02/3/13

Offensive Cyber Capabilities

Companies Need Offensive Cyber Capabilities

gAtO hEaR - about banks seek U.S Help on Iran Cyberattack’s. We hear about cyber attacks in the financial sector, the oil and energy sectors, then Leon Panetta warned perpetrators to cease hacking the US while we have all kinds of sanctions against Iran -/ this is insanity. Your telling unknown hackers (we suspected Iran) to  just stop, or what. What can we do to prevent them from launching cyber attacks against America.

So Iran has only 3 NAT-access points and 1 submarine cable (Al-Faw, Iraq submarine cable)

 

Then you have all these security people putting up defenses without building a firewall so bad-ass that they cannot do business. If we keep building these defenses it will get to a point where it defeats the purpose of the Internet. So what is the logical next move, offensive cyber weapons and capabilities. We can find these attacks and pinpoint the IP of where they are coming from then all we need is offensive tools to find them and do a seal-team 6 extraction of something like that and get the word out that we will find you and hunt you down.

One little hacker can keep a bank tied up for days in the middle of the desert. They could go after our traffic system, our rail system we know that SCADA is so messed up and in some cases open with defaults passwords. So we beat our chest like some mad gorilla and hope to scare these hackers.

My friends we must take initiative and find ways to counter these attacks no more just defense and I don’t mean a Ddos attack that can be circumvented. We need to plant Bot-nets on these people’s machines and monitor them and if we have to go physical and bring them to justice. Forget about Iran and let’s just talk about Chinese hacker attacks of our intellectual property. They just denied it and go about planning the next attack. We seen Skynet were thousands of computers were given a disk wipe and the blue screen of death. Why don’t we do the same to these hackers going after our infrastructure.

We must change our tactics and be a little more aggressive and become real cyber warriors not just defenders but attacking them and destroying their machines, their servers and routers. How about we just monitor the 1 submarine cable and 3 access points in Iran that should lead us to some of these people. The US monitors our own people then we stand by and allow other hostile countries to go and hack us. This is cyber insanity - gAtO OuT

 

01/19/13

Government Spying on everyone -Thanks Microsoft

gAtO lEaRnOn 01-01-213 we hear that Microsoft buys Skype and makes changes to allow Police surveillance. Then on 01-07-2013 we hear that a professor at the Warsaw University of Technology, Wojciech Mazurczyk, found a way to insert secret 70 bits of data and add secret information similar to steganography.spy-spy

Lawful Intercept is what it’s called and we just heard punch – counter-punch from the government. I just posted about corporations and governments using offensive cyber weapons to fight crime, but this looks like just plain old spying on citizens like China, Iraq and Syria does. Skype is owned by Microsoft and we know that Word and other products have back doors for them to snoop and governments to use in criminal cases. I guess they do it the proper way and get a real FISA document to monitor us it’s citizens.

mEoW 12-30-2012 our re-elected President Obama signs FISA Warrantless Wiretapping Program. STOP – SAY WHAT. mEoW – Forget about gun control how about the privacy of citizens, are we becoming like China, Iraq and Syria the more I find out about this the crazier it becomes. I hate Skypes but now finding this out NO WAY DUDE-

I did a little digging and I found a document from the Straford hack from the LutzBoat crew and this has been on the play board for a long time. More and more governments that play nice with the America and Microsoft will have to live with the fact that they are spying on us, the people. I voted for Obama but I’m pretty sure any president would want to be able to justify this abuse of power to monitor it’s citizens, what get’s me is we scream and yell when other countries do it but here we are doing to ourselves and nobody is talking about this- Hay press wake up. I have nothing to hide but if you do you have been warned – enjoy your government spying on you behind your back - gAtO oUt

Lab Notes:

IT security continues to be the greatest challenge facing government CIOs worldwide. Most experts agree that governments require stronger partnerships between the public and private sectors for both better protection of government IT systems from intruders and for greater visibility into operators’ network traffic to fight crime. However, government systems and intelligence activities constitute a very sensitive information environment. Governments must proceed with caution when forming technology partnerships for hardening their IT network security. Melissa E. Hathaway, who in February 2009 was named to be the Obama Administration’s top cyber security official, points out how

Lawful Intercept

Challenge

Criminals, predators and hackers now use chats, blogs, webmail and Internet applications such as online gaming and file-sharing sites to hide their communications.

Solution

Qosmos provides law enforcement agencies with a powerful solution to identify a target using multiple virtual IDs and intercept all related IP- based communications. Any trigger, such as a “user login = target” initiates intercept of all IP traffic related to the “target.”

Example of recognized applications and protocols

VoIP Email (POP, SMTP)

Webmail (Gmail, Hotmail, Live Mail, SquirrelMail, Yahoo mail, etc.)

Instant Messaging (Aim, SNM, Skype, Yahoo, Google Talk, QQ, Maktoob, Paltalk, etc.)

Online games (World of Warcraft)

Online classified ads

Audio/Video (H.323, SIP, MGCP, RTP, RTCP, MMSE, RTSP, SHOUTcast, Yahoo Video,

MSN Video, SCCP, etc.)

Web applications (Dailymotion, Google, eBay, Google Earth, HTTP, MySpace, Wikipedia,

YouTube, etc.)

Example of information extracted

Caller, phone number, called party, duration of call

Webmail login, email address, sender, receiver, subject matter, attached documents

Instant messaging sender, receiver, contact lists and status

Forum login, IP address, MAC address, mobile ID (IMSI, IMEI)

Protocols identified even for unidirectional traffic (e.g. email by satellite).

http://www.huffingtonpost.com/2012/12/30/obama-fisa-warrantless-wiretapping_n_2385690.html

http://enterprise-call-recording.tmcnet.com/topics/enterprise-call-recording/articles/321789-sounds-silence-skype-hold-more-than-expected-thanks.htm

http://www.ronpaulforums.com/showthread.php?399961-Microsoft-Buys-Skype-Makes-Changes-to-Allow-Police-Surveillance

07/11/12

CyberPeace -not- CyberWar

gAtO sEe - In the last couple of days Gen. Keith Alexander has been pushing the Cyber War agenda. -The issues around warfare are very different in cyberspace than in the physical world, and the United States is looking into “alternative strategies,” said Alexander, while not offering further details. In another place he was telling us that the CIA will not use the new cyber laws to spy on our email. Ok so you gonna be a sheep and follow the word of the government. We won’t spy on you.

Alexander said “civil liberties and privacy can work harmoniously with cybersecurity”. Come on General your a nice guy, gAtO met you —/ you have a passion but every time you bring out —/ Oops there went the Power Grid, Oops.. there went the financial sector, scare me, scare me. I know it’s your job to secure our country to protect our nation cyber infrastructure. Don’t trample on our cyber right any more please.

