Blog Posts Tagged with "State Department"

7fef78c47060974e0b8392e305f0daf0

Newest U.S. Counter-Terrorism Strategy: Trolling

August 08, 2012 Added by:Infosec Island Admin

The State Department has given the go ahead to a 20-something to put together a coalition of people across the globe to subtly troll the jihadi’s online in the hope that it will shame them into dropping the notions of radical jihad. Why am I surprised that a hair brained scheme like this would come out of State?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Discloses Cyber Attacks on Al-Qaeda Websites

May 24, 2012 Added by:Headlines

"Within 48 hours, our team plastered the same sites with altered versions of the ads that showed the toll al Qaida attacks have taken on the Yemeni people... Together, they will work to pre-empt, discredit and outmanoeuvre extremist propaganda,” Hillary Clinton proclaimed...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

China Denies Orchestrating Gmail Hijacking Campaign

June 02, 2011 Added by:Headlines

"We are obviously very concerned about Google's announcement regarding a campaign that the company believes originated in China to collect the passwords of Google email account holders... These allegations are very serious... We're looking into them," said Secretary of State Hillary Clinton...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Cyber Spies Target Government Systems

February 05, 2011 Added by:Headlines

British foreign secretary William Hague has issued statements confirming that government systems have been targeted by state-sponsored cyber espionage operations. Similar attempts to infiltrate government systems in the United States have also come to light...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Chinese Spies May Have Spear-fished U.S. Diplomats

February 02, 2011 Added by:Headlines

A series of emails were sent to five State Department officials who were engaged in sensitive negotiations with the Chinese government on greenhouse-gas emissions, and contained attachments infested with malware that would have allowed the attackers access to the recipient's computers...

Comments  (0)