Cyber Threat SA for 20AUG2013

Good Tuesday morning Folks –

Much cyber news and situational awareness(SA) to take note of today…of mention is the extensive plan by the People’s Republic of China to increase bandwidth to consumers throughout the Middle Kingdom…Apple & Samsung get no love in China…Corruption in China’s State Owned Enterprise (SOE) China Mobile…

We also have a few stories on the Islamic Republic of Iran’s cyber plans and methodologies…ph yes, don’t forget about North Korean and Pakistan too.., for a complete discussion on the nation states – you really should view and apply to join their respective LinkedIn discussion Groups….
http://www.linkedin.com/groups/Iranian-Cyber-Warfare-4217323?trk=myg_ugrp_ovr and http://www.linkedin.com/groups/North-Korean-Cyber-Warfare-4223285?trk=myg_ugrp_ovr….

Enjoy tomorrow’s cyber news today…

Cyber – the good, the bad and the bug-free
http://www.nato.int/docu/review/2013/Cyber/EN/

中國人民共和國

China’s Report on US Military Cyber Troop Strength
http://goo.gl/0ouvjn
Broadband blueprint to facilitate China’s economic restructuring – Xinhua | English.news.cn |
http://news.xinhuanet.com/english/indepth/2013-08/19/c_132643900.htm
BEIJING: People’s Republic of China in big push against opinion-leading blogs – Technology
http://www.miamiherald.com/2013/08/19/3571859/china-in-big-push-against-opinion.html
Chang meets Hagel for Sino-US Pentagon talks
http://www.scmp.com/news/china/article/1297773/chang-meets-hagel-sino-us-pentagon-talks
Pacifying the Maoists
http://www.economist.com/blogs/analects/2013/08/bo-xilai-s-trial
Chinese Politiks…Blasts from the past
http://www.economist.com/blogs/analects/2013/08/chinese-politics
Degrees of Uncertainty in the People’s Republic of China’s Future –
http://english.caixin.com/2013-08-17/100571121.html

People’s Republic of China’s Huawei offends Pakistan with independence day message
http://www.techinasia.com/huawei-steps-political-minefield-independence-day-message-pakistan/?\
Yahoo’s email service is now closed in People’s Republic of China
http://www.techinasia.com/yahoo-china-email-service-now-shut/?
This new startup connects developers with China’s multitude of Android app stores
Significant cyber avenues of approach…

http://www.techinasia.com/appinchina-distributes-apps-to-top-china-android-app-stores/?
Philippines, Taiwan Conflict Results in Cyber Firefight | Analysis Intelligence
http://analysisintelligence.com/cyber-defense/philippines-taiwan-cyberwar/
China Steps Up Anti-Monopoly Probe in Oil and Telecom中国掀反垄断风暴 央企无豁免权_财经频道_一财网
http://www.yicai.com/news/2013/08/2942628.html
Another China Mobile Exec Investigated on Suspicion of Corruption –
http://english.caixin.com/2013-08-19/100571515.html
People’s Republic of China’s Alibaba Buys Stake in U.S. Online Vendor 阿里巴巴投资美国电商 “国际化”增加估值_财经频道_一财网
http://www.yicai.com/news/2013/08/2948460.html
People’s Republic of China’s Lenovo Continues Inexorable Rise Towards World Domination
http://www.ibtimes.co.uk/articles/499290/20130815/lenovo-continues-inexorable-rise-towards-world-domination.htm
Chinese consumers losing interest in Apple and Nokia and turn to Samsung and domestic brands
http://www.phonearena.com/news/Chinese-consumers-losing-interest-in-Apple-and-Nokia-and-turn-to-Samsung-and-domestic-brands_id46531?
Baidu Deal May Reduce App Piracy in the People’s Republic of China
http://www.nytimes.com/2013/08/19/business/global/baidu-deal-may-reduce-app-piracy-in-china.html?
US probes JP Morgan China staff
http://www.bbc.co.uk/news/business-23750199

Liaoning will serve as the commanding ship of PLA Navy:…
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130819000007&cid=1101

Not Really Made in China (or the United States)
http://economix.blogs.nytimes.com/2013/08/19/not-really-made-in-china-or-the-united-states/?

Cyber Security in South Korea: The Threat Within
http://thediplomat.com/2013/08/19/cyber-security-in-south-korea-the-threat-within/?all=true

Blogs begin to play a prominent political role | Russia
http://rbth.ru/politics/2013/08/19/blogs_begin_to_play_a_prominent_political_role_29015.html

MTNL’s Mumbai website hacked by Pakistani hacker:
http://www.ibtimes.co.in/articles/499648/20130817/mtnl-website-cyber-attack-pakistan-hacker-india.htm

The Convenient Timing of Iran-Linked Hacker Operations | Analysis…
http://analysisintelligence.com/cyber-defense/iran-linked-cyber-teams/?
Iran’s Top Diplomat to Take Key Nuclear Complex Post |
http://www.nti.org/gsn/article/irans-top-diplomat-takes-key-nuclear-post/
CIA Confirms Role in 1953 Iran Coup
Documents Provide New Details on Mosaddeq Overthrow and Its Aftermath
http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB435/

