Saturday, November 24, 2012

Deconstructing the Flame virus: How it works and causes havoc - Decoder

Cyberwarfare Documentary Part 3

Cyberwarfare Documentary Part 2

Cyberwarfare Documentary Part 1

Obama accelerated cyberwar with Iran


Published on 1 Jun 2012 by RT America: 
I stumbled across this whilst doing paper on Cyber-warfare.

As if the United States hasn't already been involved in enough wars, the US government has admitted its role in launching a secret cyber attack against Iran. Since the first day Obama took office, the plot named "Olympic Games" was used to launch online attacks with cyberweapons such as the Stuxnet computer worm, which disrupted certain aspects of Iran's nuclear program. Aaron Swartz, founder and executive director of Demand Progress, joins us with more on the online war.

Like us and/or follow us: Twitter and or Facebook




Review: Ubuntu 12.10 Quantal Quetzal a mix of promise, pain | Ars Technica


Review: Ubuntu 12.10 Quantal Quetzal a mix of promise, pain | Ars Technica

Petraeus downfall | ARS Technica

Petraeus downfall illustrates scope of feds’ e-mail snooping powers



The resignation of Gen. David Petraeus began, we all now know, with Gmail. Petraeus' biographer and reported mistress Paula Broadwell apparently regarded Tampa socialite and Petraeus friend Jill Kelley as a romantic rival, and she e-mailed Kelley from an anonymous Gmail account, warning her to stay away from the general. Kelley turned those e-mails over to the FBI, which began investigating who was behind the messages and eventually identified Broadwell as the owner of the account.




Really who actually cares.....At the end of the day he got some tail in Afghan....Lucky him.

Google Fiber is live in Kansas City | Ars Technica


 

Computer virus hits US Predator and Reaper drone fleet

Computer virus hits US Predator and Reaper drone fleet | Hacker News




Also seen at ARS Technica

Stuxnet - Cyber Warfare

Shadow Boxing: Cyber Warfare and Strategic Economic Attack

JFQ-66: Shadow Boxing

First attack the enemy’s strategy, then his alliance, next his army, and last his cities.
(Sun Tzu, The Art of War)



U.S. critical infrastructure and resources are open to assault by “clever and persistent” cyber attacks. Such attacks could dra-matically affect the supply chain of our most strategic resource, petroleum. Two decades of warnings concerning cyber vulnerabilities inherent in U.S. infrastructure have effectively gone unheeded. Bureaucratic constructions such as U.S. Cyber Command (USCYBERCOM) create the illusion of security but do not address the true problem. As we focus on creating effects in the enemy, we largely ignore the effects the enemy can create in us. Our culture of strategic fads (for example, hybrid war, fourth-generation warfare, irregular war, counterinsurgency, and counterterrorism) and our force-centric threat assessment indicate that changes in the character of war and corresponding implications may be missed. The character of war now undeniably involves attacks against economic and domestic infrastructure and cyber methods will be the weapons of choice.



Related Posts Plugin for WordPress, Blogger...