned Aerial Vehicles (UAVs) continue to advance and play an ever growing role in modern warfare, could cyber vulnerabilities pose a potential pitfall? With drone technology rapidly advancing and allowing for the production of truly autonomous UAVs, concerns over … Continue reading

For All of You Sinophiles Out There…

The Australian Strategic Policy Institute (ASPI) produced a great report on the People’s Republic of China’s cyber intelligence capabilities. Titled Enter the Cyber Dragon: Understanding Chinese Intelligence Agencies, this report is a great starting point for getting a grip on what the … Continue reading

Cyber Threats to the Global Oil Supply Chain

The Federation of American Scientists has published a paper detailing threats to the global oil supply chain. Rounding out a list of major regional and geopolitical threats to the global oil infrastructure, the risks of SCADA and other attacks on … Continue reading

The Sunshop Digital Quartermaster – a State Cyber-Espionage Armory?

Cyber-security research firm FireEye has published a new report alleging that there may be a single actor providing important code development resources to as many as 11 separate APT campaigns. All of the tools have been written using a Chinese … Continue reading

Terrorism, War, and Cyber (in)Security

José de Arimatéia da Cruz has published an article in the Small Wars Journal regarding Cyberterrorism.

Red October(?) Evolves, Hits Finnish Foreign Ministry

The Red October RAT (Remote Access Tool) which has been extensively analyzed by Kaspersky appears to have continued its development. The Finnish Foreign Ministry has disclosed that they were the victims of a penetration attack going on over four years. … Continue reading

The Malware of Things

A pair of dueling intelligence exploitation revelations have given the ongoing Snowden releases a run for their money. The first is the allegation that Russia provided poisoned gifts to delegates at the G20 summit. The complementary USB sticks and telephone … Continue reading

Google Rolls Out New “Digital Attack Map” Tool

Google has unveiled a new tool that allows real-time and historical display of digital attack traffic. Foreign Policy has done an excellent write-up on the new tool here. The tool gives you the ability to see ongoing DDOS and scanning … Continue reading

Adm. Stavridis Advocates for US Cyber Force

Former Commander of NATO (and current Dean of the Fletcher School) Admiral (USN Ret.) James Stavridis has published an Op-Ed in the Boston Globe advocating for the creation of a US Military “Cyber Force” in parallel to the Army, Navy, Air Force … Continue reading

QUANTUM and FOXACID; NSA:TAO MiTMing TOR Users

Bruce Schneier has recently published a series of articles on the ways that the users of the TOR network and others have been targeted with exploits by the NSA’s Tailored Access Operations group. He has also posted a full explanation … Continue reading

Comment Crew Going After Drone Tech

An article in the New York Times by Edward Wong details the efforts of the State-supported Chinese hacking group known as the “Comment Crew” (and widely suspected to be PLA unit 61398) to surreptitiously acquire military drone technology by hacking into … Continue reading

New Approaches to Cyber-Deterrence: Initial Thoughts on a New Framework

Cooper_2009_Thoughts on Cyber Deterrence_Final copy This paper argues we are now in a non-polar world wherein states and other entities may be in states of collaboration, competition and/or conflict (3 Cs) simultaneously with each other.  As a result of this … Continue reading

The Bulletin of the Atomic Scientists, September/October 2013

The Bulletin of the Atomic Scientists has published a special Cyber Issue, concentrating specifically on cyber security challenges. In light of the recent governmental emphasis on the national security priorities of cyber security, this publication is quite timely. All of … Continue reading

“Defending an Open, Global, Secure, and Resilient Internet”, Council on Foreign Relations, June 2013

http://www.cfr.org/cybersecurity/defending-open-global-secure-resilient-internet/p30836 “Defending an Open, Global, Secure, and Resilient Internet”, the June publication of an independent task force organized by the Council on Foreign Relations, is a compelling account of the current status of national and international policy within the field … Continue reading