Al-Qaida Members Seen Using Chat Rooms to Plan Attacks |
http://www.nti.org/gsn/article/al-qaida-members-seen-using-chat-rooms-plan-attacks/

U.S. Dept. of Energy reports second security breach
http://www.csoonline.com/article/738230/u.s.-dept.-of-energy-reports-second-security-breach?
U.S. power plants, utilities face growing cyber vulnerability
http://www.homelandsecuritynewswire.com/dr20130819-u-s-power-plants-utilities-face-growing-cyber-vulnerability
Cyber security economics like a Ponzi scheme: Gartner
http://www.techworld.com.au/article/524067/cyber_security_economics_like_ponzi_scheme_gartner/?
ZeuS-P2P internals – understanding the mechanics: a technical report
http://www.cert.pl/news/7386/langswitch_lang/en
A Closer Look: Perkele Android Malware Kit — Krebs on Security
http://krebsonsecurity.com/2013/08/a-closer-look-perkele-android-malware-kit/
DIY automatic cybercrime-friendly ‘redirectors generating’ service spotted in the wild
http://blog.webroot.com/2013/08/19/diy-automatic-cybercrime-friendly-redirectors-generating-service-spotted-in-the-wild/

Enjoy!

Semper Fi,

謝謝
紅龍

China’s Report on US Military Cyber Troop Strength

(紅龍) Red Dragon’s statement: If you think you are paying too much for cyber threat intelligence and your current provider DID NOT SHOW this Chinese article to youthen you have paid too much for the incorrect type of Chinese Cyber Threat Intelligence…

Contact the Red Dragon (紅龍) @ MicroSolved, save money, stay better informed – find a capable cyber intelligence authority for less, much less….

whagestad@microsolved.com

謝謝您

紅龍

People’s Republic of China Report: U.S. network warfare unit’s equivalent to 7 over 8 million people equal to the 101st Airborne Division

At 08:49 on August 15, 2013 Source: Phoenix

Core Tip : According to Sing Tao Global Network reported that the U.S. share of global 29% of the number of hackers, the U.S. military about 3000-5000 information warfare experts, and 50000-70000 cyberwar soldiers, together with the original electronic warfare officer , the U.S. network warfare units should have eighty-eight thousand seven hundred people, the scale is equivalent to seven 101st Airborne Division, which will burden future wars weakened the enemy four into combat missions.

Phoenix August 14 “military observation room”, the following is the text Record:

Commentary: Snowdon event causes a foreign media speculation, in fact, the United States first established the largest network warfare units, the development of the world’s most advanced network warfare equipment, and bringing it to actual combat. Recently, the Sing Tao Global Network reported that the U.S. share of global 29% of the number of hackers, the U.S. military about 3000-5000 information warfare experts, and 50000-70000 cyberwar soldiers, together with the original electronic warfare officer, U.S. Army network warfare units should have eighty-eight thousand seven hundred people, the scale is equivalent to seven 101st Airborne Division, which will burden future wars to weaken the enemy four combat missions.

U.S. network army of four thousand people, the world’s top computer experts and hackers, including the CIA, NSA, FBI and other sector experts, all members of the average IQ of 140 or more, known as 140 troops from American four-star general Alexander lasted eight single-handedly built his independent command of the Tenth Fleet, including the Navy, the Air Force 24th Air Force and the Army Second Army, responsible for the training of the academic elite spy technology centers, as well as specialized eavesdropping embassies around the world special data collection center, the United States is being set up forty network security forces, including 13 as offensive forces, the main development network warfare weapons, another 27 troops mainly to protect DoD computer systems and data, all 40 teams will branch to be completed before the autumn of 2015.

“Military observation room” program broadcast in the Phoenix Chinese Channel ] [Program Area

Moderator: Dong Jiayao Moderator Zone]

First time: (Wednesday) 21:50-22:30

Playback time: (Thursday) 04:10-04:50,15:15-15:55

Statement : where marked “Phoenix” sources of work (text, audio, video), without the Phoenix authorization, any media, and individuals shall not be reproduced, link, posted or otherwise use; already authorized in writing by the webmaster at use must be marked “Source: Phoenix.” Violate the above statement, Ben Wang will pursue its legal responsibilities.

 美國網路戰部隊逾8萬人 相當於7101空降師20130815 08:49

來源:鳳凰衛視

核心提示:據星島環球網報道,美國駭客數量佔全球29%,美軍約有三千到五千名資訊戰專家,及五萬到七萬名網路戰兵,加上原有的電子戰人員,美軍網路戰部隊應該有八萬八千七百人,這個規模相當於七個101空降師,它在未來戰爭將負擔削弱敵人四成戰鬥力的任務。

鳳凰衛視8月14日《軍情觀察室》,以下為文字實錄:

