IT WAS 3:30 p.m. last December 23, and residents of the Ivano-Frankivsk region of Western Ukraine were preparing to end their workday and head home through the cold winter streets. Inside the Prykarpattyaoblenergo control center, which distributes power to the region’s residents, operators too were nearing the end of their shift. But just as one…
Category: Cyber-Warfare
Why You Should More Afraid of Apple than the Feds
I know I suggest this book alot, but you need to read Future Crimes by Marc Goodman. It will absolutely open your eyes to how companies like Apple, Microsoft and the thousands of other Data Brokers out there COLLECT your personal, private information and then treat it as a valuable commodity to be bought and…
Cyber-Security: Googles New “Neural Network” can Locate the Location of any Photo on the Web
For those of you that are “seasoned” Science Fiction fans like myself, perhaps you remember the movie 2001: A Space Odyssey and the HAL Computer? Yeah this “neural network” called PLaNET kinda reminds me of that…unsettling in a way, no? -SF Here’s a tricky task. Pick a photograph from the Web at random. Now…
Why You Should Side With Apple and Not the FBI in the San Bernardino I-Phone Case
I have the utmost respect for Bruce. The man knows his stuff and is the final word in topics of this sort. -SF By Bruce Schneier Earlier this week, a federal magistrate ordered Apple to assist the FBI in hacking into the iPhone used by one of the San Bernardino shooters. Apple will fight this order…
Cyber-Warfare: Nitro-Zeus
A new documentary on “Stuxnet”, the joint U.S.-Israeli attack on Iran’s nuclear program, reveals it was just a small part of a much bigger cyber operation against the nation’s military and civilian infrastructure under the code name “NITRO ZEUS” The United States hacked into critical civilian and military infrastructure in Iran to allow its operatives…
Seven Ways Crowd-Sourcing is Changing Society
I highly Recommend everybody read the book Future Crimes by Marc Goodman to get an in-depth look at how deep this cyber rabbit hole really goes. And really read those “Service Agreements” and “Privacy Statements” before you download that next free app!-SF The term was coined in 2005 when businesses began attempting to gather data…
Hacker Plans to Dump Alleged Details of 20K FBI and 9K DHS Employees
If the account given below is accurate, it will not matter HOW MUCH money the US Govt spends on Cyber Defense. We have bonafide IDIOTS giving away information on “how-to” access secure Govt. data. You cannot FIX STUPID folks. And oh yeah, Iran is now a viable threat. -SF A hacker, who wishes to…
The Espionage Economy
U.S. firms are making billions selling spyware to dictators. By James Bamford Ricardo Martinelli resides in a condo at the Atlantis, a luxury high-rise on Florida’s Biscayne Bay made famous by the TV series Miami Vice. A hefty, white-haired billionaire, Martinelli, 63, was viewed just a few years ago as one of Latin America’s most…
Security Firm Warns of NEW Chinese Cyber Attacks
China is stepping up their game and timeline for War. -SF China’s cyber attacks against U.S. government and private sector databases are part of a major intelligence-gathering operation and are likely to continue, according to a new report by a cyber security firm. Chinese hackers stole health care data pertaining to some 80 million Americans…
Can China be Deterred in Cyber-Space?
Deterring state actors from attacks that do not reach the level of force is difficult. If we look at the cyber realm, the effectiveness of deterrence depends on who (state or non-state) one tries to deter and which of their behaviors. Ironically, deterring major states like China from acts of force may be easier than…