The "Cyber war" is supposed to start right now

Mother of all OPs. LMAO.

They called to attack the FXP site, said it's "line of life" to many Israelis....

LMAO! FXP is for playstation games!

we're dealing with children, how lame.
 
Do we want to risk a shut down of the nation's power grid?...
:eek:
Should cyber warfare be elevated to highest command structure?
April 29, 2013 WASHINGTON — To former Defense Secretary Leon Panetta, the threat of cyberattack was a potential Pearl Harbor and 9/11 rolled into one, an event terrorists or foreign adversaries could create, he said, to “paralyze the nation.”
Defense Secretary Chuck Hagel’s rhetoric is cooler, but still he calls the threat of computer network attacks nothing less than “the greatest threat to our security.” Over the last year, both secretaries have considered pulling the military command responsible for countering such threats — U.S. Cyber Command — out from under U.S. Strategic Command and making it a unified combatant command. That would put CYBERCOM on equal footing with the six regional combatant commands, as well as functional unified commands established to oversee special operations, nuclear deterrence operations and global transportation.

Many experts say the move would make sense, cementing cyber warfare as a focal point of the Defense Department’s 21st-century national security responsibilities. Supporters say the new unified command would become an integral part of global operations, as Special Operations Command has done since its activation in 1987. Others suggest that once the current wave of cyber enthusiasm passes, a top-level Cyber Command could lose steam and end up like U.S. Space Command. It was created in 1985 amid planning for the Strategic Defense Initiative, and disestablished in 2002 when, as one expert said, “it turned out as a domain, space isn’t as cool as we thought.” For now, Chairmen of the Joint Chiefs of Staff Gen. Martin Dempsey seems to be on the side of the naysayers, recently telling the Senate Armed Services committee that while an independent CYBERCOM might make sense in several years, “we just aren’t there yet.”

Hagel’s take on the matter, and ultimately President Barack Obama’s, will trump Dempsey’s opinion, however, and the Pentagon said the matter is still under review. “On a number of occasions the Secretary and the Chairman have discussed their concerns about the growth of cyber threats and the need to ensure DoD is organized, trained and equipped to address these threats,” Pentagon spokesman Lt. Col. Damien Pickart said in a written statement to Stars and Stripes. “While the Joint Staff has been examining different command options, including maintaining the status quo, the Secretary has not made a decision at this time on whether to recommend a change to the President.”

The cost of elevating Cyber Command is one of the questions Hagel and the Pentagon brass must weigh carefully, said Jason Healey, a former Air Force cyber warrior and director of the Cyber Statecraft Initiative at the Atlantic Council, a Washington think tank. “With sequestration and the military pulling back in so many areas, how do you justify it?” Healey said. “The amount of senior leader attention and budget that would go into creating another command is highly questionable.”

MORE
 
Granny says, "Dat's right - dem Chinamens computer hackers is at it again...
:eek:
Chinese military unit said to resume cyber spying
May 16, 2013 WASHINGTON—A Chinese military unit that a private U.S. computer security company accused of launching more than 115 cyber attacks against American companies over seven years has resumed hacking after a three-month hiatus, the company’s chief security officer said Wednesday.
The clandestine army unit, known as Unit 61398, “went quiet for a while—they changed the nature of their activities, they removed some of the tools that they had been using inside of different companies,” said Richard Bejtlich of Mandiant, which specializes in defending companies from cyber attacks and purging malware from computer networks that have been breached. “But over the course of the last several weeks it seems they are trying to ramp back up.... They seem to be trying to get back into some of their old targets,” he said.

Bejtlich’s remarks to the Center for National Policy, a nonpartisan think tank in Washington, came as the Obama administration weighs how to respond to what senior officials have called a massive campaign of commercial espionage emanating from China, and as Congress mulls legislation to enable companies and the government to share cyber-threat information. China disputes that it engages in commercial espionage through hacking, but Bejtlich and other private researchers, backed by U.S officials, say breaches of U.S. corporate networks from China have not tapered off. The U.S. government makes aggressive use of cyber spying, including against China, but officials say it does not target economic secrets for the benefit of American industry.

On Tuesday, Gen. Keith Alexander, who heads the National Security Agency and U.S. Cyber Command, told a cyber-security summit sponsored by the Reuters news agency that U.S. computer networks are under constant attack, in some cases by those seeking to steal valuable corporate secrets and in other cases by adversaries bent on disrupting or destroying networks. “Mark my words, it’s going to get worse,” Alexander said, according to Reuters. “The disruptive and destructive attacks on our country will get worse and ... if we don’t do something, the theft of intellectual property will get worse.”

Mandiant’s report in February marked the first public airing of detailed evidence linking the Chinese military to a huge cyber-theft campaign. The Los Angeles Times later reported 2007 blog posts by a 25-year-old member of the military unit who boasted of perfecting a tool to infiltrate computer networks that escaped detection by leading antivirus software. Mandiant did not identify the companies targeted by Unit 61398, citing confidentiality agreements with its clients. Bejtlich did not say Wednesday where the unit has resumed its attacks, but he said other China-based groups never stopped stealing Western intellectual property. “They steal a staggering amount of information,” he said.