解說:斯諾登事件引起中外媒體一輪炒作,其實美國最早建立規模最大的網路戰部隊,發展了世界最先進的網路戰裝備,並將其推向實戰。近日,星島環球網報道,美國駭客數量佔全球29%,美軍約有三千到五千名資訊戰專家,及五萬到七萬名網路戰兵,加上原有的電子戰人員,美軍網路戰部隊應該有八萬八千七百人,這個規模相當於七個101空降師,它在未來戰爭將負擔削弱敵人四成戰鬥力的任務。

美國網軍達四千人,由世界頂級電腦專家和駭客組成,包括中央情報局、國家安全局、聯邦調查局以及其他部門的專家,所有成員平均智商在140以上,稱為140部隊,由美國四星上將亞歷山大歷時八年一手打造,他獨立指揮權包括海軍第十艦隊,空軍第24航空隊以及陸軍第二軍,負責培訓間諜技術的學術精英中心,以及專門竊聽世界各國大使館的特殊數據收集中心,美國正在組建四十支網路安全部隊,其中13支為進攻性部隊,主要開發網路戰武器,另外27支部隊主要保護國防部的電腦系統和資料,所有40支部隊將於2015年秋季前全部建成。

《軍情觀察室》節目在鳳凰衛視中文臺播出【節目專區】

http://big5.ifeng.com/gate/big5/phtv.ifeng.com/program/jqgcs/

主持人:董嘉耀【主持人專區】

首播時間:(週三)21:50-22:30

重播時間:(週四)04:10-04:50,15:15-15:55

聲明:凡註明“鳳凰網”來源之作品(文字、音頻、視頻),未經鳳凰網授權,任何媒體和個人不得轉載、鏈結、轉貼或以其他方式使用;已經本網書面授權的,在使用時必須註明“來源:鳳凰網”。違反上述聲明的,本網將追究其相關法律責任。

 http://big5.ifeng.com/gate/big5/phtv.ifeng.com/program/jqgcs/detail_2013_08/15/28642074_0.shtml

Global Cyber SA for MON 19AUG2013

Good Monday morning folks;

Tremendous amount of cyber news from around the globe today – enjoy…

The first section has a rather lengthy series of stories related to the People’s Republic of China…including hacking, cuber warfare, the economy, and cyber crime…please take a look at the ‘cyber-mainia’ section which really illustrates the prevailing calm before the cyber storm…

Enjoy!

People’s Republic of China’s “Warfare” Strategies and Tactics
http://thediplomat.com/2013/08/16/chinas-warfare-strategies-and-tactics/?all=true

Don’t Buy the Cyberhype
How to Prevent Cyberwars From Becoming Real Ones
http://www.foreignaffairs.com/articles/139819/martin-c-libicki/dont-buy-the-cyberhype?page=show
Cyberwar Is Mostly Bunk
http://reason.com/archives/2013/08/16/cyberwar-is-mostly-bunk
Cyberwar: nerds to the front! | World | DW.DE | 08.08.2013
http://www.dw.de/cyberwar-nerds-to-the-front/a-17004851
The Changing and Terrifying Nature of the New Cyber-Warfare
http://www.vanityfair.com/culture/2013/07/new-cyberwar-victims-american-business?mbid=social_retweet?mbid=social_mobile_tweet
The cyberwar against the media
http://www.politico.com/story/2013/08/the-cyberwar-against-the-media-95527.html

US Facing Barriers in Cyber Talks with People’s Republic China…
No kidding…no one in USGOV careerland (e,g, Painter) speaks or understands…信 息作战, 網絡戰, 网 络战 or 信 息战争…

http://www.defensenews.com/article/20130813/DEFREG02/308130008/US-Facing-Barriers-Cyber-Talks-China
Chinese government evaluating IBM, Oracle, EMC for security risks | Electronista
http://www.electronista.com/articles/13/08/15/move.by.ministry.of.public.security.response.to.prism.huawei.allegations/
How to protect yourself when outsourcing to China
http://online.wsj.com/article/SB10001424127887323681904578639461757495312.html?
Baidu Deal May Reduce App Piracy in China
http://www.nytimes.com/2013/08/19/business/global/baidu-deal-may-reduce-app-piracy-in-china.html?_r=0&pagewanted=all
IBM, Oracle, EMC Targeted In People’s Republic of China Security Probe: Report
The cyber tech cold war continues….

http://www.ibtimes.com/ibm-oracle-emc-face-probe-china-over-security-concerns-chinese-media-report-1388071?ft=a73y7
Goldman, Morgan Stanley in talks to buy stake in People’s Republic of China’s Huarong: FT
http://www.reuters.com/article/2013/08/16/us-huarong-china-idUSBRE97F08Y20130816

Will Lockheed Martin Risk People’s Republic of China’s Wrath by Supplying 66 F-16s to Taiwan? (LMT)
http://www.fool.com/investing/general/2013/08/18/will-lockheed-martin-supply-66-f-16s-to-taiwan.aspx
30 Boeing Attack Helicopters Headed for Taiwan (BA)
http://www.fool.com/investing/general/2013/08/18/30-boeing-attack-helicopters-headed-for-taiwan.aspx

People’s Republic of China’s voyage of discovery to cross the less frozen north
http://www.theguardian.com/world/2013/aug/18/china-northeastern-sea-route-trial-voyage

Are Chinese Hackers Really From China?
http://hacksurfer.com/amplifications/210-are-chinese-hackers-really-from-china?

