10 Responses to Pentagon lays out U.S. policy in preparation for cyber warfare

  1. Amy P. says:

    Is this like the time Dept_of_Homeland_Sec. shut down those websites that were a “threat” when they sold knock-off designer handbags and watches? Oooh! (sarc)
    I wonder what makes something a “hostile act(s) against the US”?

    Like

  2. Donna says:

    It’s funny, if all the other countries held this same view: “We reserve the right to use all necessary means – diplomatic, informational, military and economic – to defend our nation, our allies, our partners and our interests”…then there’d be nothing but war, especially with counrties that hold extreme and violent views. The end does not justify the means.

    Like

  3. John Macleod says:

    Why Tallinn? this isn’t explained and has left me exploring the possibilities as to why.

    Like

  4. Ken says:

    Isn’t this like closing the door after the cat runs out?

    Like

  5. Irene C says:

    I wonder what they would constitute a “hostile act”?

    Maranatha

    Like

  6. Kwazai says:

    they just don’t get it.
    if they are connected then they are vulnerable. I have yet to see a virus put the plug in the receptacle..mo money….
    Mike

    Like

  7. Tim says:

    The Pervasive Cyber threat that Goes unchallenged
    A recent Defense Department report to Congress warned that foreign nations run a “grave risk” if they threaten or launch a large-scale cyber attack on the United States, and it announced for the first time that the Pentagon possesses cyber weapons the president can deploy in the face of such an attack. The report aims to bolster U.S. deterrence against cyber threats but, in fact, highlights weaknesses in our deterrence policy.
    http://www.washingtonpost.com/opinions/the-insidious-cyberthreat-that-goes-unreported/2011/11/25/gIQAKXdIxN_story.html

    U.S. Seizes Domain Names in Counterfeit Crackdown
    US authorities have shut down a number of websites in the latest crackdown on online trafficking in counterfeit goods. Torrent Freak, a website about the popular BitTorrent file-sharing protocol, said that more than 130 domain names had been seized in an operation it described as the largest yet. Torrent Freak published a list of 131 domain names which it said had been seized in the past 24 hours. A visitor to the sites is met with a message reading: “This domain name has been seized by ICE — Homeland Security Investigations, pursuant to a seizure warrant issued by a United States District Court.” It informs visitors that copyright infringement is a federal crime carrying a penalty of five years in prison and a $250,000 fine, while trafficking in counterfeit goods carries a 10-year sentence and a $2 million dollar fine. The seizure of the websites, part of a campaign known as “Operation in Our Sites,” comes just a few days ahead of Cyber Monday, the busiest online shopping day of the year in the United States.
    http://www.bangkokpost.com/news/asia/268012/us-seizes-domain-names-in-counterfeit-crackdown

    Britain Prepares Cyber Attacks on Rogue States
    GCHQ and the Ministry of Defense are preparing to launch cyber attacks against hostile states and terrorists, the Government has admitted. Two separate units in the Defense Cyber Operations Group are working on an offensive capability to strike back at enemies who are trying to start electronic attacks on critical national infrastructure. They are also likely to come up with computer programs that could disable the conventional or nuclear capabilities of hostile nations. Unveiling the “cyber security strategy”, David Cameron said: “While the internet is undoubtedly a force for social and political good, as well as crucial to the growth of our economy, we need to protect against the threats to our security.”
    http://www.telegraph.co.uk/news/uknews/defence/8916960/Britain-prepares-cyber-attacks-on-rogue-states.html

    Like

  8. Tim says:

    Southeast Asia: First UN-Backed Simulation of Cyber Attack Takes Place in South-East Asia:
    Mass web destruction, spam and malware infection were among the scenarios involved during the first cross-border cyber drill organized by the United Nations and an international partnership against online threats in South-east Asia that aims to build cooperation and improve response measures to cyber attacks. The drill, launched by the UN International Telecommunication Union (ITU) and the International Multilateral Partnership Against Cyber Threats (IMPACT), was a coordinated exercise to assess the security and emergency readiness of Cambodia, Laos, Myanmar and Viet Nam, also known as the CLMV countries. Each country had a team participating in three simulated cyber security emergency incidents. Teams were required to identify the origin of the attacks, identify possible solutions and mitigation steps, and rectify the damage. The one-day exercise then simulated a cyber attack response linking the response systems of the four countries known as Computer Emergency Response Team/Computer Incident Response Teams (CERT/CIRT), as well as experts from ITU and IMPACT.

    http://www.un.org/apps/news/story.asp?NewsID=40605&Cr=cyber&Cr1=

    Like

  9. Tim says:

    **US: Hackers Post Cops Personal Data to Avenge Occupy Movement:
    Computer hackers are avenging the Occupy movement by exposing the personal information of police officers who evicted protesters and threatening family-values advocates who led a boycott of an American Muslim television show. In three Internet postings last week, hackers from the loose online coalition called Anonymous published the email and physical addresses, phone numbers and, in some cases, salary details of thousands of law enforcement officers all over the country. The hackers said they were retaliating for police violence during evictions of Occupy protest camps in cities around the country, but law enforcement advocates slammed the disclosures as dangerous. Last week, a hacker calling himself “Exphin1ty” posted the email and physical addresses, phone numbers and encrypted passwords of more than 2,400 police officers and corporate security executives.

    http://www.washingtontimes.com/news/2011/dec/20/hackers-post-cops-personal-data-online/

    **US: China Hackers Hit U.S. Chamber:
    A group of hackers in China breached the computer defenses of America’s top business-lobbying group and gained access to everything stored on its systems, including information about its three million members, according to several people familiar with the matter. The break-in at the U.S. Chamber of Commerce is one of the boldest known infiltrations in what has become a regular confrontation between U.S. companies and Chinese hackers. The complex operation, which involved at least 300 Internet addresses, was discovered and quietly shut down in May 2010. It isn’t clear how much of the compromised data was viewed by the hackers. Chamber officials say internal investigators found evidence that hackers had focused on four Chamber employees who worked on Asia policy, and that six weeks of their email had been stolen. It is possible the hackers had access to the network for more than a year before the breach was uncovered, according to two people familiar with the Chamber’s internal investigation. One of these people said the group behind the break-in is one that U.S. officials suspect of having ties to the Chinese government. The Chamber learned of the break-in when the Federal Bureau of Investigation told the group that servers in China were stealing its information, this person said. The FBI declined to comment on the matter.

    http://online.wsj.com/article/SB10001424052970204058404577110541568535300.html

    Like

  10. Tim says:

    1-20-2012
    Hackers take down US government websites
    Hacking collective Anonymous shut down the Department of Justice’s website Thursday, along with those of several other organizations that support anti-piracy efforts.

    Among the victims: Universal Music Group, the Motion Picture Association of America (MPAA), the Recording Industry Association of America (RIAA) and the US Copyright Office.
    http://www.jpost.com/International/Article.aspx?id=254475

    Like

All comments are moderated. We reserve the right not to post any comment deemed defamatory, inappropriate, or spam.

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s