05/31/11

China’s cyber squad is for defense |ChinaBizWorld

“Cyber Blue Team”

Now that a rising number of militaries are setting up cyber warfare commands to protect their national interests, it is natural for the People’s Liberation Army to catch up and launch a similar command responsible for defending China’s cyber security.

Last week, the Ministry of National Defense announced the debut of such a squad — known as the “Cyber Blue Team” – at the PLA’s southern Guangzhou Military Command. Although it is made up of merely 30 technology-savvy officers and soldiers, the establishment of the squad is a move in the right direction, targeting one of the most sensitive and largely invisible battle fields in this Internet age. 

As information of a country’s crucial financials, utilities, satellite and telecommunication facilities and strategic military installations is now linked by one cable – and theoretically accessible to the top-notch hackers – it is important for a sovereign nation to erect the best possible firewalls to deny others’ attack. And, in time of conflict, the ability to launch a counterattack to disable the enemy’s operations is also indispensable. 

The stake will be high if China loses the battle. In the past years, China, like other countries, has been victimized by online hacking and other digital vandalism. It is imperative for the country to strengthen capability to detect and fight back against cyber assaults. Like other battle lines, any provocation of and intrusion into China’s interests should be met with resolute countermeasures. 

Adequate manning and funding of the PLA’s cyber squad is a must. We have learnt that the U.S. Cyber Command, set up two years ago and subordinate to the Pentagon’s Strategic Command, spans a wider range than the standard for military service, and has an annual appropriation of more than $3.2 billion. 

It is strongly suggested the PLA’s cyber efforts should be equally built up. Backed up by a solid national income, China’s cyber effort should match the world’s advanced Internet army. 

In addition to funding, finding the right talents for the Cyber Blue Team is another key to success. In April this year, the PLA revealed that it has launched a talent pool project which said that, by 2020, the military would have trained and recruited sufficient and highly-skilled personnel to cope with advanced weaponry, cyber warfare and carrying out unconventional security capabilities. To garner up talents, the PLA could recruit outstanding students from both military and civilian colleges and research academies.

And, China and the PLA should be steadfast in enhancing Internet defense ability, regardless of the finger-pointing by the critics. As usual, the official announcement of China’s establishment of the cyber squad has caused outside grievances and criticisms. 

Over the weekend, a foreign news agency decried, saying that the PLA’s latest move “is sure to ring alarm bells around the world among governments and businesses wary of Beijing’s intentions.” The report tried to demonize this country by suggesting the U.S., Australia, Germany and other Western nations have long alleged that hackers inside China are implementing a wide-range of attacks on other governments’ computer systems. 

Want to know China’s intentions to launch its cyber squad? It’s to deter the potential hackers and perpetrators that want to harm China. As this country is developing fast economically, the PLA has the obligations to defend it in all facets, from land, sea, air, space and the cyberspace. So forget about releasing the alarmist rhetoric against China all the time. The sole duty for the PLA is defending the country.

via Li Hong’s column–English–People’s Daily Online.

05/31/11

DailyTech – Reports: Hackers Use Stolen RSA Information to Hack Lockheed Martin

May 30, 2011 10:14 AM

I. RSA Sec. Breach — Prelude to the Lockheed Martin Attack?

II. Damage Control

III. What Was Lost?

IV. Who Attacked Lockheed Martin?

V. One Million Threats–

Company claims fighter project schematics and hosted government information were not leaked


Over a week has passed and Lockheed Martin Corp. (LMT), the U.S. government’s top information technology services provider, was hacked. The attack has been characterized as a “fairly subtle”, yet “significant and tenacious” attack on servers at its massive Gaithersburg, Maryland data center, located not far from the company headquarters in Bethesda.

As details emerge the attack is appearing more and more like it was lifted out of a spy movie or Tom Clancy novel.  The hackers appeared to have gained entry using information stolen in a separate, even more audacious attack of one of the world’s highest profile security firms.