Network-Centric Warfare in Asia
http://www.isn.ethz.ch/Digital-Library/Articles/Detail/?lng=en&id=167921

China’s New “Secret Stimulus” Program: Likonomics Is Dead
http://www.forbes.com/sites/gordonchang/2013/08/18/chinas-new-secret-stimulus-program-likonomics-is-dead/

People’s Republic of China Says Broadband Speeds Of 20 Mbps By 2015
http://www.forbes.com/sites/kenrapoza/2013/08/18/china-says-broadband-speeds-of-20-mbps-by-2015/

Ethiopia signs mobile expansion deal with People’s Republic of China’s ZTE
http://www.foxnews.com/world/2013/08/18/ethiopia-signs-mobile-expansion-deal-with-china-zte/?

China’s Everbright probed over share spike | Reuters
http://uk.reuters.com/article/2013/08/18/china-everbright-idUKL4N0GJ05K20130818?
People’s Republic of China Everbright Bank joins hands with telecom giant in mobile finance – Xinhua
http://news.xinhuanet.com/english/china/2013-08/18/c_132641264.htm
People’s Republic of China expects nationwide broadband by 2020 – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-08/17/c_132639104.htm
IT key to economic future: State Council – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-08/15/c_132633025.htm
Efforts stepped up to curb fraudulent ID card use – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-08/15/c_132632856.htm
Agency fails to disclose full evaluation of China’s state-run firms|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130814000084&cid=1502

‘United Asean will try to convince China on sea code of conduct’ |
http://www.thejakartapost.com/news/2013/08/19/united-asean-will-try-convince-china-sea-code-conduct.html

N.Korea’s Vast Cyber Warfare Army
http://english.chosun.com/site/data/html_dir/2013/08/13/2013081300891.html
“IDF 8200 (cyberwar unit) is the best technology school on earth”
http://www.opednews.com/articles/IDF-8200-cyberwar-unit–by-Joseph-Zernik-130816-906.html

Gen. Dempsey: U.S. military options against Iran “better” than last year
http://www.homelandsecuritynewswire.com/dr20130815-gen-dempsey-u-s-military-options-against-iran-better-than-last-year

Threshold for kinetic response to cyber higher than for physical attack
http://www.fiercegovernmentit.com/story/threshold-kinetic-response-cyber-higher-physical-attack-says-paper/2013-08-15

“Estimating the cost of cyber crime and espionage”
http://outsidelens.scmagazine.com/video/Estimating-the-Cost-of-Cyber-Cr;recent
Cyber criminals add new exploit for recently patched Java vulnerability to their arsenal
http://images.infoworld.com/d/security/cyber-criminals-add-new-exploit-recently-patched-java-vulnerability-their-arsenal-225058?

Industrial control ‘honeypots’ show systems are under attack
http://gcn.com/articles/2013/08/07/ics-honeypots.aspx

Researchers Seek Better Ways To Track Malware’s Family Tree
http://m.darkreading.com/133696/show/feee44982d70974da336f56262ce9c84/?

Encryption is less secure than we thought
For sixty-five years, most information-theoretic analyses of cryptographic systems have made a mathematical assumption that turns out to be wrong.

http://www.homelandsecuritynewswire.com/dr20130815-encryption-is-less-secure-than-we-thought

Semper Fi,

謝謝
紅龍

China & Global Cyber SA for 16AUG2013

Good Friday Everyone!

What sort of cyber situation awareness do we have today? Much news about the People’s Republic of China – it is relentless…we now have Frutas and news of other exploits taking advantage of poorly secured systems and infrastructure…

Enjoy!

China China China hack hack hack redux | Beyond The Beyond | Wired.com
http://www.wired.com/beyond_the_beyond/2013/08/china-china-china-hack-hack-hack-redux-2/
NY Times website down for HOURS. Hacked by People’s Republic of Hacking…err…China again?
http://blogs.computerworld.com/ny-times-website-down-hacked-china-22652-itbwcw
They’re ba-ack: Hacker gang that infiltrated NYT for months returns
http://arstechnica.com/security/2013/08/theyre-ba-ack-hacker-gang-that-infiltrated-nyt-for-months-returns/
The Chinese hacker group that hit the N.Y. Times is back with updated tools
The APT 12 hacker group has updated its malware programs to evade network-level detection

http://www.computerworld.com/s/article/9241577/The_Chinese_hacker_group_that_hit_the_N.Y._Times_is_back_with_updated_tools?taxonomyId=17

Frutas RAT…Targeted Attacks Delivering Fruit |
http://www.symantec.com/connect/blogs/targeted-attacks-delivering-fruit
8,700 Chinese detained for online crime–China Economic Net
http://en.ce.cn/National/Politics/201308/14/t20130814_1186553.shtml
Information consumption to fuel People’s Republic of China’s economic growth – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-08/15/c_132633835.htm
All the facts and stats on the People’s Republic of China’s 591 million web users (INFOGRAPHIC)
http://www.techinasia.com/china-591-million-web-users-infographic-2013/?
Merger spree hits People’s Republic of China’s Internet giants–China Economic Net
http://en.ce.cn/Insight/201308/15/t20130815_1221087.shtml
People’s Republic of China: Language and Censorship in State Media – China Digital Times (CDT)