Hay here is a solution for you use a Tor-.onion network-(any anonymized network) to tie your power grid, and/or your financial services. If you can’t close down Silk Road in onion-land your C&C for your power grid and financial services should be invisible to everyone except on a need to know. gAtO just save you 14 trillion in R&D…//

gAtO has not heard one word about Cyber Peace from any responsible government in the world. Everyone is looking for their own cyber posture, their own cyber weapons/ budget/ programs/ money// , but not one has said let’s work together to make it better for peace, guess there is no money in Cyber Peace. Espionage, spying is the job of governments why would they destroy their own tools, weapons and just tweak our cyber-rights a wee bit, for our cyber freedoms and safety, to protect our government and you -lol.

Here is a simple idea crowd-source our problems. The one major resource in cyber-space is number of people that can see the same message. In crowd-source we can give the facts and ask anyone to help solve city budgets, ways to harvest more vegetable/per vertical/ sq.ft. Ask people how would you protect our electric grid // you be surprised by the creative answers you get, OK some may be crazy but…//. It may not be the right solution, but the power of the minds of people collaborating is what this new technology is built for. FaceBook is about ME- Twitter is about the rest of the world- but the new winner is —/ Comments /— have become more important than the article-subject itself because the conversation within in the comments shows social communication and problem solving by the masses.

Let’s change the message to CyberPeace, everyone has a solution, but remember that all your comments are the new gold so watch what you say to that troll on huffpost— gAtO oUt

 

Read more: Alexander: U.S. looking for offensive alternatives in cyberspace – FierceGovernmentIT http://www.fiercegovernmentit.com/story/alexander-us-looking-offensive-alternatives-cyberspace/2012-07-11#ixzz20KW1Lcf2

07/7/12

Cyber Jihad Intelligence last 6 months in 2012

Jihad Intelligence last 6 months in 2012

gAtO found the International Institute for Counter Terrorist pretty good site


 

Periodical Review: Summary of Information from Jihadi Forums

The Second Half of May 2012

This report summarizes notable events discussed on jhadist Web forums during the second half of May 2012. Following are the main points covered in the report:

  • Sheikh Ayman Al-Zawahiri calls on the residents of Saudi Arabia to organizemass protests to overthrow the Saudi regime.
  • The Pakistani Taliban publish a video of the storming of Bannu Prison, duringwhich nearly 400 Muslim prisoners were freed, among them Taliban involvedin an attempted assassination of the former president of Pakistan.
  • The Islamic State of Iraq exhorts Sunnis to realize that it is protecting theirinterests, while the Shiites are the real enemy, and must be fought.
  • Al-Qaeda in the Arabian Peninsula (AQAP) takes responsibility for an attack against Yemen’s minister of defense and US military officers at a military basenear Sana’a.
  • Ansar Al-Din and the National Movement for the Liberation of Azawad jointlyagree to establishment an Islamic state in Azawad, northern Mali.
  • A new Libyan Salafi-jihadist group, “The Imprisoned Sheikh Omar Abd Al-Rahman Brigades”, publishes its first announcement.
  • The Islamic Emirate of Afghanistan publishes the second issue of the Urdu-

language magazine Shariat.


Fatwas, March-April 2012

This review reports the main fatwas [religious-legal rulings] appearing in March and April 2012 on Minbar Al-Tawhid wal-Jihad, a Web site
run by the Salafist ideologue Abu Muhammad Al-
Maqdisi.1 The fatwas are issued by the prominent

Salafists who comprise the site’s Sharia Committee, in
response to Web surfers’ questions.
Among those we have chosen to highlight in this review
are fatwas covering the following: the religious-legal
obligation of every Muslim to join jihad in Syria;
affiliation with a Salafist political party; enlisting in an infidel army for the purpose of espionage; involvement in Libya’s National Transitional Council; and the status of the Free Syrian Army vis a vis the Salafist-jihadist Front for the Defense of the Syrian People.

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Jihad Intelligence last 6 months in 2012

28/6/2012 Periodical Review: Summary from the Jihadi Forums – The Second Half of May 2012

ICT’s Jihadi Websites Monitoring GroupThis report summarizes the most prominent events brought up in the Jihadi online forums in the second half of May 2012. Following are the main issues raised in this report:   
• Sheikh Ayman Al-Zawahiri calls on the residents of Saudi Arabia to organize mass protests to overthrow the Saudi regime.
• The Pakistani Taliban publish a video of the storming of Bannu Prison, during which nearly 400 Muslim prisoners were freed, among them Taliban involved in an attempted assassination of the former president of Pakistan.
• The Islamic State of Iraq exhorts Sunnis to realize that it is protecting their interests, while the Shiites are the real enemy, and must be fought.
• Al-Qaeda in the Arabian Peninsula (AQAP) takes responsibility for an attack against Yemen’s minister of defense and US military officers at a military base near Sana’a.
• Ansar Al-Din and the National Movement for the Liberation of Azawad jointly agree to establishment an Islamic state in Azawad, northern Mali.
• A new Libyan Salafi-jihadist group, “The Imprisoned Sheikh Omar Abd Al- Rahman Brigades”, publishes its first announcement.
• The Islamic Emirate of Afghanistan publishes the second issue of the Urdulanguage magazine Shariat.


14/6/2012 Periodical Review: Summary from the Jihadi Forums – The First Half of May 2012

This report summarizes the most prominent events brought up in the Jihadi online forums in the first half of May 2012. Following are the main issues raised in this report:   
• Ayman Al-Zawahiri calls on the Muslims of Afghanistan, Somalia and Yemen to fight Western forces in the lands of Islam and revolt against “collaborator” regimes.
• Al-Qaeda again threatens to execute American-Jewish hostage Warren Weinstein.
• The Shura Council of the Islamic Emirate of Afghanistan declares “open season” against occupation forces in Afghanistan.
• Sheikh Fahd Al-Quso Al-Awlaki, a senior military leader of Ansar Al-Sharia, has been assassinated.
• The English-language jihadist magazine Inspire resumes publication after a hiatus with two issues on individual jihad.
• A new jihadist magazine about efforts to free Muslim women prisoners has hit the cyber newsstand: Majalat Al-Asirah [The Woman Prisoner].
• The second issue of the jihadist magazine Al-Qaeda Airlines appears.

