Items Tagged with "Espionage"
December 19, 2011 Added by:Jeffrey Carr
"In a letter to partners, North America channel chief Randy Cochran says the contract manufacturing relationship between Symantec and Huawei will remain unaffected, as will Symantec’s commitment to marketing and developing appliance-based solutions..."
December 13, 2011 Added by:Joel Harding
The Concept of Convention on International Information Security was released in 2011 by the Shanghai Cooperative Organization, consisting of China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, and Uzbekistan. This concept was floated to the UN as a construct for international cybersecurity...
December 12, 2011 Added by:Headlines
"Right now we have the worst of worlds. If you want to attack me you can do it all you want, because I can't do anything about it. It's risk free, and you're willing to take almost any risk to come after me," said James Cartwright, a former vice chairman of the Joint Chiefs of Staff...
December 01, 2011 Added by:Headlines
"We lose enormous intellectual property rights. We're under constant attack every day. And it's going to take a whole government approach," said General Martin Dempsey, Chairman of the Joint Chiefs of Staff...
November 23, 2011 Added by:Headlines
"The Chinese are aggressively hacking into our nation’s networks, threatening our critical infrastructure and stealing secrets worth millions of dollars in intellectual property... This jeopardizes our national security and hurts U.S. competitiveness in the world market..."
November 22, 2011 Added by:Headlines
"In Senate testimony in 2011, Director of National Intelligence James Clapper outlined concerns about Chinese cyber surveillance, highlighting that the ―Chinese have made a substantial investment in this area, they have a very large organization devoted to it and they‘re pretty aggressive..."
November 18, 2011 Added by:Stefano Mele
Governments, businesses, military, all rely on communications. Moreover, information collected and collated from intercepted diplomatic, military, commercial and financial communications offers potential competitors an advantage on the negotiation table or battlefield...
November 07, 2011 Added by:Scot Terban
Patching, and secure coding have not been at the fore here and thus it is trivial for the most part to hack into systems throughout the internet. So, the Chinese need not be uber haxx0rs to do the damage needed because we collectively have done a bad job at securing our own networks...
November 03, 2011 Added by:Headlines
"Cyberspace makes it possible for foreign collectors to gather enormous quantities of information quickly and with little risk, whether via remote exploitation of victims' computer networks, downloads of data to external media devices, or e-mail messages transmitting sensitive information..."
November 03, 2011 Added by:Richard Thieme
The task of counterintelligence is to figure out what the other side is doing and how they are deceiving us. CI is predicated on double deceiving and triple deceiving the other side into believing fictions nested within fictions, always leavened with some facts, just enough to seem real...
November 02, 2011 Added by:Headlines
"I don't want to speak about it. I don't even want to think about it. But we are close, very close, to cyber terrorism. Perhaps already the criminals have sold their skills to the terrorists - and then... oh, God," said Kaspersky...
October 30, 2011
"Criminals and nation-states have adopted traditional physical intelligence techniques for the cyber world. Jeff Bardin examines various CYBINT and OSINT methods, information mining of social networking sites and the tools in use for gathering information on targets of opportunity...
October 21, 2011 Added by:Headlines
"Effectively acting as a PLA-associated technical reserve, its mostly under-thirty part-timers are drawn largely from civilian companies and university-level institutes operating in electronic fields. A national guard of cyber soldiers..."
October 19, 2011 Added by:Ron Baklarz
The new malcode has so much in common with Stuxnet, it is purported to have been written by the authors. W32.Duqu's primary purpose is intelligence gathering by focusing on industrial control system manufacturers with likely intent on future attacks against targeted victims...
October 19, 2011 Added by:Scot Terban
And therein lies the rub. DUQU has a 36 day shelf life. Now, this is good from a foot-printing level AND could be excellent for setting up the next attack vector that could include the component of sustained access. It was a recon mission and that was all...
October 12, 2011 Added by:Joel Harding
The next wave of cyber attacks will come through smart phones, cell phones and their data networks. Smart phones are almost ubiquitous and attacks launched either using the smart phones or attacking smart phones will be devastating on a scale we have not seen to date...