Language and Censorship in State Media


The new president’s “rule of law” campaign apparently doesn’t apply to the Communist Party.
http://www.globalpost.com/dispatch/news/regions/asia-pacific/china/130813/no-james-madisons-here-china-arrests-dozens-citizens

People’s Republic of China could target oil firms, telecoms, banks in price probes: report
http://www.reuters.com/article/2013/08/15/us-china-antitrust-ndrc-idUSBRE97E04U20130815
People’s Republic of China’s Lenovo Sells More Mobiles Than PCs Now As It Rides High On Chinese Demand | TechCrunch

Lenovo Sells More Mobiles Than PCs Now As It Rides High On Chinese Demand


New iPhone, 4G technology may mean Apple, China Mobile tie-up closer
http://www.reuters.com/article/2013/08/14/us-chinamobile-apple-idUSBRE97D18Y20130814
WeChat passes 100 million users outside the People’s Republic of China =Hacker Force Multiplier…
http://www.telegraph.co.uk/technology/10244264/WeChat-passes-100-million-users-outside-China.html
HTC Changes China Chief
http://blogs.wsj.com/digits/2013/08/15/htc-changes-china-chief/?

Guam to host security conference: National experts and intelligence analysts to discuss US, Asia strategies
http://www.guampdn.com/article/20130815/NEWS01/308150006/1002/NEWS01

Western defense firms refuse Chinese buyers to deter copycats|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130815000117&cid=1101

People’s Republic of Chain’s PetroChina poised to dominate Iraqi oil–China Economic Net
OIL = Operation Iraqi Liberation

http://en.ce.cn/Business/Enterprise/201308/14/t20130814_1186662.shtml

People’s Republic of China’s banking assets top 23 trln USD by June 2014 –China Economic Net
http://en.ce.cn/Industries/Financial-services/201308/14/t20130814_1187002.shtml
People’s Republic of china’s Zhongguancun may host private bank–China Economic Net
http://en.ce.cn/Industries/Financial-services/201308/14/t20130814_1187005.shtml

The Trauma of Colonialism…People’s Republic of China says”Now it is China’s prerogative”
Operation Middle Kingdom = People’s Republic of China’s colonization of the West…

http://www.nytimes.com/2013/08/15/opinion/global/the-trauma-of-colonialism.html?

People’s Republic of China probe into optical fibers from India–China Economic Net
http://en.ce.cn/Business/ti/201308/15/t20130815_1224772.shtml

Taiwanese firm faces patent infringement probe in US|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1204&MainCatID=12&id=20130623000023

People’s Republic of China strongly condemns Japan over shrine visit – Xinhua |
http://news.xinhuanet.com/english/china/2013-08/15/c_132633571.htm
People’s Republic of China urges Japan to respect victims of wartime ‘aggression’ –
http://english.sina.com/china/2012/0815/496714.html
Beijing urges Japan to reflect on wartime aggression|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1101&MainCatID=11&id=20130815000153
Taiwan urges Japan not to hurt feelings of its neighbors|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1101&MainCatID=11&id=20130815000144
Right-wing Japan challenging postwar order, experts warn|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1101&MainCatID=11&id=20130815000141

Iranian Internet Infrastructure and Policy Report
http://smallmedia.org.uk/IIIPJune.pdf
Syrian Electronic Army Hacks Washington Post
http://www.security-vision.co.uk/?p=3456&doing_wp_cron=1376589588.6183819770812988281250

IT Security Industry To Expand Tenfold
http://www.forbes.com/sites/richardstiennon/2013/08/14/it-security-industry-to-expand-tenfold/
Aggressive defence needed against cyber threats…from Canada no less…
http://www.ottawacitizen.com/news/Aggressive+defence+needed+against+cyber+threats+expert+says/8789398/story.html

Browlock Ransomware Targets New Countries –
http://www.f-secure.com/weblog/archives/00002590.html
Researchers figure out how to hack tens of thousands of servers
http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/14/researchers-figure-out-how-to-hack-tens-of-thousands-of-servers/

How A ‘Deviant’ Philosopher Built Palantir, A CIA-Funded Data-Mining Juggernaut
http://www.forbes.com/sites/andygreenberg/2013/08/14/agent-of-intelligence-how-a-deviant-philosopher-built-palantir-a-cia-funded-data-mining-juggernaut/

Latest NSA Archive Release…The Secret History of the U-2 & other treats…
1) US Spy Planes Targeted China to Help India; Used British Crews to “Confuse the Soviets” and Overflew French Nuclear Sites
2) Groom Lake/Area 51 Finally Declassified
Less Redacted CIA History Released Under FOIA
3) National Security Archive Electronic Briefing Book No. 434

http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB434/

Enjoy my curious friends!!!