ICT’s Jihadi Websites Monitoring Group26/5/2012 Periodical Review: Summary from the Jihadi Forums – The Second Half of April 2012

ICT’s Jihadi Websites Monitoring GroupThis report summarizes the most prominent events brought up in the Jihadi online forums in the second half of April 2012. Following are the main issues raised in this report:   
• The leader of Al-Qaeda in the Islamic Maghreb (AQIM) calls on the Algerian people to boycott the coming elections in Algeria.
• AQIM threatens to attack Britain following its decision to extradite Abu Qatada Al-Filastini to Jordan.
• The Front for the Defense of the Syrian People steps up terrorist activity against Syrian government forces.
• Abd Al-Ghnai Jawhar, an explosives expert for Fath Al-Islam, is killed in Syria.
• Senior Salafi-jihadists in Egypt increase their propagandizing in Tahrir Square.
• A new series on preparing poisonous substances is published.
• Fursan Al-Balagh, a new jihadist media outlet, appears. 


16/5/2012 Periodical Review: Fatwas – March – April 2012

ICT’s Jihadi Websites Monitoring GroupThis review reports the main fatwas [religious-legal rulings] appearing in March and April 2012 on Minbar Al-Tawhid wal-Jihad, a Web site run by the Salafist ideologue Abu Muhammad Al- Maqdisi. The fatwas are issued by the prominent Salafists who comprise the site’s Sharia Committee, in response to Web surfers’ questions. Among those we have chosen to highlight in this review are fatwas covering the following: the religious-legal obligation of every Muslim to join jihad in Syria; affiliation with a Salafist political party; enlisting in an infidel army for the purpose of espionage; involvement in Libya’s National Transitional Council; and the status of the Free Syrian Army vis a vis the Salafist-jihadist Front for the Defense of the Syrian People.


10/5/2012 Periodical Review: Summary from the Jihadi Forums – The First Half of April 2012

ICT’s Jihadi Websites Monitoring GroupThis report summarizes the most prominent events brought up in the Jihadi online forums in the first half of April 2012. Following are the main issues raised in this report:   
• The leadership of Al-Qaeda and of its Somali affiliate Al-Shabab Al- Mujahideen threaten Britain with retribution for its intention to extradite al- Qaeda spiritual leader Abu Qatadah Al-Filastini to Jordan.
• Waliur Rehman, deputy commander of the Pakistani Taliban, threatens the UK with attack if it refuses to release Islamist prisoners – or at least improve their conditions.
• The Islamic Emirate of Afghanistan takes responsibility for a series of synchronized terrorist attacks against embassies and other targets throughout Afghanistan.
• Sheikh Abu Ubayda Yusuf Al-Annabi expresses solidarity with the Syrian people in their struggle against the regime of Bashar Al-Assad.
• A new jihadist series on military affairs, Al-Qaeda Airlines, is released.
• A new jihadist magazine is issued in Swahili.
• Evidence increases of the involvement of contributors to jihadist Web forums, such as Shumukh Al-Islam, in actual jihad and in terrorist activities.
• Leading jihadist Web forums Shumukh Al-Islam and Al-Fida resume operation after a temporary takedown last month.


21/4/2012 Periodical Review: Summary from the Jihadi Forums – The Second Half of March 2012

ICT’s Jihadi Websites Monitoring GroupThis report summarizes the most prominent events brought up in the Jihadi online forums in the second half of March 2012. Following are the main issues raised in this report:   
• In two separate audio files, Al-Qaeda leader Ayman Al-Zawahiri exhorts the Pakistani people to oppose their army and government, and the Afghani people to join jihad and beware of Muslims who collaborate with the US.
• Muhammad Al-Zawahiri, brother of Ayman Al-Zawahiri, is released from prison in Egypt.
• The Pakistani Taliban will wreak vengeance on the Pakistani regime and gain control of Pakistan’s nuclear weapons, according to top Taliban commander in Mohmand tribal region Sheikh Omar Khaled Al-Khurasani.
• Al-Qaeda in the Islamic Maghreb (AQIM) will strike at the heart of Germany, it says, unless the German government frees a Muslim woman prisoner in exchange for the release of a German hostage being held by AQIM.
• Contributors to jihadist Web forums praise Mohammed Merah, the terrorist from Toulouse, and urge Muslim youth in the West to emulate him.
• Leading jihadist Web forums Al-Fida, Shumukh Al-Islam, and Ansar Al- Mujahideen cease functioning during the latter half of March 2012. Ansar Al- Mujahideen and Shumukh Al-Islam resume activity in early April.


11/4/2012 Periodical Review: Summary from the Jihadi Forums – The First Half of March 2012

ICT’s Jihadi Websites Monitoring GroupThis report summarizes the most prominent events brought up in the Jihadi online forums in the first half of March 2012. Following are the main issues raised in this report:   
• Given what he calls the Iranian-Shiite conspiracy to attack and take over Saudi Arabia, Sheikh Abu Sufyan Al-Azdi Al-Shari, the deputy head of Al- Qaeda in the Arabian Peninsula (AQAP), urges Sunnis to wage jihad against the Shiite population of Saudi Arabia.
• Al-Qaeda in the Arabian Peninsula (AQAP) takes responsibility for assassinating an American military intelligence officer in Aden, Yemen.
• Ansar Al-Sharia declares Shabwa Province the Islamic Emirate of Yemen.
• Ahmad Faruq, Al-Qaeda’s head of the propaganda department of Al-Qaeda in Pakistan, calls for jihad against the Pakistani Army. He confirms the death of Ilyas Kashmiri, the operations officer of Al-Qaeda in Pakistan.
• Al-Balagh, a new jihadist magazine that focuses on events in Syria, is published.
• Majlat Al-Salafiyya, a new electronic Tunisian Salafi-jihadist weekly, is published.
• Leading jihadist forums embark on a massive campaign advocating Ansar Al- Sharia in Yemen.


30/3/2012 Periodical Review: Summary from the Jihadi Forums – The Second Half of February 2012

ICT’s Jihadi Websites Monitoring GroupThis report summarizes the most prominent events brought up in the Jihadi online forums in the second half of February 2012. Following are the main issues raised in this report:   
• A new video clip was issued, in which Ayman Al-Zawahiri calls for the revolution in Egypt to continue until the representatives of the previous regime have been eliminated, ties to the US have been severed, and the peace treaty with Israel has been nullified.
• The Islamic Emirate of Afghanistan encouraged Afghans serving proximate to Western security forces to attack them, and cited the Afghani chef who poisoned American soldiers as an example.
• Propaganda has increased against the Syrian regime, as have appeals to assist the Syrian people in their struggle against the regime.
• Al-Qaeda in the Arabian Peninsula (AQAP) took responsibility for an attack on the presidential palace in Yemen on the eve of the transfer of power from Yemen’s former president, Ali Abdullah Saleh, to its former vice president, Abd-Rabbu Mansour Hadi.
• Two new jihadist media institutions have been established: Al-Tahadi, and Inform Foundation for Media Production.
• A new jihadist Web forum called Al-Qital has been established.