I. RSA Sec. Breach — Prelude to the Lockheed Martin Attack?

Back in March hackers gained access to RSA Security’s servers.  RSA Sec. takes its name from the last initials of founders Ron Rivest, Adi Shamir, and Leonard Adleman, three top cryptographers.  The trio’s popular public-key cryptography algorithm shares the same name — RSA.

At the time of the RSA Sec. intrusion, the company commented that despite the fact that it believed information was stolen, the company did not believe customer information or the security of the company’s software products were not comprised. Yet, they did advise clients to follow online advice to safeguard themselves against possible fallout from the data loss.

The attack on RSA was described as “extremely sophisticated”.

Sources close to Lockheed point to compromised RSA SecurID tokens — USB keychain dongles that generate strings of numbers for cryptography purposes — as playing a pivotal role in the Lockheed Martin hack.

II. Damage Control

Hackers are believed to have entered Lockheed Martin’s servers by gaining illegitimate access to the company’s virtual private network (VPN).  The VPN allowed employees to connect over virtually any public network to the company’s primary servers, using information streams secured by cryptography.

With the RSA tokens hacked, though, those supposedly secure VPN connections were compromised.

Lockheed says that it detected the attack “almost immediately” and warded it off quickly.  The company has since brought the VPN back online, but not before “upgrades” to the RSA tokens and adding new layers of security to the remote login procedure.

III. What Was Lost?

At this point the question on everyone’s mind likely is “What was lost?”

Lockheed has cause for concern — the company is not only safeguarding a wealth of U.S. government military information from external sources, it’s also protecting its own valuable projects — the F-16, F-22 and F-35 fighter aircraft; the Aegis naval combat system; and the THAAD missile defense.

A U.S. Defense Department spokeswoman, Air Force Lieutenant Colonel April Cunninghamtold Reuters Saturday night that the risk from the breach was “minimal and we [the USAF] don’t expect any adverse effect.”

Lockheed Martin claims that no compromise of customer, program or employees’ personal data occurred.  The company has made similar claims about past breaches.

Now that the Pentagon is involved, if anything was stolen, it should be identified shortly.

IV. Who Attacked Lockheed Martin?

After the pressing issue of what was lost, perhaps the second most compelling question is who was behind the breach.  Military officials and security staff at Lockheed are looking for clues in local time stamped information stored on the server and IP logs, trying to find out who accessed the compromised systems from where and when.

The problem is not easy as hackers commonly reroute their malicious traffic through multiple proxies, disguising their location.  That said, given the nature of attack — take down one of the world’s top security firms and then use that information to compromise a top defense contractor — involvement by a foreign government is suspected.

Lockheed posted a job listing last week requesting the services of a “lead computer forensic examiner”.  Requirements included someone who could “attack signatures, tactics, techniques and procedures associated with advanced threats” and “reverse engineer attacker encoding protocols.”  The cyber forensics expert’s first task will likely be to try to pinpoint the identity of the attacker.

The most likely suspect is obviously China, with whom the U.S. government has been waging a “cyberwar” with for a decade now.  China hires freelance hackers and maintains a large military force of official hackers as well.  It uses this force to infiltrate international utilities, businesses, government servers, and defense contractors, looking for valuable information.

China has recently been testing a stealth jet, the J-20, which contains features curiously similar to those found on past Lockheed Martin designs.  China insists, though, that it did not use stolen information to build its new weapon.

V. One Million Threats

Lockheed Martin’s IT staff say they encounter 1 million “incidents” a day.  They have to filter through these, distinguishing “white noise” from serious threats.

The Maryland data center from which information was taken is a state of the art facility, built in 2008.  It covers 25,000 square-feet and cost $17M USD to build.  But even with relatively modern systems and protections, defenses were still not strong enough to hold off the sophisticated and savvy attacker.

The company has a separate back-up data center in Denver, Colorado, which shares some of the company’s contract workload.  That center is not believed to have been breached in the intrusion.