Semper Fi,

謝謝
紅龍

15AUG…Tomorrow’s Cyber SA Today…People’s Republic of Hacking…

Good morning Folks –

It’s Mid-August 2013 and the our news from cyber-land today the 15th of AUG 2013 is relentless – pay particular attention to the blossoming new of the People’s Republic of China’s Operation Middle Kingdom…

Look also for the Firewalls and Firefight article below – great stuff!

Of mot curious news is the firm Booz Allen Hamilton, who gave us the United States, our latest traitor, was awarded $6 B-EEE-LLION USD for a contract to secure our country – does anyone else think that is simply ridiculous….?

Enoy!

People’s Republic of China ~ 中華人民共和國

People’s Republic of China Asks: Who gave America the right to launch network assaults? – People’s Daily Online
http://english.peopledaily.com.cn/90777/8363341.html
谁给了美国网络攻击权?(望海楼)…Who gave the United States the right to cyber attacks?
http://paper.people.com.cn/rmrbhwb/html/2013-08/12/content_1281844.htm
Chinese Underground Creates Tool Exploiting Apache Struts Vulnerability | Security Intelligence Blog | Trend Micro
http://blog.trendmicro.com/trendlabs-security-intelligence/chinese-underground-creates-tool-exploiting-apache-struts-vulnerability/?
People’s Republic of China Opposes Cyber Attacks
http://www.news.cn/english/special/wlaq/

USAF’s New Idea for Spying on People’s Republic of China: Swarms of Tiny Bug Drones
Prediction: AB Kadena experiences Massive DDos in next 30 days…

http://killerapps.foreignpolicy.com/posts/2013/08/13/the_air_forces_new_idea_to_spy_on_countries_like_china_swarms_of_tiny_bug_drones

Operation Middle Kingdom is alive and motivated…Ignore the doomsayers: Beijing is playing the long game to win | Bangkok Post: business
http://www.bangkokpost.com/business/news/364563/ignore-the-doomsayers-beijing-is-playing-the-long-game-to-win
Australia-China scientific collaboration benefits each other: chief scientist – Xinhua |
People’s Republic of China succeeds in Phase V Operation Middle Kingdom ~ colonizing Australia…

http://news.xinhuanet.com/english/china/2013-08/14/c_132631141.htm
Chinese Dream – Special Report – English.news.cn
http://www.xinhuanet.com/english/special/chinesedream/

Electromagnetic catapult touted for People’s Republic of China’s next aircraft carrier|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130814000008&cid=1101
Chinese national appointed UN assistant secretary-general|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1101&MainCatID=11&id=20130814000128

People’s Republic of China ‘hacking websites in hunt for Tibetan dissidents’ – Telegraph
http://www.telegraph.co.uk/news/worldnews/asia/china/10240404/China-hacking-websites-in-hunt-for-Tibetan-dissidents.html
India: Hackers Attack Web Site of Tibetan Government in Exile
http://www.nytimes.com/2013/08/14/world/asia/india-hackers-attack-web-site-of-tibetan-government-in-exile.html?
Chinese Internet Celebrities Agree to Self-Censor
http://www.techinasia.com/chinese-internet-celebrities-agree-selfcensor/?
People’s Republic of China’s Huawei begins colonization of Myanmar…
Myanmar Telecom War: Huawei Main Supplier For Telenor And Other Myanmar Telecom Operators

Norway’s Telenor also doormat for China as Huawei helps colonize Norwegina market for the homeland…
http://www.ibtimes.com/myanmar-telecom-war-huawei-main-supplier-telenor-other-myanmar-telecom-operators-1383503?ft=a73y7

People’s Republic of China to launch fresh pharmaceutical bribery probe: Xinhua
http://www.reuters.com/article/2013/08/14/us-china-bribery-probe-idUSBRE97D0BW20130814
What does the ‘world’s best China strategist’ say about the place now?
http://www.globalpost.com/dispatch/news/regions/asia-pacific/china/130812/jing-ulrich-jp-morgan-china-investment-opportunities
Carmakers Get A Taste Of China’s Changing Business Climate

Carmakers Get A Taste Of China’s Changing Business Climate


Does China’s crackdown on corporate wrongdoing mark the arrival of CSR?
Following a series of accusations against global companies such as Apple and BMW, Simon Zadek argues China’s CSR moment is here

http://www.theguardian.com/sustainable-business/china-corporate-social-responsibility

China’s Review of Multinational Pharma Companies 跨国药企游说政府能力强大:高薪吸高干子弟Powerful multinational pharmaceutical companies in the People’s Republic of China
http://finance.sina.com.cn/chanjing/cyxw/20130812/142616419768.shtml

Islamic Republic of Iran

The cyber capabilities of Iran can hit US
http://securityaffairs.co/wordpress/17064/cyber-warfare-2/the-cyber-capabilities-of-iran-can-hit-us.html?

Global Cyber Activity…yes other countries have cyber capabilities….