19/3/2012 Periodical Review: Fatwas – January – February 2012

ICT’s Jihadi Websites Monitoring GroupThe following report details the main fatwas published in January and February 2012 on Minbar Al-Tawhid wal- Jihad, a Web site run by the Salafi ideologue Abu Muhammad Al-Maqdisi. Web surfers’ questions are answered by the site’s Sharia Committee, which comprises a number of prominent Salafi sheikhs.This publication presents some of the religious-legal rulings [fatwas] handed down in January and February 2012. Among them, we highlight fatwas concerning the Islamic laws regulating participation in Libya’s National Transitional Council; the status of property looted from the estate of the deposed tyrant Muammar Qadhafi and, similarly, the status of property looted from members of the Syrian regime; the stance one should take toward Sunni soldiers fighting in the Syrian Army; and whether or not it is permissible under Islamic law for a Muslim to work for one of the security forces (police, military, FBI) in the West.


6/3/2012 Periodical Review: Summary from the Jihadi Forums – The First Half of February 2012

ICT’s Jihadi Websites Monitoring GroupThis report summarizes the most prominent events brought up in the Jihadi online forums in the first half of February 2012. Following are the main issues raised in this report:   
• Ayman Al-Zawahiri, the leader of Al-Qaeda, announced that the Somali movement Al-Shabab Al-Mujahideen had officially joined Al-Qaeda.
• Al-Shabab Al-Mujahideen organized a large celebration in honor of its having joined the ranks of Al-Qaeda.
• Ansar Al-Sharia in Yemen executed three Yemeni citizens suspected of collaborating with US forces.
• The Islamic State of Iraq took responsibility for assassinating Mullah Nadim Al-Juburi, a former leader who had left the organization.
• Abu Muhammad Al-Tahawi, an influential Salafi-jihadist in Jordan, called for jihad against the regime of Bashar Al-Assad.
• A new volume was published of Al-Shamikha, a jihadist magazine for women.
• New volumes appeared of three publications that cover the jihad in Afghanistan.
• The Salafi-jihadist media outlet Al-Faroq, which focuses on Egypt, launched a new Facebook page.


28/2/2012 Periodical Review: Summary from the Jihadi Forums – The Second Half of January 2012

ICT’s Jihadi Websites Monitoring GroupThis report summarizes the most prominent events brought up in the Jihadi online forums in the second half of January 2012. Following are the main issues raised in this report:   
• The Nigerian group Boku Haram has taken responsibility for a series of coordinated attacks perpetrated on January 20, 2012, against several police institutions in Kanu, the second-largest city in Nigeria.
• Using a car laden with explosives, the Somali group Al-Shabab Al-Mujahideen carried out a suicide terrorist attack against the regional headquarters of the Ethiopian Army in the city of Beledweyne.
• Ansar Al-Sharia has succeeded in taking over the city of Rada’a in Yemen.
• The Shari’a Council of Al-Qaeda in the Arabian Peninsula (AQAP) has ruled that the faithful may kill the Houthis in Yemen, and stating that, in fact, it is the duty of every Muslim to wage war against the Houthis.
• The spokesman for the Islamic State of Iraq has emphasized that the jihad in Iraq will continue even though the US has withdrawn its troops, and that now the majority of effort will be directed against Iran’s agents in Iraq and their Shi’ite allies.
• A new jihadist group called “The Aid Front for the Syrian People” has been established, with the central goal of overthrowing Bashar Al-Assad.
• A new Salafi group has been established in Egypt named “Followers of the Sunna for the Salvation of Egypt” and headed by Hani Al-Sibai and Tariq Abd Al-Halim.
• A new jihadist Turkish periodical, ?slam Dünyas?, has been published.


12/2/2012 Periodical Review: Summary from the Jihadi Forums – The First Half of January 2012

ICT’s Jihadi Websites Monitoring GroupThis report summarizes the most prominent events brought up in the Jihadi online forums in the first half of January 2012. Following are the main issues raised in this report:  • The Chairman of Al-Qaeda in the Islamic Maghreb’s Political Committee addresses the Algerian people, telling them to bring down the Algerian regime.
• The Emir of the “Al-Tawhid wal-Jihad” Group in western Africa threatens France with war and claims responsibility for the abduction of three Europeans from south Algeria.
• The Emir of the Nigerian “Boko Haram” Group promises to continue with the operations against the Christians.
• The leader of the Kenya branch of the “Al-Shabab Al-Mujahideen” movement stresses that Kenya is a legitimate Jihad arena.
• The “Al-Qayrawan” Tunisian Salafi-Jihadi media institute expands its propaganda activity and is embraced by the “Shumukh Al-Islam” Jihadi forum.
• Three new issues of the Islamic Emirate of Afghanistan.
• A new newsletter called “Shahada”, focusing on the Somali jihadi arena.


22/1/2012 Periodical Review: Fatwas – November – December 2011

ICT’s Jihadi Websites Monitoring GroupThe following report details the main fatwas published in November and December, 2011 on Minbar Al-Tawhid wal-Jihad, a Web site run by the Salafi ideologue Abu Muhammad Al-Maqdisi. Web surfers’ questions are answered by the site’s Sharia Committee, which comprises a number of prominent Salafi sheikhs.This publication presents some of the religious-legal rulings [fatwas] handed down in November and December 2011. Among them, we highlight fatwas concerning joining the Free Syrian Army and the revolutionaries in Libya; participation in protests against the continued rule of the Supreme Council of the Armed Forces in Egypt; participation in demonstrations against the regime in Morocco, alongside elements whose principles contravene those of Islamic religious law [shari'a]; the appropriate response to a French newspaper’s having derided the prophet Muhammad; and the essence of the relationship with the Al-Nahdha Party in Tunisia.


16/1/2012 Periodical Review: Summary from the Jihadi Forums – The Second Half of December 2011

ICT’s Jihadi Websites Monitoring GroupThis report summarizes the most prominent events brought up in the Jihadi online forums in the second half of December 2011. Following are the main issues raised in this report:   • Abu Yahya Al-Libi summarizes the key events of 2011.
• A new video clip in memory of Anwar Al-Awlaki is produced by Al-Qaeda in the Arabian Peninsula (AQAP), and a message is sent to Muslims living in the US to join the battlefields of jihad or to fight the US on its own soil.
• In an audio file, Ibrahim Al-Rubaysh discusses the achievements of the Arab revolutions, especially as reflected in the weakening of the US in the Middle East.
• A new jihadist organization, calling itself Ansar Al-Din, is established in northern Mali.
• Al-Tawhid wal-Jihad in West Africa takes responsibility for abducting three European citizens in Algeria.
• A new jihadist organization calling itself Ansar Al-Mujahideen is established in the Sinai Peninsula.
• Three new jihadist media outlets are established: Al-Ibda, Ibn Taymiyyah (identified with the Palestinian Salafi-jihadist Army of Islam), and Al-Faroq (based in Egypt).