Going ahead, Lockheed Martin will invariably face pressure from the U.S. Military and Congress to do a better job in making its systems breach-proof.  But given the company’s budget versus China’s virtually blank check given to cyber security efforts, one has to wonder how much the company will be able to do with so little.

Sondra Barbour, the company’s chief information officer, reminded employees in an email, “The fact is, in this new reality, we are a frequent target of adversaries around the world.”

via DailyTech – Reports: Hackers Use Stolen RSA Information to Hack Lockheed Martin.

05/30/11

Lockheed Martin hacked, cyber crime steps up to major leagues – International Business Times

 

Lockheed Martin just recently admitted that it was hacked on May 21, 2011.  It managed to stop the “tenacious” attack before any critical data was stolen.

Back in October 2008, Lockheed Martin launched its cyber-defense operations.  It bragged that it wanted a piece of the red-hot cyber security industry.

 

Warfare

It’s shocking, therefore, that hackers are now bold enough to target a company that specializes in defending against them.

The cyber security industry is worth $40 billion in 2010, according to Federated Networks, a player in that industry. After several incidents in the last two years, however, it’ll probably get even bigger.

In late 2009, Google and other high profile tech companies like Adobe Systems were hacked fromChina.  The purpose of the attack was reportedly to steal intellectual information and access certain Gmail accounts.

In late 2010, a loose-organized internet vigilante group called Anonymous organized an attack on Visa and MasterCard for their anti-Wikileaks stance.  The attacks brought down the two companies’ websites.

In April 2011, Sony‘s PlayStation Network was hacked, forced to shut down for weeks, and user credit card numbers were likely stolen.  Sony was hacked by either internet vigilantes affiliated with Anonymous or thieves looking to steal credit card numbers.

These instances of hacking teach us two things: hacking can do serious damage to society and it’s surprisingly easy to perpetrate.

Hacking Google, for example, means gaining access to the most private information of individuals.  Hacking tech companies in general means gaining key intellectual information, which is their lifeblood.

Hacking defense contractors like Lockheed Martin is a matter of national military security.

The hacking of MasterCard and Visa demonstrates the utter unpreparedness of major corporations.  It shows that a group of rule-breaking enthusiasts can trump Fortune 500 companies.  In the physical/real world, something like that would be unimaginable.

Corporations, governments, universities, and consumers in general aren’t prepared for cyber attacks.

Many experts had predicted the rising importance of cyber security ever since it became clear that cyberspace would be an integral part of modern society.

Hackers, however, haven’t really done too much damage until the last two years because criminals and other rule-breakers (e.g. unscrupulous government agencies) didn’t seriously incorporate cyber attacks into their repertoire.

Now, they have and are finally giving hacking the organizational backing it needs to do some serious damage.  In other words, hacking has changed from being a crime perpetrated by loose-organized operators for petty gains to an operation backed by major crime syndicates and other powerful organizations for more nefarious and impactful purposes.

Society at large, therefore, needs to beef up its cyber security.  It needs to resemble the robustness of security in the physical world.

The US, for example, has a network of police force at every single municipality and state to deal with local criminal threats.  On the national level, it has the FBI and a standing army.

As cyber crimes have moved to the major leagues, cyber security needs to do the same.

 

Lockheed Martin hacked, cyber crime steps up to major leagues – International Business Times.

05/30/11

US, China cyber experts agree…on spam | FT Tech Hub | FTtechhub – Industry analysis – FT.com

There has been an increasing amount of talk from high places, including the White House, about the urgent need for international  cooperation on cybersecurity. But a proposal to be released tomorrow calling for specific US-China steps shows, more than anything, how far we have to go.

The 79-page document isn’t coming out from the Obama administration but is the product of a year-long joint effort by the prestigious nonprofit EastWest Institute and the Internet Society of China.

With the involvement of many prominent former government officials and industry leaders, the EastWest Institute has played a back-channel role in resolving some major international conflicts before, and it has made cyber issues a priority. It brought Chinese and Russian authorities to a kickoff conference in Dallas a year ago and is convening a new summit in London next week.