August 2013 global threats
http://www.scmagazine.com/august-2013-global-threats/slideshow/1502/#0
Friend or Foe? When IoT Helps You Get Hacked by Your Security
http://blogs.cisco.com/ioe/friend-or-foe-when-iot-helps-you-get-hacked-by-your-security

From Vietnam with tens of millions of harvested emails, spam-ready SMTP servers and DIY spamming tools
http://blog.webroot.com/2013/08/14/from-vietnam-with-tens-of-millions-of-harvested-emails-spam-ready-smtp-servers-and-diy-spamming-tools/

JAPAN: “LNK” Attacks are Back Again | Symantec Connect Community
http://www.symantec.com/connect/blogs/lnk-attacks-are-back-again

Codefellas: North Korea Targets Dubstep With Nasty Computer Virus | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/08/codefellas-north-koreas-computer-virus/
North Korea ‘behind hacking attack’
http://www.bbc.co.uk/news/world-asia-23324172
South Korea blames North for cyber attack
http://www.presstv.com/detail/2013/07/16/314049/s-korea-blames-north-for-cyber-attack/

The Snowden Revelations and Cybersecurity
http://www.lawfareblog.com/2013/08/the-snowden-revelations-and-cybersecurity/
N.S.A. Leaks Make Plan for Cyberdefense Unlikely
http://www.nytimes.com/2013/08/13/us/nsa-leaks-make-plan-for-cyberdefense-unlikely.html?&pagewanted=all
Don’t Get Hacked — Tools to Fight Cyber Attacks
http://www.entrepreneur.com/article/227815
Firewalls & Firefights….
http://www.economist.com/news/business/21583251-new-breed-internet-security-firms-are-encouraging-companies-fight-back-against-computer
Stop Thinking That Tech Hacks Will Fix Our Surveillance Problems |
http://www.wired.com/opinion/2013/08/yah-surveillance-sucks-but-technology-isnt-the-only-solution/

Booz Allen to Lockheed Win Part of $6 Billion Cyber Award
Yeah – this makes sense … NOT.
http://www.bloomberg.com/news/2013-08-13/booz-allen-to-lockheed-win-part-of-6-billion-cyber-award.html

GCHQ Launches Twin-Track Approach to Cyber Incident Response Scheme
http://www.infosecurity-us.com/view/33979/gchq-launches-twintrack-approach-to-cyber-incident-response-scheme/?

London Police Commissioner’s cyber-crime open letter laughed at by industry
http://www.computerworlduk.com/in-depth/security/3463524/london-police-commissioners-cyber-crime-open-letter-laughed-at-by-industry/

A Framework for Aviation Cybersecurity
http://www.aiaa.org/uploadedFiles/Issues_and_Advocacy/AIAA-Cyber-Framework-Final.pdf

Enjoy!

Semper Fi,

謝謝
紅龍

Always Remember the Business, InfoSec Folks

I just got out of yet another meeting with a big company partner for whom we act as an information security and threat advisor. In that meeting, I listened to a keyed-up,  hypercaffinated group of good guy security geeks tell their senior executives about the latest set of DLP controls they were putting in place. They spent 45 minutes describing packet-level checking, data flows, architecture diagrams and the technology of their solution set in painful (even for me) detail. Many of the executives were dosing lightly, while the geeks spun their techno-web. That’s when things took a turn for the worse…

The COO asked them one single question, interrupting a slide about email data flows ~ “How will this impact the business of ‘Dan’s’ group and the ‘Singularity’ project we have been working on since 2011? Doesn’t it depend on some of that data?” (**Names changed to protect the innocent and the guilty…)

Then, NOTHING HAPPENED. You could have heard a pin drop. Dead silence for close to two minutes. Finally, the COO repeated the question. Still nothing. He asked the lead geek if he knew who Dan was, and the geek said yes. He asked if Dan had been interviewed by the geeks prior to this. They said, no. The COO erupted in a rage, railing about how Singularity was the largest new line of business launch in the history of the company and how the projected income from the business would change the landscape of the firm. There were a LOT of apologies and some amount of notes taken to immediately consult with Dan. Much geek cred was lost. It will be a while before they get to present to the executives again like that. 

I tell you this story simply to remind all infosec folks about something I see all too often. It’s about the business. We are about the business. We are there to secure the business, nurture it, protect it, empower it to succeed. If that’s not where you or your team are, then you are doing it wrong. Get it right. Talk to the business. Speak their language. Give up on the “beauty of the baud” approach. Your packets and technology stack may be gorgeous to you, but if they don’t align with the business, then they won’t do anyone, including you, any good at all. Keep that in mind at all times. Also, remember to always talk to Dan ~ he’s a nice guy and he appreciates it. He can give you the answers you need and usually, he desperately wants to understand what you can do to make his project a success. Get to know all the Dan’s in your organization. They drive the world, you support them, together you build business and all of you will succeed!

Cyber SA for 14AUG2013….

Good Morning Folks … 早安, おはようございます-

It’s Wednesday 14 AUG 2013 and there is a tremendous amount of cyber situation awareness (SA) to share today!

There are distinct geographic section regarding cyber news in the following areas below you should review…including of course, the People’s Republic of China ~ 中華人民共和國, India, North Korea & Russia Cyber activities, various Intelligence Agencies & Cyber, and naturally, cyber news related to Hackers & Compromising Systems

Enjoy!

