-
25 -- Testing the functionality of the Africa and Water story codes
The sovereign citizen movement, the roots of which lie in white separatism and anti-Semitism, now welcomes non-white adherents. Especially susceptible to recruitment efforts by the movement are African Americans – called “Moorish Americans” or “Moorish Natives” by movement members – from poor and neglected neighborhoods.“They are much more reflective of the demographics of society today,” a former FBI case manager notes.
-
-
22 -- Testof Africa and Water codes functionality
Three members of a right-wing militia have been sentenced to twelve years in prison for conspiring to use weapons of mass destruction in attacks against federal government agencies. The defendants planned to attack critical infrastructure in Georgia while motivating militia groups in other states to rise up and join them in removing government officials who they believed had exceeded their Constitutional power. The militia members planned on starting a revolution against the federal government by conducting an attack aimed at the infrastructure supporting the TSA, DHS, and FEMA.
-
-
CybersecurityCombating cyber threats to the global financial industry
Today more than fifteen billion devices are connected to the Internet; in the next five years, that number will grow to fifty billion. With each new device presenting an opportunity to be infiltrated and compromised by hackers, it is easy to understand why the importance of cybersecurity continues to skyrocket. So explained keynote speaker Elizabeth Petrie, director of strategic intelligence analysis for Citigroup, who kicked off a one-day conference at the University of Delaware on cybersecurity issues impacting the global financial industry.
-
-
EncryptionUSMobile launches Scrambl3 mobile, Top Secret communication-standard app
Irvine, California-based USMobile, a developer of private mobile phone services, yesterday launched Scrambl3, a smartphone app that enables users to create their own Private Mobile Network. When Scrambl3 users communicate with each other, Scrambl3 creates a Dark Internet Tunnel between their smartphones. This Tunnel cloaks the calls and texts by making them invisible on the Internet. Scrambl3 App for Android-based phones is available for a 60-day free beta offering from the Google Play Store.
-
-
HackingA growing threat: Car hacking
A string of high-profile hacks — the most recent on President Obama’s personal email account — have made cybercrime an ever-growing concern in the United States. Despite the publicity, most people still think of hacking as something which is done only to information systems like computers and mobile devices. In reality, hacking is no longer confined to the information world. The level of automation in modern physical systems means that even everyday automobiles are now vulnerable to hacking. Researchers are now looking into the growing threat of automotive hacking. “More and more in your everyday life you see that we’re automating physical systems,” one researcher says. “And unlike an information system, a physical system could kill you by accident.”
-
-
CybersecurityOne false tweet sent financial markets into a tailspin
A false tweet from a hacked account owned by the Associated Press (AP) in 2013 sent financial markets into a tailspin. The Dow Jones Industrial Average dropped 143.5 points and the Standard & Poor’s 500 Index lost more than $136 billion of its value in the seconds that immediately followed the post. Once the nature of the tweet was discovered, the markets corrected themselves almost as quickly as they were skewed by the bogus information, but the event, known as Hack Crash, demonstrates the need better to understand how social media data is linked to decision making in the private and public sector.
-
-
AviationHow a hacker could hijack a plane from their seat
Reports that a cybersecurity expert successfully hacked into an airplane’s control system from a passenger seat raises many worrying questions for the airline industry. It was once believed that the cockpit network that allows the pilot to control the plane was fully insulated and separate from the passenger network running the in-flight entertainment system. This should make it impossible for a hacker in a passenger seat to interfere with the course of the flight. But the unfolding story of this hacker’s achievement, which has prompted further investigation by authorities and rebuttals from plane manufacturers, means that this assumption needs to be revisited.
-
-
CybersecurityOngoing attack against oil tankers aims to defraud oil brokers
A new report details a malicious and largely unknown targeted attack on oil tankers. First discovered in January 2014, the ongoing attack on oil cargos began in August 2013, and is designed to steal information and credentials for defrauding oil brokers. Despite having been compromised by this cyber-attack, which has been dubbed the “Phantom Menace,” none of the dozens of affected companies have been willing to report the invasion and risk global attention for vulnerabilities in their IT security networks.