The ultimate goal would be treaties that forbid or limit cyberwar. But with the major countries unable to agree about much of anything at this early stage, the institute decided to get the ball rolling by finding out at least what each of the parties would most like to talk about.

From China, seen by US intelligence officials as the most pernicious foe in matters cyber, came the resounding answer: spam. This may have something to do with the fact  that US-based computers churn out far more spam than those in China, and is indeed one of the world’s worst offenders.

The institute gamely plunged ahead, producing with its counterpart in China a reasonable, uncontroversial series of recommendations for things like greater transpacific sharing of information and best practices by professionals, with legislation taking a back seat.

Because it is mostly calling for more discussion, the report isn’t likely to cull much in the short term from the more than 90 per cent of email that is unwanted.

But given what it took to achieve even what it did, the document is a healthy reminder of how much more work lies ahead, coming from people who are actually negotiating.

In any case, you have to start somewhere.

via US, China cyber experts agree…on spam | FT Tech Hub | FTtechhub – Industry analysis – FT.com.

05/30/11

Lockheed attack highlights rise in cyber espionage – Forbes.com

NEW YORK — This cyber attack didn’t go after people playing war games on their PlayStations. It targeted a company that helps the U.S. military do the real thing.

Lockheed Martin ( LMT – news – people ) says it was the recent target of a “significant and tenacious” hack, although the defense contractor and the Department of Homeland Security insist the attack was thwarted before any critical data was stolen. The effort highlighted the fact that some hackers, including many working for foreign governments, set their sights on information far more devastating than credit card numbers.

via Lockheed attack highlights rise in cyber espionage – Forbes.com.

05/30/11

Miners under cyber attack from everywhere | The Australian

MAJOR resources companies are coming under increasing threat of cyber hacking emanating from China and other countries, with outgoing Woodside Petroleum chief executive Don Voelte admitting the group has been attacked “from everywhere”.

Mr Voelte, who hands over to Exxon Mobil veteran Peter Coleman today after seven years as chief executive, said at The Australian Deutsche Bank Business Leaders Forum in Perth on Friday that cyber attacks were a major concern but were not just coming from China.

“Let’s not focus this on the Chinese: I saw the number of attacks against our company over a time period,” he said.

“It comes from everywhere. It comes from eastern Europe; it comes from Russia. Just don’t pick on the Chinese; it’s everywhere.”

The admission of concern comes weeks after federal Attorney-General Robert McClelland called a meeting with 20 chief executives from the big resources companies, banks and other sectors to discuss cyber attacks, which have emerged as a key security threat facing Australian business and government.It also follows recent cyber attacks on Japanese consumer tech company Sony and US defence giant Lockheed Martin.

Security experts say Chinese and other foreign hackers are looking for clues on government and business attitudes to major resource projects and foreign investment, as well as information on overseas activity by Australian companies.

It is believed most of the big resource companies have begun working closely with the federal government’s Defence Signals Directorate, the intelligence agency responsible for information security, in a bid to limit the attacks.

It is understood last month’s Sydney meeting was attended by representatives of BHP Billiton, Rio Tinto and Woodside, as well as other mining companies and the big banks.

Shell Australia chairman Ann Pickard agreed the attacks were a major concern.

“I would say we’re very careful in this particular area,” she said.

“The attacks on companies, and going after IP and other things, is pretty big, so we’re all very careful in this space.”

The rare comments from senior corporate leaders follow allegations raised last year in an ABC Four Corners program that China had hacked into the computer systems of BHP, Rio and Fortescue Metals Group.

The attacks against Rio came at about the time of the arrest of four of its executives in China, including Australian citizen Stern Hu, who was later jailed for 10 years on charges of bribery and stealing commercial secrets.

BHP is also believed to have come under attack during its attempted takeover of Rio, and Fortescue’s computer networks in the Pilbara and Perth have also been reportedly targeted.

The companies have refused to comment on the issue.