 

References:

read More –>http://www.ict.org.il/

06/25/12

System D- Bitcoin’s Underground Economy

bitcoins - system D gatomalo2

In Crypto-curency we trust. – I hate math but I like money – mAyBe sI-nO

gATO wAs- reading Forbes -Jon Matonis article about the shadow economy and bitcoins. The Bitcoin market is $10 Trillion and growing the crypto-currency is surpassing everyones imagination and why is that. System D is the answer, what is System D? It is a shorthand term that refers to a manner of responding to challenges that requires one to have the ability to think fast, to adapt, and to improvise when getting a job done. This can be applied to hackers, Anonymous, hacktivist and of course the Tor-Onion network.  They are all System D and growing because of it.

System D is a slang phrase pirated from French-speaking Africa and the Caribbean. The French have a word that they often use to describe particularly effective and motivated people. They call them débrouillards. To say a man is a débrouillard is to tell people how resourceful and ingenious he is. The former French colonies have sculpted this word to their own social and economic reality. They say that inventive, self-starting, entrepreneurial merchants who are doing business on their own, without registering or being regulated by the bureaucracy and, for the most part, without paying taxes, are part of “l’economie de la débrouillardise.” Or, sweetened for street use, “Systeme D.” This essentially translates as the ingenuity economy, the economy of improvisation and self-reliance, the do-it-yourself, or DIY, economy.

Essentially, bitcoin is the ‘System D’ of currencies — global, decentralized, and non-state sanctioned. In todays world were Greece, Spain and the U.S economy are falling apart we now have a currency that is not controlled by one governments it’s control by the people, and the powers that be the bankers are really pissed off.  This is why the “deep dark web” is being vilified. You hear about Silk Roads selling drugs and all kind of scary thing but in reality the black market is only a small portion of the dark web, but Bitcoins are a big part in it’s e-commerce and it’s not traceable that the bad part and the good part. You at home can set up a Bitcoin miner on your computer and start mining Bitcoins at home with a spare computer. It’s like a solar power cell on your roof top, or a windmill you can be in control of things again.

But the real issue is control! The bankers have no control of this new emerging economy. The 1% fear that if we the people start using this new currency we will diminish their power, their wealth and they can’t have that. Bitcoins are barley 3 years old and you hear everywhere that only criminals use it, it’s part of the bad guy’s and another fact that escapes people since it’s a crypto thing and we are talking about MATH they can only generate bit coins till 2030 so this is not the solution for a currency but at least we know where the end lies and we can make it better when nobody is in control.

History tell’s us that the robber (banker) barons use the same trick to spread rumors and crash the stock market in the early 1920, then they put in laws to get every one to sell their gold so they control it. We did have a currency based on Gold but they wanted this power and they payed the politicians off and got all our gold. Now they see this new currency and since it’s not under their control they want you to think it’s a bad thing.

Now a $10 Trillion dollar market will get these bankers up and ready for bear if they want to keep their power based and scaring the masses will not work when you can buy Bitcoins at any 7/11 or WallMart you can see that smart merchants are now accepting Bitcoins for the goods and services these early adopters will see themselves grow financially and hedge their bets on what is a winning worldwide currency. Governments will also go after this new markets because bankers have politicians in their pockets but this tidal wave of the new fiat currency will become de-facto very soon. Just in the last few months it has gone from $4.25 USD to today 6/25/2012 $6.28 according to mtgox.com one of the new traders in this new economy. That’s about about a %30 percent increase—/ now that’s a better rate than anyone can give you on your investmentCa$hing -mEoW- mEoW gAtO lIke that….//

So what does it mean to the average person well if you have Bitcoins in your portfolio you will make a killing as Bitcoins are expected to go to almost $30 USD by Christmas time 2012. gAtO predicts maybe $20-25 by the end of year but I lost my tail in the stock market in 2008 what do I know. Well I know that In that time frame I had no control of the market and today because I am active in this field of Cyberspace and cryptology I can see the patterns and I trust Bitcoins better than USD or EUROs. ViVa System D: – gAtO oUt

Read more Forbes -Could Bitcoin Become the Currency of System D?http://www.forbes.com/sites/jonmatonis/2012/03/19/could-bitcoin-become-the-currency-of-system-d/
06/5/12

Iran Cyber Problems -bad antivirus software

Iran Cyber Problems

gAtO mOnItOrEd – Iran Tor-Relays last night they had blocked all public relays so nobody could use the ToR network. Of course as long as you have private unlisted ToR relay people from Iran could still use the ToR network on the Internet. On the other side of Iran’s Cyber Warfare the Flame cyber worm – is still kicking ass and taking names in Iran. U.S and Israel have accepted the role of chief cyber warrior of the Stuxnet, DuQu and Flame. Some of the first cyber weapons ever made and deployed on a covert mission’s. Do you think that this cyber weapons did not use ToR networks to hide their C&C server never to be found??? So here we have a country suppressing ToR communication  (and suppressing Flame, DuQu and StuxNet C&C ToR Communication) and being attacked by 2 of the largest countries in the world. gAtO would call this cyber warfare. 

cyber war profiteers –> Who stands to make the most business ($$$) in this cyber warfare. We in the west have Norton, McAfee and other’s to protect our computers and business and government computer enterprise systems – but they cannot do business with Iran- We just had Symantec pull out of a deal with China’s Huawei because of a U.S-DOD contracts-/ a friend pointed to eset.com as the number one anti-virus software distributor to Iran./ When the Iranian government want’s to protect their computers they turn to Eset corporation for their enterprise cyber security support and service. So who are they?

Alexa the number one SEO company – http://www.alexa.com/siteinfo/eset.com – shows Iran is their number one customer—. Why? Eset is based out of the Slovak Republic , Bratislava the capital of Slovakia. It’s not silicone valley – I never heard of a high tech center and educated cyber security experts from that side of the world—  We know this area more for cyber criminals but now this little company out in the middle of know-where has some interesting customer. Those countries that nobody wants are becoming their cyber customers, and it looks like Eset is a growing business.

Eset – Contact info: – http://www.eset.com/us/about/contact/ – They have offices in Czech Republic, Singapore, Argentina and the U.S.A – —/$#@! – So the company that is providing the anti-virus software for Iran has offices in America, with American business as customers- gAtO don’t like that much that is why I mentioned it.

