Man used neighbor's Wi-Fi to threaten Vice President Biden - Computerworld:
This is a good example of what I have been calling "Digital Assassination."
Raw research material for a body of work at http://eBomb.us by "Mike" Michael L. Baird mike [at} mikebaird d o t com
Thursday, December 23, 2010
Wednesday, December 15, 2010
You can research items related to eBomb.us by creating a Google Alert using the string:
NOT (games OR game) AND (cyberwarfare OR cyber war OR cyber security OR eBomb OR cyber attack OR cyberwar OR cyber terrorism OR cyber warfare) AND NOT (game OR games)
from http://www.google.com/alerts
NOT (games OR game) AND (cyberwarfare OR cyber war OR cyber security OR eBomb OR cyber attack OR cyberwar OR cyber terrorism OR cyber warfare) AND NOT (game OR games)
from http://www.google.com/alerts
Wednesday, December 8, 2010
Hackers strike at MasterCard to support WikiLeaks - Yahoo! Finance
Hackers strike at MasterCard to support WikiLeaks - Yahoo! Finance:
LONDON (AP) -- "Hackers rushed to the defense of WikiLeaks on Wednesday, launching attacks on MasterCard, Visa, Swedish prosecutors, a Swiss bank, Sarah Palin and others who have acted against the site and its jailed founder Julian Assange..."
This is just a taste of what's to come - the power of net-based attacks to cause significant financial, cultural, and social change will approach that of conventional military warfare attacks.
LONDON (AP) -- "Hackers rushed to the defense of WikiLeaks on Wednesday, launching attacks on MasterCard, Visa, Swedish prosecutors, a Swiss bank, Sarah Palin and others who have acted against the site and its jailed founder Julian Assange..."
This is just a taste of what's to come - the power of net-based attacks to cause significant financial, cultural, and social change will approach that of conventional military warfare attacks.
Sunday, December 5, 2010
Print Story: US works to secure networks as hackers advance - Yahoo! News
US works to secure networks as hackers advance - Yahoo! News: "
As the Department of Homeland Security moves methodically to pare down and secure the approximately 2,400 network connections used every day by millions of federal workers around the world, experts suggest that technology already may be passing them by.
As the Department of Homeland Security moves methodically to pare down and secure the approximately 2,400 network connections used every day by millions of federal workers around the world, experts suggest that technology already may be passing them by.
Saturday, September 25, 2010
Computer Worm May Be Targeting Iranian Nuclear Sites - BusinessWeek
Computer Worm May Be Targeting Iranian Nuclear Sites - BusinessWeek:
If this article does not convince you that e-warfare is around the corner you have no imagination.
If this article does not convince you that e-warfare is around the corner you have no imagination.
Monday, September 20, 2010
Microsoft sounds alert on massive Web bug - Computerworld
Microsoft sounds alert on massive Web bug - Computerworld:
As many as one in four web sites around the world may be vulnerable to this Microsoft bug. The bug the bug enables the exploit to access Web applications with full administrator rights, resulting in information disclosure and even total system compromise.
As many as one in four web sites around the world may be vulnerable to this Microsoft bug. The bug the bug enables the exploit to access Web applications with full administrator rights, resulting in information disclosure and even total system compromise.
Thursday, September 16, 2010
How Haystack endangered the Iranian dissidents it was supposed to protect. - By Evgeny Morozov - Slate Magazine
How Haystack endangered the Iranian dissidents it was supposed to protect. - By Evgeny Morozov - Slate Magazine:
My related opinion: The Internet underlies all communications worldwide, and the ability of a small group of programmers to drastically effect security and anonymity assumptions makes for a very fragile infrastructure which is easily manipulated. MLB
My related opinion: The Internet underlies all communications worldwide, and the ability of a small group of programmers to drastically effect security and anonymity assumptions makes for a very fragile infrastructure which is easily manipulated. MLB
J.P. Morgan Chase’s Web Problem Is Fixed, For Now - Deal Journal - WSJ
J.P. Morgan Chase’s Web Problem Is Fixed, For Now - Deal Journal - WSJ:
Chase's online outage in Sept. 2010 is a forewarning... If confidence in the banking system can be shaken this easily and sustained through extended outages amongst others banks, commerce, and securities trading systems, etc., our economy could collapse in a mob online run on the system (my personal opinion appended here)... read the article for background.
Chase's online outage in Sept. 2010 is a forewarning... If confidence in the banking system can be shaken this easily and sustained through extended outages amongst others banks, commerce, and securities trading systems, etc., our economy could collapse in a mob online run on the system (my personal opinion appended here)... read the article for background.
Is Stuxnet the 'best' malware ever? - Computerworld
Is Stuxnet the 'best' malware ever? - Computerworld:
This is an example of the kind of eBomb or e-warfare strategy the US could inflict on Iran during an assault.
This is an example of the kind of eBomb or e-warfare strategy the US could inflict on Iran during an assault.
Tuesday, September 14, 2010
Siemens: Stuxnet worm hit industrial systems - Computerworld
Siemens: Stuxnet worm hit industrial systems - Computerworld: "- Sent using Google Toolbar"
A sophisticated worm designed to steal industrial secrets and disrupt operations has infected at least 14 plants, according to Siemens.
A sophisticated worm designed to steal industrial secrets and disrupt operations has infected at least 14 plants, according to Siemens.
Thursday, August 12, 2010
India readies cyber army to spy on hostile nations - India - The Times of India
India readies cyber army to spy on hostile nations - India - The Times of India: "
The new Army will be staffed with hackers and IT workers.