West Australian Premier Colin Barnett told the forum on Friday that his government was conscious of the threat, which often caused difficulties in communicating with resource companies.

“A lot of the matters that are discussed, particularly on major projects, if nothing else they’re market sensitive, so that always creates issues,” Mr Barnett said.

“And the companies are being careful on what they’ll talk to the government about and yet they have to because there is so much to be negotiated.”

But Mr Barnett agreed with Mr Voelte that it was wrong to single out China as being the only source of the attacks.

Chief executives who attended last month’s meeting on cyber security in Sydney received confidential briefings from the Office of National Assessments and the Defence Signals Directorate. .

They also held talks with the Australian Security Intelligence Organisation and the Australian Secret Intelligence Service.

“Security agencies are finding malicious cyber activity is increasing to a point where systems in both government and the private sector are under continuous threat,” Mr McClelland said.

“The Australian government takes the issue of cyber security very seriously and is constantly strengthening cyber security measures.

“Part of this includes engaging with major companies and critical infrastructure organisations to ensure they’re aware of the extent of the threats, and have strong systems in place to deal with attacks.”

via Miners under cyber attack from everywhere | The Australian.

05/29/11

SecurID Breach Suggested in Hacking Attempt at Lockheed – NYTimes.com

Lockheed makes fighter planes, spy satellites and other confidential equipment. It also sells cybersecurity services to military and intelligence agencies, and some experts said its failure to take greater precautions with its own systems could be embarrassing.

  • This is BIG...

Lockheed Martin, the nation’s largest military contractor, has battled disruptions in its computer networks this week that might be tied to a hacking attack on a vendor that supplies coded security tokens to millions of users, security officials said on Friday.

The SecurID electronic tokens, which are used to gain access to computer networks by corporate employees and government officials from outside their offices, are supplied by the RSA Security division of the EMC Corporation.

RSA acknowledged in March that it had sustained a data breach that could have compromised some of its security products. Executives in the military industry said Friday that Lockheed’s problems appeared to stem from that data breach and could be the first public signs of damage from it.

The March intrusion reverberated through the computer security community. The RSA technology is used by most Fortune 500 companies and federal agencies to provide an extra layer of security when employees use their networks from customer offices, hotels or their homes.

Many of RSA’s customers have taken extra measures since the intrusion was discovered, either by adding security measures, finding alternative solutions or simply shutting off remote access. Security experts said it was possible that companies other than Lockheed had faced attacks, whether they realized it or not.

“The issue is whether all of the security controls are compromised,” said James A. Lewis, a senior fellow and a specialist in computer security issues at the Center for Strategic and International Studies, a policy group in Washington. “That’s the assumption people are making.”

Neither RSA, which is based in Bedford, Mass., nor Lockheed would discuss the problems on Friday.

Officials in the military industry, who spoke only on the condition of anonymity given the sensitivity of the matter, said Lockheed had detected an intruder trying to break into its networks last Sunday. It shut down much of its remote access and has been providing new tokens and passwords to many workers, company employees said.

Lockheed makes fighter planes, spy satellites and other confidential equipment. It also sells cybersecurity services to military and intelligence agencies, and some experts said its failure to take greater precautions with its own systems could be embarrassing.

“We don’t know what they went after at Lockheed,” Mr. Lewis said, referring to the hackers behind the intrusion attempt. “One possibility is that it’s a state actor, but it could also be criminals who are trying to exploit the company’s customers.”

Industry officials said military contractors, who are bombarded daily by hacking attempts, typically do not keep classified data on computers that can be entered remotely. Federal authorities have said that China, Russia and other countries sponsor hackers trying to ferret out American military and corporate secrets.

Raytheon, another large military contractor, issued a statement on Friday saying that it took “immediate companywide actions” when the RSA breach was disclosed in March. “As a result of these actions,” the company said, “we prevented a widespread disruption of our network.”

General Dynamics said it had not had any problems related to the breach. Other giant military contractors, like Northrop Grumman and Boeing, declined to comment.