Anti-virus software controls every aspect of the safety and security of your computer, your anti-virus software has deep ties to your computers. So this little anti-virus company is now a world player. It could also be our allied and work with us.

From a business point of view – First of all I would fire them. If I was the Iranian government, Stuxnet, DuQu and Flame the same MO and my anti-virus software does not catch it -new business but, oh well if Iran fires them who else would step into this position. This show to gAtO that the old weapon dealers have turn to legit, cyber counter weapons dealers/

customers metric’s: Imagine the statistics from Eset on Iranian government sites? 

As a security researcher I just don’t like that Eset is in the U.S.A if they get American customers they can maybe sell their stats to Iran. Security companies like anti-virus have a lot of power. Just a simple update and the new spy-ware can get in and turn on your camera or just record your speech in your house or office. I would stay away from Eset anti-virus software solution – just for me gAtO oUt…

Reference:

Iran Top Sites : http://www.alexa.com/topsites/countries;0/IR

Bratislava: http://en.wikipedia.org/wiki/Bratislava

Alexa-Eset – http://www.alexa.com/siteinfo/eset.com

Eset about page -  http://www.eset.com/us/about/contact/ .

WhoIs - http://whois.domaintools.com/eset.com

Registrant:

ESET, spol. s r.o.

Peter Pasko

Einsteinova 24 Aupark Tower, 16th Floor

Bratislava,   85101

SK

Phone: +421.232244111

Email: sysadmin@eset.com

 

Registrar Name….: Register.com

Registrar Whois…: whois.register.com

Registrar Homepage: www.register.com

 

Domain Name: eset.com

Created on…………..: 2001-04-18

Expires on…………..: 2013-04-18

 

Administrative Contact:

ESET, spol. s r.o.

Anton Zajac

610 W Ash St, Ste 1900 Suite 1900

San Diego, CA 92101

US

Phone: +1.6198765404

Email: sysadmin@eset.com

 

Technical  Contact:

ESET, spol. s r.o.

Anton Zajac

610 W Ash St Suite 1900

San Diego, CA 92101

US

Phone: +1.6198765404

Email: sysadmin@eset.com

 

DNS Servers:

e.ns.lanechange.info

ns4.lanechange.net

ns2.lanechange.net

ns3.lanechange.net

ns1.lanechange.net

03/7/12

Reporting Open System in the Wild: Like NASA JPL OPEN

gAtO sAy – we have a big problem for anyone that has cyber information and want to report it. This is not a US problem but an International one. We all know that companies do not want to report that their site is open, or they been hacked for a number of reasons. Their reputation will be damage, clients will not trust them and sad but companies sometimes even pay hackers to keep the information from being leaked. You have hacktivist, commercial criminals and state actors. But a few security researcher find information about a company and want to report it and get the problem fixed the reasons vary but the intentions are good. Were do we go to report this. The FBI, our Senators or maybe Homeland security nah they don’t care.

gAtO and other researcher like ntiSec have found a number of SCADA systems open in the wild and from all the shouting from the powers that be you would think they would want to help. SCADA system control pump, elevators, nuclear power plants and if someone plays with these systems it could have a very bad effect on physical infrastructure of a country. Political people yell their going to hack out electric system but when we find one and try to tell the company they don’t listen.

One reason is ego – let say you contact a webmaster and tell them hay your system is open and has this problem – well that webmaster may just think “oh shit if my boss finds out it’s gonna be my ass”and he/she does not report it. Maybe they will try to fix it but admitting to anyone in the IT department could make them tell the boss and with the job market the way it is people are afraid that they may get fired.

gAtOmAlO sAy's

Next if you go to the C-Suite folks you know the executives well they say “oh shit this could have an effect on my bonus” or profits or they may lose clients if people find out that maybe their client information has not been encrypted or maybe compliance and regulatory reports and they get a heavy fines, this will effect the bottom line. So as you can see these people have a vested interest not to tell anyone how bad their systems are or fix them. But their sites are still open.

Then you have governments which are responsible to protect the people but these folks have so many rules and regulations that actually prevent them from doing the right thing and fixing the problems. Example:

You all heard that NASA has been hacked by the Chinese and yet gAtO tried to report that there systems were wide open:

http://starbase.jpl.nasa.gov/

http://starbase.jpl.nasa.gov/mgn-v-rdrs-5-dim-v1.0/mg_1193/fl06s186/

http://starbase.jpl.nasa.gov/mgn-v-rdrs-5-dim-v1.0/mg_1193/

http://starbase.jpl.nasa.gov/mgn-v-rdrs-5-dim-v1.0/

You would think that this would get top priority. I could not get anyone to listen. I tried the FBI, Senator Reed, Senator Whitehouse, even Homeland Security they could not or would not help. Here is NASA . Jet Propulsion Laboratory (JPL) the people that control our satellite and still they did not close up the sites for over a week.  A hacktivist or a foreign state actor like China, Iran, North Korea could access these systems and bring down a satellite and kill millions of people. They still don’t care.

When gAtO tried to report this to his representatives he got hung up by his office, they took no action. Here is our government doing nothing when something goes wrong. Email them or call them and ask them why they don’t want to help -gAtO oUt

Steven_Usler@reed.senate.gov  (401) 943-3100

james.langevin@mail.house.gov (401) 732-9400

jim@jimlangevin.com

sheldon_whitehouse@whitehouse.senate.gov (401) 453-5294

12/19/11

Is Al Qaeda’s Internet Strategy Working?

gAtO sAiD – If Mr. Jenkins stated the Al Qaeda’s web strategy correctly, then it’s just an effective web site. The human element is what make it dangerous. Hate is sometimes stronger in the young and as we seen in the Arab Spring the young muslins are adapting to cyberspace just as easily as our own kids. Things are more political in the middle-east than here and using phone, computer, game consoles as effective communications tools would give a loud voice to Al Qaeda as well as the protesters out in the streets of Egypt today. Video’s are compelling but the streaming of video to anyone on a cell-phone anywhere is a powerful tool for any movement or governments.