The new Army will be staffed with hackers and IT workers.
Tuesday, August 10, 2010
Governments Battle to Stay Ahead of Threats on Internet, 'The Great Leveler' | PBS NewsHour | Aug. 10, 2010 | PBS
Governments Battle to Stay Ahead of Threats on Internet, 'The Great Leveler' | PBS NewsHour | Aug. 10, 2010 | PBS: "
The public grid is wide open - all of society now runs on it - infrastructure, power, air traffic control, dam flow, SCADA, etc.
The public grid is wide open - all of society now runs on it - infrastructure, power, air traffic control, dam flow, SCADA, etc.
Cyber warfare: 63 per cent think it's acceptable, says survey - Yahoo! News UK
Cyber warfare: 63 per cent think it's acceptable, says survey - Yahoo! News UK: "-
This report uncovers alarming attitudes towards international cyber espionage.
"... this opens up a whole new area of cybercrime. It used to be hobbyist, but has become increasingly financially motivated. Now were seeing economic and politically motivated cybercrime too..." Cyberwarfare is the hottest topic in Washington D.C. these days...it's real and it's here.
This report uncovers alarming attitudes towards international cyber espionage.
"... this opens up a whole new area of cybercrime. It used to be hobbyist, but has become increasingly financially motivated. Now were seeing economic and politically motivated cybercrime too..." Cyberwarfare is the hottest topic in Washington D.C. these days...it's real and it's here.
Saturday, August 7, 2010
Slashdot Apple Story | Microsoft Losing Big To Apple On Campus
Slashdot Apple Story | Microsoft Losing Big To Apple On Campus: "- Sent using Google Toolbar"
Yep, better sell MSFT and buy AAPL
The new generation is going all Mac...
Yep, better sell MSFT and buy AAPL
The new generation is going all Mac...
Wednesday, August 4, 2010
Repetition breaks Google Audio CAPTCHA
Repetition breaks Google Audio CAPTCHA
Determined hackers can and do penetrate and compromise systems regularly.
Determined hackers can and do penetrate and compromise systems regularly.
Tuesday, August 3, 2010
YouTube - FBI Confidential -- China's Cyber Terrorism?
YouTube - FBI Confidential -- China's Cyber Terrorism?: "According to a leaked secret FBI document, Chinese counterfeiters have sold close to 75 million dollars of fake Cisco Systems routers to the U.S. military. This revelation raises troubling questions about both the integrity of U.S. defenses in cyberspace and the possible motives of a foreign government with a long rap sheet for military espionage and cyber hacking. At least some of China's fake routers may be specially designed to provide Chinese hackers with undetectable 'back doors' into the highest echelons of classified information throughout the defense department bureaucracy.
Apple: iPhone, iPad At Risk To Hack Attack, Security Firm Says - Tech Trader Daily - Barrons.com
Apple: iPhone, iPad At Risk To Hack Attack, Security Firm Says - Tech Trader Daily - Barrons.com: "
Newly discovered vulnerabilities in the Apple (AAPL) iOS software could allow hackers to gain “complete control” of your iPhone or iPad,
Newly discovered vulnerabilities in the Apple (AAPL) iOS software could allow hackers to gain “complete control” of your iPhone or iPad,
CIA: Cyber Warfare Could 'Paralyze' U.S. - Political Punch
CIA: Cyber Warfare Could 'Paralyze' U.S. - Political Punch: "CIA: Cyber Warfare Could 'Paralyze' U.S.
CIA: Cyber Warfare Could 'Paralyze' U.S.
"In an EXCLUSIVE interview on “This Week,” host Jake Tapper asked CIA Director Leon Panetta what threat the U.S. is not paying enough attention to. One of his answers: cyber warfare. “We are now in a world in which cyber warfare is very real. It could threaten our grid system. It could threaten our financial system,” Panetta said. “It could paralyze this country, and I think that's an area we have to pay a lot more attention to,” the CIA chief said.""
CIA: Cyber Warfare Could 'Paralyze' U.S.
"In an EXCLUSIVE interview on “This Week,” host Jake Tapper asked CIA Director Leon Panetta what threat the U.S. is not paying enough attention to. One of his answers: cyber warfare. “We are now in a world in which cyber warfare is very real. It could threaten our grid system. It could threaten our financial system,” Panetta said. “It could paralyze this country, and I think that's an area we have to pay a lot more attention to,” the CIA chief said.""
Cyberwarfare - Wikipedia, the free encyclopedia
Cyberwarfare - Wikipedia, the free encyclopedia: "- Sent using Google Toolbar"
Wikipedia has a good introduction to Cyberwarfare
"Cyberwarfare has been defined by government security expert Richard A. Clarke, in his book Cyber War (May 2010), as 'actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption'..."
Wikipedia has a good introduction to Cyberwarfare
"Cyberwarfare has been defined by government security expert Richard A. Clarke, in his book Cyber War (May 2010), as 'actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption'..."
eBomb.us blog
eBomb.US - Electronic Cyber-terrorism and Cyberwarfare -- Fighting without Fighting
This blog contains research material for the research at eBomb.us
"Mike" Michael L. Baird
Morro Bay, CA
mike [at} mikebaird d o t com
This blog contains research material for the research at eBomb.us
"Mike" Michael L. Baird
Morro Bay, CA
mike [at} mikebaird d o t com
Subscribe to:
Posts (Atom)