Jeffery Adams, a spokesman for Lockheed, said the company would not publicly discuss specific threats or its responses.

“However, to counter any threats, we regularly take actions to increase the security of our systems and to protect our employee, customer and program data,” he said in a statement. “We have policies and procedures in place to mitigate the cyberthreats to our business, and we remain confident in the integrity of our robust, multilayered information systems security.”

Security experts said companies in many industries had increased network monitoring or changed passwords and PINs for the tokens since the RSA breach.

But some of the specialists said that until more details were known, it remained possible that the attempted intrusion at Lockheed was not tied to the RSA breach.

The RSA tokens provide security beyond a user name or password by requiring users to append a unique number generated by the token each time they connect to their corporate or government networks.

Soon after the breach in March, RSA’s chairman, Art Coviello, said the company’s investigation had revealed that the intruder successfully stole digital information from the company that was related to RSA’s SecurID products.

He did not give precise details about the nature of the information but said it could potentially reduce the effectiveness of the system in the face of a “broader attack.” The company said then that there was no indication that the information had been used to attack its customers.

Some computer security specialists said at the time that the compromised information was a file of master keys — long numbers — that are a part of the RSA encryption system. If the intruder did gain those numbers, it would make it possible to fashion an attack based on independently generating the keys used by individual customers.

RSA officials have said that the intrusion was only partly successful.

Mr. Lewis, the security specialist at the Center for Strategic and International Studies, said the intruders had been detected as they were trying to transfer data by security software provided by the NetWitness Corporation, a company that provides network monitoring software. In April, NetWitness was acquired by RSA’s parent company, EMC.

via SecurID Breach Suggested in Hacking Attempt at Lockheed – NYTimes.com.

05/29/11

Hackers Hit U.S. Army Contractors

(Reuters) – Unknown hackers have broken into the security networks of Lockheed Martin Corp (LMT.N) and several other U.S. military contractors, a source with direct knowledge of the attacks told Reuters.

They breached security systems designed to keep out intruders by creating duplicates to “SecurID” electronic keys from EMC Corp’s (EMC.N) RSA security division, said the person who was not authorized to publicly discuss the matter.

 

Pentagon

It was not immediately clear what kind of data, if any, was stolen by the hackers. But the networks of Lockheed and other military contractors contain sensitive data on future weapons systems as well as military technology currently used in battles in Iraq and Afghanistan.

Weapons makers are the latest companies to be breached through sophisticated attacks that have pierced the defenses of huge corporations including Sony (SNE.N), Google Inc (GOOG.O) and EMC Corp (EMC.N). Security experts say that it is virtually impossible for any company or government agency to build a security network that hackers will be unable to penetrate.

The Pentagon, which has about 85,000 military personnel and civilians working on cybersecurity issues worldwide, said it also uses a limited number of the RSA electronic security keys, but declined to say how many for security reasons.

The hackers learned how to copy the security keys with data stolen from RSA during a sophisticated attack that EMC disclosed in March, according to the source.

EMC declined to comment on the matter, as did executives at major defense contractors.

Rick Moy, president of NSS Labs, an information security company, said the original attack on RSA was likely targeted at its customers, including military, financial, governmental and other organizations with critical intellectual property.

He said the initial RSA attack was followed by malware and phishing campaigns seeking specific data that would link tokens to end-users, which meant the current attacks may have been carried out by the same hackers.

“Given the military targets, and that millions of compromised keys are in circulation, this is not over,” he said.

Lockheed, which employs 126,000 people worldwide and had $45.8 billion in revenue last year, said it does not discuss specific threats or responses as a matter of principle, but regularly took actions to counter threats and ensure security.

“We have policies and procedures in place to mitigate the cyber threats to our business, and we remain confident in the integrity of our robust, multi-layered information systems security,” said Lockheed spokesman Jeffery Adams.

Executives at General Dynamics Corp (GD.N),, Boeing Co (BA.N), Northrop Grumman Corp (NOC.N), Raytheon Co (RTN.N) and other defense companies declined to comment on any security breaches linked to the RSA products.

