Blog Posts Tagged with "Espionage"

69dafe8b58066478aea48f3d0f384820

U.S. Military Chief Warns of Economic Cyber Threat

December 01, 2011 Added by:Headlines

"We lose enormous intellectual property rights. We're under constant attack every day. And it's going to take a whole government approach," said General Martin Dempsey, Chairman of the Joint Chiefs of Staff...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Espionage: Protecting American Innovation in Cyberspace

November 23, 2011 Added by:Headlines

"The Chinese are aggressively hacking into our nation’s networks, threatening our critical infrastructure and stealing secrets worth millions of dollars in intellectual property... This jeopardizes our national security and hurts U.S. competitiveness in the world market..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report Details China's Electronic Espionage Apparatus

November 22, 2011 Added by:Headlines

"In Senate testimony in 2011, Director of National Intelligence James Clapper outlined concerns about Chinese cyber surveillance, highlighting that the ―Chinese have made a substantial investment in this area, they have a very large organization devoted to it and they‘re pretty aggressive..."

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Chinese Intelligence and Cyber Reconnaissance Infrastructure

November 18, 2011 Added by:Stefano Mele

Governments, businesses, military, all rely on communications. Moreover, information collected and collated from intercepted diplomatic, military, commercial and financial communications offers potential competitors an advantage on the negotiation table or battlefield...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

China’s Cyberwarfare Capabilities are Rudimentary???

November 07, 2011 Added by:Infosec Island Admin

Patching, and secure coding have not been at the fore here and thus it is trivial for the most part to hack into systems throughout the internet. So, the Chinese need not be uber haxx0rs to do the damage needed because we collectively have done a bad job at securing our own networks...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Cyber Espionage Report Fingers China and Russia

November 03, 2011 Added by:Headlines

"Cyberspace makes it possible for foreign collectors to gather enormous quantities of information quickly and with little risk, whether via remote exploitation of victims' computer networks, downloads of data to external media devices, or e-mail messages transmitting sensitive information..."

Comments  (0)

29cf3ef0a3104bccc62f3387739c1ca6

Why We Are All Getting a Little Crazy

November 03, 2011 Added by:Richard Thieme

The task of counterintelligence is to figure out what the other side is doing and how they are deceiving us. CI is predicated on double deceiving and triple deceiving the other side into believing fictions nested within fictions, always leavened with some facts, just enough to seem real...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Kaspersky Warns of Threat from Cyber Terrorism

November 02, 2011 Added by:Headlines

"I don't want to speak about it. I don't even want to think about it. But we are close, very close, to cyber terrorism. Perhaps already the criminals have sold their skills to the terrorists - and then... oh, God," said Kaspersky...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China Beefs Up PLA's Cyber Militia

October 21, 2011 Added by:Headlines

"Effectively acting as a PLA-associated technical reserve, its mostly under-thirty part-timers are drawn largely from civilian companies and university-level institutes operating in electronic fields. A national guard of cyber soldiers..."

Comments  (0)

91648658a3e987ddb81913b06dbdc57a

W32.Duqu - Harbinger of the Next Stuxnet?

October 19, 2011 Added by:Ron Baklarz

The new malcode has so much in common with Stuxnet, it is purported to have been written by the authors. W32.Duqu's primary purpose is intelligence gathering by focusing on industrial control system manufacturers with likely intent on future attacks against targeted victims...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

The Son of Stuxnet? Methinks the Cart be Before Ye Horse

October 19, 2011 Added by:Infosec Island Admin

And therein lies the rub. DUQU has a 36 day shelf life. Now, this is good from a foot-printing level AND could be excellent for setting up the next attack vector that could include the component of sustained access. It was a recon mission and that was all...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

News Applications: Considerations and Dangers

October 12, 2011 Added by:Joel Harding

The next wave of cyber attacks will come through smart phones, cell phones and their data networks. Smart phones are almost ubiquitous and attacks launched either using the smart phones or attacking smart phones will be devastating on a scale we have not seen to date...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

HBGary CEO Hoglund: China is Top Threat to Security

October 12, 2011 Added by:Headlines

"China. There's a kind of cyber Cold War going on right now. I see it every day. The trouble, he says, is that few are willing to admit it. Most security companies won't come out and say it. The [US] government won't seem to out them for what they're doing either..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Congressman Confronts China over Cyber Espionage

October 05, 2011 Added by:Headlines

“Beijing is waging a massive trade war on us all, and we should band together to pressure them to stop. Combined, the United States and our allies in Europe and Asia have significant diplomatic and economic leverage over China, and we should use this to our advantage..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Insider Threat: Guard Indicted for Chinese Espionage

October 03, 2011 Added by:Headlines

Bryan Underwood, a former contract guard working at a U.S. Consulate in China, has been charged in a superseding indictment with one count of attempting to communicate national defense information to a foreign government...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Western Powers Wary of Chinese Cyber Espionage Ops

September 26, 2011 Added by:Headlines

"The broad international view... is that China is one of the countries at the forefront of cyber attacks on other states, which it is doing for fairly obvious reasons - intelligence gathering, political and strategic advantage, and also for defensive purposes..."

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »