If the account given below is accurate, it will not matter HOW MUCH money the US Govt spends on Cyber Defense. We have bonafide IDIOTS giving away information on “how-to” access secure Govt. data. You cannot FIX STUPID folks. And oh yeah, Iran is now a viable threat. -SF A hacker, who wishes to…
Category: Computer Related
The Espionage Economy
U.S. firms are making billions selling spyware to dictators. By James Bamford Ricardo Martinelli resides in a condo at the Atlantis, a luxury high-rise on Florida’s Biscayne Bay made famous by the TV series Miami Vice. A hefty, white-haired billionaire, Martinelli, 63, was viewed just a few years ago as one of Latin America’s most…
Security Firm Warns of NEW Chinese Cyber Attacks
China is stepping up their game and timeline for War. -SF China’s cyber attacks against U.S. government and private sector databases are part of a major intelligence-gathering operation and are likely to continue, according to a new report by a cyber security firm. Chinese hackers stole health care data pertaining to some 80 million Americans…
Israel: Quietly Rising as a Cyber Super-Power in the Middle East
Israel now has more than 300 cybersecurity companies, exports totaling $6 billion, and 20 percent of the world’s private cyber investment dollars. Cybertech 2016 convened this week in Tel Aviv, and I was in the audience for Prime Minister Benjamin Netanyahu’s plenary address, courtesy of the America-Israel Friendship League and the Israeli Foreign Ministry. Israel has an ambitious…
Sharpen your Cyber-Skills: How to Make Your Own NSA Bulk Surveillance System
OF ALL THE NSA surveillance documents Edward Snowden leaked, some of the most important exposed the spy agency’s so-called XKEYSCORE program, a massive system for vacuuming up and sifting through emails, chats, images, online search activity, usernames and passwords, and other private digital data from core fiber optics cables around the world. XKEYSCORE, which the…
Sharpen Your Cyber-Skills: NSA Hacker Chief Explains How to Keep Him OUT of Your System
IT WAS THE talk most anticipated at this year’s inaugural Usenix Enigma security conference in San Francisco and one that even the other speakers were eager to hear. Rob Joyce, the nation’s hacker-in-chief, took up the ironic task of telling a roomful of computer security professionals and academics how to keep people like him and his…
Device OPSEC: If You Use an LG Device, Read This!
Millions of LG phones at risk, Israeli team discovers For the second time in a month, researchers at cyber-security firms BugSec and CyNet have discovered a major security problem that leaves tens of millions of users at risk For the second time in a month, an Israeli team has uncovered a major security breach built…
Chinese Military Revamps Cyber and Intelligence Capabilities
This story reminds me of Paul Newman’s famous line in the scene from Cool Hand Luke where the “Road Boss” with the Mirror sun glasses Shoots a bird flying with a rifle with one shot: “That man don’t say much, but I think he just said something right there….” The Chinese are continuously making statements…
Humor: New DOD Regulations Confirm that OPSEC Does Not Apply to Everyone
I always get a kick out of the Duffel Blog. This is what Everybody is thinking and this is what should be printed versus the spin and outright lies. -SF THE PENTAGON — The Department of Defense is set to release new security rules later this week, making it clear that consequences for violations don’t apply…
Singularity- Future Tense or Tense Future?
A Sci-Fi short story about homeland security at the edge of humanity Singularity Secretary Turing was still half asleep, restlessly tossing in bed, trying to shake the visceral angst she had been building up throughout the night. She was somnolent enough to continue her dream yet awake enough to realize it was rapidly becoming…