Join 3,514 readers in helping fund MetaFilter (Hide)

12 posts tagged with cyberwar. (View popular tags)
Displaying 1 through 12 of 12. Subscribe:

Related tags:
+ (8)
+ (4)


Users that often use this tag:
homunculus (4)

The Changing and Terrifying Nature of the New Cyber-Warfare

Silent War. "On the hidden battlefields of history’s first known cyber-war, the casualties are piling up. In the U.S., many banks have been hit, and the telecommunications industry seriously damaged, likely in retaliation for several major attacks on Iran. Washington and Tehran are ramping up their cyber-arsenals, built on a black-market digital arms bazaar, enmeshing such high-tech giants as Microsoft, Google, and Apple. With the help of highly placed government and private-sector sources, Michael Joseph Gross describes the outbreak of the conflict, its escalation, and its startling paradox: that America’s bid to stop nuclear proliferation may have unleashed a greater threat."
posted by homunculus on Jun 9, 2013 - 46 comments

The Hunt For "Red October"

An advanced and well-orchestrated computer spy operation that targeted diplomats, governments and research institutions for at least five years has been uncovered by security researchers in Russia.
The highly targeted campaign, which focuses primarily on victims in Eastern Europe and Central Asia based on existing data, is still live, harvesting documents and data from computers, smartphones and removable storage devices, such as USB sticks, according to Kaspersky Lab, the Moscow-based antivirus firm that uncovered the campaign. Kaspersky has dubbed the operation “Red October.”
[more inside]
posted by the man of twists and turns on Jan 15, 2013 - 26 comments

Cyberwar: China's move discovered

Revolutionary hardware backdoor discovered in China-made military-grade FPGA chips. Claims were made by the intelligence agencies around the world, from MI5, NSA and IARPA, that silicon chips could be infected. We developed breakthrough silicon chip scanning technology to investigate these claims. We chose an American military chip that is highly secure with sophisticated encryption standard, manufactured in China. Our aim was to perform advanced code breaking and to see if there were any unexpected features on the chip. We scanned the silicon chip in an affordable time and found a previously unknown backdoor inserted by the manufacturer. This backdoor has a key, which we were able to extract. If you use this key you can disable the chip or reprogram it at will, even if locked by the user with their own key. This particular chip is prevalent in many systems from weapons, nuclear power plants to public transport. In other words, this backdoor access could be turned into an advanced Stuxnet weapon to attack potentially millions of systems. The scale and range of possible attacks has huge implications for National Security and public infrastructure.
posted by scalefree on May 27, 2012 - 152 comments

Kuang Grade Mark Eleven

He leaves his cellphone and laptop at home and instead brings "loaner" devices, which he erases before he leaves the US and wipes clean the minute he returns . In China, he disables Bluetooth and Wi-Fi , never lets his phone out of his sight and, in meetings, not only turns off his phone but also removes the battery , for fear his microphone could be turned on remotely. He connects to the Internet only through an encrypted, password-protected channel, and copies and pastes his password from a USB thumb drive. He never types in a password directly, because, he said, "Chinese are very good at installing key-logging software on your laptop." - Travel precautions in the age of digital espionage.
posted by Artw on Feb 13, 2012 - 125 comments

Espionage

There is a growing realization that U.S. cyberwar efforts resemble all its other 'war' rhetoric in being a boondogle aimed primarily at limiting its own citizens civil rights. China's breathlessly vaunted capsbilities are "fairly rudimentary" in particular (pdf, campus, previously).
posted by jeffburdges on Nov 1, 2011 - 108 comments

Cyberwar

Enter the Cyber-dragon. "Hackers have attacked America’s defense establishment, as well as companies from Google to Morgan Stanley to security giant RSA, and fingers point to China as the culprit. The author gets an exclusive look at the raging cyber-war—Operation Aurora! Operation Shady rat!—and learns why Washington has been slow to fight back. Related: Michael Joseph Gross goes inside Operation Shady Rat."
posted by homunculus on Aug 6, 2011 - 46 comments

Cybarmageddon!

Cyberwar Hype Intended to Destroy the Open Internet. "The biggest threat to the open internet is not Chinese government hackers or greedy anti-net-neutrality ISPs, it’s Michael McConnell, the former director of national intelligence..." [Via]
posted by homunculus on Mar 2, 2010 - 29 comments

Google vs. China

The charges and retaliations seem reminiscent of so much cold war bluster, and indeed this encounter could be the first great clash of the 21st century’s two emergent superpowers—Google and China.
posted by Joe Beese on Feb 25, 2010 - 30 comments

lsof

Weeks before physical bombs started falling on Georgia, security researcher Jose Nazario of Arbor Networks in Lexington, Massachusetts was watching an attack against the country in cyberspace: a stream of data directed at Georgian government sites containing the message: win+love+in+Rusia.
posted by plexi on Aug 12, 2008 - 33 comments

Cyber Command Über Alles

Attention Geeks and Hackers: Uncle Sam's Cyber Force Wants You! [more inside]
posted by homunculus on Jun 5, 2008 - 29 comments

Coming at you, under the radar! Jack into the matrix and start a cyberevolution!

A Practical Guide to Defeating The Radical Right, Cyberwar & Netwar, and non-facetious uses of the word matrix, courtesy of the Well's mythical gopherspace. (Firefox users check out what search used to look like; IE users try http).
posted by hoverboards don't work on water on Jul 18, 2006 - 22 comments

Bush orders guidelines for cyber-war

Bush orders guidelines for cyber-war Is it my old age that makes me wonder what else might be in this secret directive as regards computers and the Net? "First set of rules for attacking enemy computers studied." Perhaps you support the president or you are the enemy (recall: you are with us or against us)....
posted by Postroad on Feb 7, 2003 - 7 comments

Page: 1