“We do not comment on whether or not Northrop Grumman is or has been a target for cyber intrusions,” said Northrop spokesman Randy Belote.

ACTIONS PREVENTED WIDESPREAD DISRUPTION

Raytheon spokesman Jonathan Kasle said his company took immediate companywide actions in March when incident information was initially provided to RSA customers.

“As a result of these actions, we prevented a widespread disruption of our network,” he said.

Boeing spokesman Todd Kelley said his company had a “wide range” of systems in place to detect and prevent intrusions of its networks. “We have a robust computing security team that constantly monitors our network,” he said.

Defense contractors’ networks contain sensitive data on sophisticated weapons systems, but all classified information is kept on separate, closed networks managed by the U.S. government, said a former senior defense official, who was not authorized to speak on the record.

SecurIDs are widely used electronic keys to computer systems that work using a two-pronged approach to confirming the identity of the person trying to access a computer system. They are designed to thwart hackers who might use key-logging viruses to capture passwords by constantly generating new passwords to enter the system.

The SecurID generates new strings of digits on a minute-by-minute basis that the user must enter along with a secret PIN (personal identification number) before they can access the network. If the user fails to enter the string before it expires, then access is denied.

RSA and other companies have produced a total of about 250 million security tokens, although it is not clear how many are in use worldwide at present, said the former defense official.

The devices provided additional security at a lower cost than biometrics such as fingerprint readers or iris scanning machines, said the official, noting that the RSA incident could increase demand for greater use of biometric devices.

The RSA breach did raise concerns about any security tokens that had been compromised, and EMC now faced tough questions about whether “they can repair that product line or whether they need to ditch it and start over again,” he said.

EMC disclosed in March that hackers had broken into its network and stolen some information related to its SecurIDs. It said the information could potentially be used to reduce the effectiveness of those devices in securing customer networks.

EMC said it worked with the Department of Homeland Security to publish a note on the March attack, providing Web addresses to help firms identify where the attack might have come from.

It briefed individual customers on how to secure their systems. In a bid to ensure secrecy, the company required them to sign nondisclosure agreements promising not to discuss the advice that it provided in those sessions, according to two people familiar with the briefings..

via Hackers Hit U.S. Army Contractors – The Daily Beast.

05/29/11

China: PLA sets up special cyber warfare unit – World News – IBNLive

Beijing: The People’s Liberation Army (PLA) has formed a special cyber warfare unit, called Blue Team, to safeguard the Internet security of the military, Chinese Defence Ministry has said.

 

Cyber Warfare

It is important for the military to strengthen its defence capabilities against the Internet attacks, Defence Ministry spokesman Geng Yansheng has been quoted as saying in the official media here today.

“Cyber attacks have become an international problem affecting both civilian and military areas. China is relatively weak in cyber security and has often been targeted. This temporary programme is aimed at improving our defences against such attacks,” Geng said.

via China: PLA sets up special cyber warfare unit – World News – IBNLive.

05/29/11

The latest globalization trend : Cyber armies

One of Albert Einstein’s most memorable quotes was “I know not with what weapons World War III will be fought, but World War IV will be fought with sticks and stones”. It is year 2011 and we are already receiving hints about what the next war will most likely include, with several nations officially deploying “Cyber Armies”. Back in January 2011 and after a nationwide attack in 2007 from foreign hackers,Estonia announced the “Cyber Defence League”, an online army consisting mainly of volunteers. Several other “unofficial” cyber armies emerged in multiple other nations, such as North Korea and Iran, with several other nations admitting that they are considering recruiting capable programmers, software engineers, computer scientists and hackers to assist with the nation’s online security in case of cyber warfare.

Read more: http://vr-zone.com/articles/the-latest-globalization-trend–cyber-armies/12418.html#ixzz1NhJAICiL

via The latest globalization trend : Cyber armies.

eXTReMe Tracker