The Author argues that terrorists use the Internet to disseminate their ideology, appeal for support spread fear and alarm among their foes, radicalize and recruit new members, provide instruction in tactics and weapons, gather intelligence about potential targets, clandestinely communicate, and support terrorist operations. The Internet enables terrorist organizations to expand their reach, create virtual communities of like-minded extremists, and capture a larger universe of more-diverse talents and skills.

gAtO-guess the next question is “should we go after websites for terrorist groups” like Al Qaeda? Jamming (Censorship) them like they use to with radio noise “remember Radio Free Europe” we today use dDoS to jam a website. With todays code  we could hack the DNS and divert traffic were we want to, we can find all the users of the site, we can use the site to gather all kinds of information from the outside-in, and if we get a RAT inside then it would be a gold mind. Could this be the reason why it’s still running today? So maybe we have to live with the evil to know our enemy’s better and mitigate their effectiveness.- gAtO oUt

http://www.stefanomele.it/news/dettaglio.asp?id=276

Is Al Qaeda’s Internet Strategy Working?

gAtOmAlO dOn'T lIkE'y tErRoIsT gRoUpS

This document is the testimony presented before the House Homeland Security Committee, Subcommittee on Counterterrorism and Intelligence on December 6 2011, by Brian Michael Jenkins of the RAND Corporation.

The Author argues that terrorists use the Internet to disseminate their ideology, appeal for support spread fear and alarm among their foes, radicalize and recruit new members, provide instruction in tactics and weapons, gather intelligence about potential targets, clandestinely communicate, and support terrorist operations. The Internet enables terrorist organizations to expand their reach, create virtual communities of like-minded extremists, and capture a larger universe of more-diverse talents and skills.

While almost all terrorist organizations have websites, al Qaeda is the first to fully exploit the Internet. This reflects al Qaeda’s unique characteristics. It regards itself as a global movement and therefore depends on a global communications network to reach its perceived constituents.

11/20/11

What Is Cyber Warfare? | Rick Perry & Mitt Romney May be Opening U.S Cyber infrastructure to China – Huawei.

China needs to get U.S and other countries (IP) Intellectual Property and secrets to keep its economic engine going. China has 3 options 1-Hack your way in. 2-Buy your way in. 3-Buy a politician. Just like our bridges and railway infrastructure, the U.S cyber infrastructure may be getting sold down the tubes to China with support from our politicians.

eL gAtO sAiD ... mUcHo sTuPiD

What is cyber warfare? Simple when someone is in your network without your permission, you’re at war. If someone try’s to take your website down with DDoS, your at war. When someone steals your identity and steals your secrets and your money, you’re at war. The fact is we are at war in cyberspace with China. China hacking cyberspace to gain IP and secrets this year hopefully opened our eyes to the current cyber warfare in the 5th battlefield cyberspace.

China and other companies will try anything to be able to monitor it’s own people as well as other Nations anyway it can. If hacking doesn’t work, China is planning to (use big Money) buy a big share of Facebook (by the way – Facebook is illegal in China- you do the math-) Just add 450 million Chinese users to Facebook and watch the stock market action (make big $$). Now China may be buying our politics.

Rick Perry as well as Mitt Romney have both made money with ties to Chinese corporations in China. The washingtonpost.com did a great piece about “Perry welcomed Chinese firm despite security concern”.

Let’s talk about Huawei. This Chinese company is a major telecom company though out the world that nobody has ever heard of the quite, shy company type. They provide backbone infrastructure equipment for the Internet and Cell technology industry. But they have a few problems with the U.S.

  • Their head guy who created the company is: Ren Zhengfei — Huawei’s chief executive, Ren, according to a news release. The Chinese executive is a former leader in the (PLA) People’s Liberation Army who helped oversee the Chinese military’s telecom intelligence in the 1980s, according to a Rand report.
  • Three times since 2008, a U.S. government security panel has blocked Huawei from acquiring or partnering with U.S. companies because of concerns that secrets could be leaked to China’s government or military.
  • In 2005, a Rand report questioned Huawei’sdeep ties with the Chinese military, which serves a multi-faceted role as an important customer, as well as Huawei’s political patron and research and development partner.”
  • In late 2009, The Post reported, the NSA- National Security Agency privately urged senior executives of AT&T not to purchase Huawei equipment for a planned phone network.
  • Michael Wessel, a former Democratic aide who is a member of a bipartisan congressional advisory panel that unanimously agreed that Huawei posed a cyber-security risk to the United States
  • Huawei spokesman William Plummer said the company helps sustain thousands of U.S. jobs, and purchased $6.1 billion in U.S. goods in 2010. In an open letter to the U.S. government, Huawei called the claims of ongoing military ties “falsehoods.”
  • Eight Republican senators, including Jon Kyl of Arizona and Richard Shelby of Alabama, urged the Obama administration to investigate Huawei’s effort to sell equipment to upgrade Sprint Nextel’s mobile network. They argued that Huawei’s involvement “could create substantial risk for U.S. companies and possibly undermine U.S. national security.” The Committee on Foreign Investment rejected Huawei’s partnership with Sprint later that year.
  • In 2008, the Committee on Foreign Investment in the United States, a multi-agency government panel, blocked Huawei’s plan to buy 3Com.

A DHS spokesman testified to congress that we might have electronic devices with hardwired backdoor to allow spying on our digital infrastructure by foreign Nation. He did not say China, but it was implied. Now lets take a look at the last 2 bullets points. China wanted Sprint and 3Com. These two (2) are the biggest in the telecomm space in America. If these tainted components were to get installed China would be able to see everything on the Internet, and they didn’t even have to hack a website to do it.

The current GOP front-runner Gov. Rick Perry at a ribbon-cutting ceremony launching Huawei corporate headquarters. Promising hundreds of new jobs, and validating what he calls his “Texas miracle” of growth. While Perry focused on Huawei’s ability to create jobs in a sluggish economy, national security experts in both the George W. Bush and Obama administrations had concluded that the global telecom giant poses a potential cyber-security risk to the U.S. military and businesses.

  • As governor, Perry has made international recruiting a centerpiece of his economic policy, and more than two dozen Chinese companies now have a Texas presence.
  • China is the state’s third-largest export-import partner. So this is how Rick Perry got all those jobs in Texas there made in China, not made in America.

Then we have another front-runner Mitt Romney has vowed to “get tough” on trade with China and called the superpower one of the “worst offenders” of global trade rules, suggesting in an interview that the United States must clamp down on China’s use of pirated technologies.

BUT on the other hand.

Mitt Romney’s former investment company, Bain Capital, worked on behalf of at least two Chinese companies trying to acquire U.S. technology firms. One case involved Huawei, which Bain joined in its failed bid to buy the software firm 3Com. Romney left Bain Capital in 1999, and aides say he had no role in those deals, so I have to give him the benefit of the doubt.

This is were security professionals need to communicate that up the chain of command so people will become aware of the problem. Security people see the problems but as my friend Reza told me “he pointed out to the company all these Chinese computers needed to be replaced”. When you turn these computers on ,  all of a sudden all kinds of connection are started by these computers all by themselves. The bad news is that these computers are cheap, and maybe some sub-government contractor won’t use it next time they visit our government complex or private company. If they have hardware with backdoor not amount of anti-virus software will stop it.