-
-
China syndromeMassive cyberattack by Chinese government hackers on Penn State College of Engineering
The Penn State College of Engineering has been the target of two sophisticated cyberattacks conducted by so-called “advanced persistent threat” actors. The FireEye cybersecurity forensic unit Mandiant, which was hired by Penn State after the breach was discovered, has confirmed that at least one of the two attacks was carried out by a threat actor based in China, using advanced malware to attack systems in the college. In a coordinated response by Penn State, the College of Engineering’s computer network has been disconnected from the Internet and a large-scale operation to securely recover all systems has been launched. On 21 November 2014 Penn State was alerted by the FBI to a cyberattack of unknown origin and scope on the school’s College of Engineering.
-
-
Cyber businessPentagon to invest in Silicon Valley tech startups to help develop advanced cyber solutions
The Pentagon will begin to invest in Silicon Valley tech startups as part of the department’s plan to develop and acquire more advanced cyber solutions to secure the country and military’s digital infrastructure. The investments will be made through In-Q-Tel, a nonprofit strategic investing firm the Central Intelligence Agency launched sixteen years ago. In-Q-Tel does not invest in companies alone, but rather relies on traditional venture firms to partner and contribute the lion’s share of the funding, so having them on board is critical for the program’s success.
-
-
CybersecurityResearchers hack a teleoperated surgical robot, revealing security flaws
Real-world teleoperated robots, which are controlled by a human who may be in another physical location, are expected to become more commonplace as the technology evolves. They are ideal for situations which are dangerous for people: fighting fires in chemical plants, diffusing explosive devices or extricating earthquake victims from collapsed buildings. Researchers conducted a series of experiments in which they hacked a next generation teleoperated surgical robot — one used only for research purposes — to test how easily a malicious attack could hijack remotely controlled operations in the future and to make those systems more secure.
-
-
Cyber businessStates, cities vying to become U.S. “cyber hub”
The global cybersecurity market reached $67 billion in 2011, and it is projected to grow as high as $156 billion by 2019. The need for cybersecurity solutions and experts is going to grow as more companies such as Sony Pictures, Target, Home Depot, and Chase are hacked, consumers demand better online security, and businesses become more aware of the potential cost to their sales and reputation if they do not provide cybersecurity. As private sector firms compete with government agencies for the best cyber professionals, cities and states are also competing to be the country’s “cyber hub.”
-
-
Cyber insuranceInsurance industry wary about insuring Bitcoin companies, transactions
Consumers worldwide are engaging in 100,000 financial transactions every day using Bitcoins. The currency has moved beyond its secretive past and has been embraced by tech firms who are interested in it from a technological perspective and for its investment potential. Venture capital companies have invested more than $670 million worth of Bitcoins into security-related companies. An estimated $3.5 billion worth of Bitcoins are in circulation, 82,000 merchants now accept the currency, and eight million users have set up Bitcoin “wallets” in which they store and manage the currency. As of Monday one bitcoin is worth about $240 U.S. dollars. As a digital currency, Bitcoin is vulnerable to cyber theft — and a s a result, cybersecurity has been a concern among many insurers considering policies that cover Bitcoins.
-
-
CybersecurityLawmakers reintroduce “Aaron’s Law” to curb CFAA abuses
A bipartisan group of lawmakers have reintroduced a bill known as “Aaron’s Law,” which aims to reform the Computer Fraud and Abuse Act (CFAA). CFAA has been cited by civil libertarians (EFF) as having been abused to the point where it now stifles research and innovation, as well as civil liberties. the measure is intended to honor Aaron Swartz, the Reddit co-founder who was apprehended after downloading millions of scholarly articles from a Massachusetts Institute of Technology database in 2011. Following his arrest, with charges under the CFAA which might lead to a maximum sentence of thirty-five years in prison, Swartz committed suicide at age 26, leading some to charge that the aggression of prosecutors led to the his decision.
-
-
CybersecurityBreach of background-checks database may lead to blackmail
Newly released documents show how hackers infiltrated servers used by US Investigations Services(USIS), a federal contractor which conducts background checks for DHS. In a House Oversight and Government Reform Committeehearing last week, Representative Elijah Cummings (D-Maryland) said more than 27,000 personnel seeking security clearances likely were affected by the USIS breach. Similar hacks also affected servers at the Office of Personnel Management(OPM), which holds information on security clearance investigations. Once hackers have a list of employees who possess government security clearances, they can exploit other aspects of those employees’ lives for malicious gain.
-
More headlines
Who's online
The long view
Infrastructure protectionU.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
CybersecurityU.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.