MORE
 
So they picked a Bagdad Bob MAJOR FAIL label for an operation targeting Israel, one of the world's advanced computer technology countries, who are known hackers themselves? Ha ha ha. Good luck. I mean its not as if every Islamic terrorist shithole country and their cronies haven't already tried to penetrate Israel. Unsuccessfully.

I hope they realize that if they pull anything, not only will it fail, but Israel will find them and make then pay.

True story.
 
Dem Chinamens is hackin' ever'body...
:eek:
Chinese hackers 'compromise' US weapons systems designs
28 May 2013 - Chinese hackers have accessed designs for more than two dozen US weapons systems, a US newspaper has reported.
Designs for combat aircraft, ships and missile defences were among those compromised, a Pentagon paper found, the Washington Post reported. A public version of the same Defense Science Board report said in January that the US was unprepared for a full-scale cyber attack. A Pentagon spokesman said "intrusions" had not eroded its technological edge. The Defense Science Board did not return requests for comment from the BBC.

The Washington Post report comes as Australia discloses Chinese hackers stole floor plans for the new headquarters of its domestic intelligence agency. The compromised US designs include those for advanced Patriot missile systems called PAC-3, an Army anti-missile system known as Thaad, and the Navy's Aegis ballistic-missile defence system, according to the Washington Post. The F/A-18 fighter jet, V-22 Osprey aircraft, Black Hawk helicopter and the Navy's new Littoral Combat Ship were also compromised. The F-35 Joint Strike Fighter, the most expensive weapons system ever built, was also cited on the list.

'Full confidence'

The reports do not describe the extent of the theft, but correspondents say the hack could give China information that could be used against the US in the event of a potential future conflict.

In a statement, US defence department spokesman George Little said the Pentagon maintained "full confidence in our weapons platforms". "The Department of Defense takes the threat of cyber espionage and cyber security very seriously, which is why we have taken a number of steps to increase funding to strengthen our capabilities," he said. "Suggestions that cyber intrusions have somehow led to the erosion of our capabilities or technological edge are incorrect."

BBC News - Chinese hackers 'compromise' US weapons systems designs

See also:

Australian lawmaker confirms China hacked spy base
May 28,`13 - A lawmaker has confirmed the accuracy of a media report that Chinese hackers stole the blueprints of a new Australian spy agency headquarters.
Chinese hackers stole the blueprints of Australia's new spy agency headquarters years ago and the breach has been dealt with since then, an opposition lawmaker said Wednesday in the first confirmation of media reports. "These events did take place some time ago," senior opposition lawmaker George Brandis told Sky News television after a confidential briefing with Australian Security Intelligence Organization officials. "I can say this is a very serious matter; ASIO has dealt with it; beyond that I'm not sure that there's a lot I can say," he added.

The 630 million Australian dollar ($608 million) building housing the headquarters of Australia's main spy agency is near completion in the national capital. Australian Broadcasting Corp. television had reported on Monday night that a cyberattack on a building contractor exposed plans such as communications cabling, server locations and security systems and was traced to a Chinese server. The government has refused to discuss specifics on the matter. When Prime Minister Julia Gillard told Parliament the ABC report was "inaccurate" on Tuesday, she refused to go into any detail. Brandis later demanded and got a confidential briefing with ASIO Director-General David Irvine. And while he wouldn't discuss what was said, he disputed Gillard's statement. "She said the allegations are false; that claim is wrong," Brandis said. The government responded by criticizing Brandis for discussing in the media a confidential security briefing.

The ABC reported that China could use the blueprints to bug the building. Des Ball, an Australian National University cybersecurity expert, told the ABC that given the breach, ASIO would either have to operate with "utmost sensitivity" within its own building or simply "rip the whole insides out and ... start again." But The Australian newspaper reported on Wednesday that the plans were stolen at least three years ago and the agency's operations were no longer at risk. In an unsourced report, the newspaper said the breach occurred in 2009 or 2010. Although construction began in 2008, the discovery of the breach meant that ASIO had the opportunity to alter the designs of the building to reduce the risk of espionage.

More http://ap.stripes.com/dynamic/stori...KERS?SITE=DCSAS&SECTION=HOME&TEMPLATE=DEFAULT
 
Last edited:
"Israelis are disappointed. Expected to see a massive amount of Hackers, but so far, nothing major."


what.gif


You're "disappointed."

what does this mean ??


"...Expected to see a massive amount of Hackers, but so far, nothing major..."



you and "your rebel pals" are "disappointed" nothing "MAJOR" happened ??


here, need a tissue ?? you should wipe that stupid, belligerent smirk off ya face.




"disappointed" that nothing bad happened................. well, that's how i'm interpreting it ? yah ?


ehhhh, (you're a two-faced, squealing, tattletale anyway)....

 

Forum List

Back
Top