We cannot allow China or any other country to buy us with money or jobs or politics. That’s what America used to do to help 3rd world nations, give jobs to the people and money to the politicians. Then that country will be favorable to our needs – their oil, their minerals, their IP Intellectual property and secrets. If we had the manufacturing jobs here in America, we could build our own electronic components. We are dependent on foreign oil and foreign technology.

The Saturn V rocket: the only rocket to take (Americans) humans to another world (the moon). America has no replacement and we have lost the manufacturing capabilities and the job specialization that’s needed to ever create another one again. We stopped building rocket that will take us to another world, so the technology dies with it.

I hope America will one day build another Saturn V rocket and I hope America bring back technology manufacturing jobs and the talent that goes with it back home to America. This is the only way we can be sure that someone is not planting a backdoor in my cell phone or I-pad that can take down the power grid of another country while I talk to my daughter about “my grandson new poop painting all over the wall”.

Politics, cyber security and national interest goes hand in hand. It’s our job to educate our politicians about the Chinese cyber threat, this way we can keep them in line.

My 2© cents – gatoMalo_at_uscyberlabs_dot_com

http://USCyberLabs.com/blog/

http://cyber.uscyberlabs.com

http://ChinaCyberWarfare.wordpress.com

http://HacktivistBlog.wordpress.com/

http://normacluster.wordpress.com/

 

 

 

Read More ..> http://www.washingtonpost.com/politics/perry-welcomed-chinese-firm-despite-security-concern/2011/08/10/gIQAAu80EJ_story.html

10/28/11

Biggest Cyber Threat Military or Economic?

Is the biggest cyber threat military or economic?

Discussion -

• • • • gAtO-tHiNk tAnK —: While we were developing stuxnet for Iran -warfare cyber weapon. The Chinese were robbing our intellectual properties and these actions are the reason the US is in the economic mess were in. Corporate espionage is treated differently but it translate to money and economic power. In the old days the CIA would have a country fight each other and when that happens you forget your real enemies. Us -vs-them. Look at Occupy Wall Street and the Tea party. Through cyber manipulation and buying technologies when you couldn’t hack them is the reason the BRIC nations are the new leaders in the world power base. So to answer your question the bigger cyber threat would be economics warfare. You just can’t justify sending in a nuclear missile because some government contractor is DDoS’ing your competition. Proportionality of attacks.

• • • • gAtO other sAy’S: —

gAtO lOcO mAyBe sI - nO

• Military and economy are married since ever; the biggest cyber threat comes from inside and hits both. MIC is a weak concept.

• We cannot have a military without an economy, we cannot protect our economy without our military.

Individual defence destroys the individual, collective defense protects the collective of individuals.

Businesses do not often see the value of information security until its far too late. they as a whole do not learn from others mistakes unless those mistakes were made by companies in their own space, and unfortunately these days many companies occupy more than one sector so it is easy to make excuses why ‘it wont happen to us’.

The economy is an asset and thus needs to be protected.
The military is an asset and thus needs to be protected.
The health service is an asset and thus needs to be protected.
<Insert asset> is an asset and needs to be protected.

Working together they can protect one anothers backs using collective resources, individually they can fall like dominos. Secure the backbone, pool the resources with the right talent in the right areas with strategists, technical support and physical support and you go a long way to ensuring in the event of a major crisis that you can protect the whole….

Thats my view anyway…… maybe ill include that in my book (more eloquently as I have only had one coffee this morning and am not firing on all thrusters).

• MG Shaw adds a new dimension to the term “Public Private Partnership” in positing that national security interests and the profit interests of firms are intertwined and mutually dependent. This is good to hear. Now…if we can just get more business convinced of this inter-connectedness, we’ll be able to move forward. Those of us in the field have much public education work to do. Stay strong.

• With the preponderance of intellectual capital residing with the private-sector, within this man-made cyber domain, its too bad the private& public-sectors can’t put more emphasis on the ‘how’ versus the ‘what’. Most responsible individuals/firms know ‘what’ the problems are…the intent with public/private-sector collaboration is to figure out ‘how’ to solve the challenges in manageable bites and stop trying to “boil the ocean”. As the new saying goes “better safe than SONY”!

• Riley makes a good point. It’s almost as if we’d rather talk about the problem rather than solve it. Sure, it’s expensive to put another layer of security into our IT architecture, but the technology to stop hackers exists and isn’t that hard to find. And if whining employees don’t like not being able to use Facebook on company computers, nicely tell them to find a new job. Remember the days of private lines and no Internet. We still connected computers on networks before the Internet. It was called private networking. This would solve most of the Internet related cybersecurity challenges.

• Riley and Dan,
I completely agree with you both. However, even our military is now clamoring for Social media access on Government networks. I do believe there is a use for Social media however not every mission requires such access; not to mention the preponderance of users simply want to be social butterflies while at work. As you state for those who require it, purchase a separate internet access and open it wide up. However for the mission critical or business critical efforts lock it down and properly secure it. Unfortunately that good old bottom line matters too much and leaders would rather assume risk than remove it. I would rather pay on the front side than on the backside.

• Seeing as it would take more gas than the Chinese have to mobilize , they have already been out hacking everything they can, I dont think it would be a military like war, economic seems more feesable.

• Most countries treat economic hacking as a less serious attack (with less serious penalties) than a military attack. Most businesses are less IA aware than the military. I would definitely say economic attacks are a bigger long-term cyber threat to nations today. However, if military cyber-security ever drops their guard, the consequences on their readiness and ability to respond will result in more fatalities.

• When we are talking about Cyberwar, we can not say that the economy or the military will be the preferred targets. The more logical target is as always the weakest link in a system.

War is always a military operation, whether or not cyber. Like the Chinese hacked all they could, Americans, Russians and Israelis did and still do.
The effect of new weapon systems, offensive and defensive concepts can only be tested to a certain degree in a virtual environment. At a certain point they have to be used under real operational conditions.
Cyberwar is a holistic war. In a cyberwar we do not have the distinction between “your network” or “their network”, the whole targeted country becomes one sole network. The network will be mapped, vulnerabilities identified and exploited.
The most vulnerable part of a network is always the User, followed by the public sector and the communication media. From there it spreads.
A cyberwar attack first uses the tactics of sabotage, deception and misdirection.
We are still far away from AMF’s on nuclear power plants and such things.

• The Chinese are fighting a long term war for domination. They are sucking up all the rare earth elements, stealing intellectual property through computer warfare, and are starting to get into the copper and hydrocarbon production. However, other countries are engaged in exactly the same thing. We are in a highly competitive environment, and those that don’t step up their game are going to be left in the dust of history.

 • • • • gAtO oUt