People’s Republic of China ~ 中華人民共和國

The People’s Republic of China’s Emerging C4ISR Revolution
http://thediplomat.com/2013/08/13/chinas-emerging-c4isr-revolution/?all=true
People’s Republic of Hacking…Survival of the Fittest: New York Times Attackers Evolve Quickly
http://www.fireeye.com/blog/technical/2013/08/survival-of-the-fittest-new-york-times-attackers-evolve-quickly.html
Infosecurity – Go Ahead, Blame the People’s Republic of China
http://www.infosecurity-magazine.com/view/33963/go-ahead-blame-china/
People’s Republic of China’s Huawei and the UK’s critical national infrastructure
http://www.infosecurity-magazine.com/view/32810/chinas-huawei-and-the-uks-critical-national-infrastructure/

How Censorship Hurts Chinese Internet Companies
http://www.theatlantic.com/china/archive/2013/08/how-censorship-hurts-chinese-internet-companies/278587/
Wikipedia Refuses to Comply with China’s Censorship
http://thediplomat.com/china-power/wikipedia-refuses-to-comply-with-chinas-censorship/
People’s Republic of China’s Huawei in push to ease concerns over national security
http://www.theage.com.au/it-pro/business-it/huawei-in-push-to-ease-concerns-over-national-security-20130812-hv1cn.html

New York Times Hackers, thought to be Chinese, Back With Smarter Malware…
http://www.techweekeurope.co.uk/news/new-york-times-hackers-return-improved-malware-124549?
Tibetans Targeted As Dalai Lama Site Hacked To Serve Malware
http://www.techweekeurope.co.uk/news/tibetans-dalai-lama-hackers-malware-124547?
Dalai Lama’s China site hacked, infects others
http://www.reuters.com/article/2013/08/12/net-us-tibet-cyberattack-idUSBRE97B0QU20130812
Central Tibetan Administration Website Strategically Compromised as Part of Watering Hole Attack
http://www.securelist.com/en/blog/9144/Central_Tibetan_Administration_Website_Strategically_Compromised_as_Part_of_Watering_Hole_Attack

People’s Republic of China: Russia Remains On The Target List
http://www.strategypage.com/qnd/china/articles/20130813.aspx

Any Chinese Buyers for BlackBerry?
http://blogs.wsj.com/digits/2013/08/12/any-chinese-buyers-for-blackberry/
People’s Republic of Chain’s ZTE rumored to announce its own ARM based processor next month
http://www.androidauthority.com/zte-new-processor-255274/
People’s Republic of China’s Sina Corp in surprise loss
http://www.bbc.co.uk/news/business-23677939
What’s China got against the US Constitution?
http://www.globalpost.com/dispatch/news/regions/asia-pacific/china/130811/china-democracy-political-reform
People’s Republic of China set to pass U.S. as top oil importer
http://money.cnn.com/2013/08/13/news/economy/china-oil-imports/index.html?
Red Tide…Just how strong is the People’s Republic of China’s navy, really?
http://www.foreignpolicy.com/articles/2013/08/12/red_tide_how_strong_is_the_chinese_navy?page=full

India, North Korea & Russia Cyber –

Cyber attacks point to India
http://webreprints.djreprints.com/3175410055735.html

Anatomy Of A Russian Cybercrime Ecosystem Targeting Android
http://www.darkreading.com/attacks-breaches/anatomy-of-a-russian-cybercrime-ecosyste/240159365?
Cybercrime-friendly underground traffic exchange helps facilitate fraudulent and malicious activity
http://blog.webroot.com/2013/08/13/cybercrime-friendly-underground-traffic-exchange-helps-facilitate-fraudulent-and-malicious-activity/

North Korea’s Vast Cyber Warfare Army
http://english.chosun.com/site/data/html_dir/2013/08/13/2013081300891.html?

Intelligence Agencies & Cyber –

Infosecurity – Mutually Assured Cyber Destruction
http://www.infosecurity-magazine.com/view/33962/mutually-assured-cyber-destruction
The NSA Is Commandeering the Internet
http://www.theatlantic.com/technology/archive/2013/08/the-nsa-is-commandeering-the-internet/278572/
Irony Alert: Pentagon Now Sees Big Data as ‘National Security Threat’
http://killerapps.foreignpolicy.com/posts/2013/08/12/irony_alert_pentagon_now_fears_a_big_data_national_security_threat
U.S. sets up intelligence surveillance technology review body
http://www.reuters.com/article/2013/08/12/us-usa-security-review-idUSBRE97B0UT20130812
First 100 Pages of Aaron Swartz’s Secret Service File Released | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/08/swartz-foia-release/
Exclusive: After Multiple Denials, CIA Admits to Snooping on Noam Chomsky
http://thecable.foreignpolicy.com/posts/2013/08/13/after_multiple_denials_cia_admits_to_snooping_on_noam_chomsky
The NSA is turning the internet into a total surveillance system
Now we know all Americans’ international email is searched and saved, we can see how far the ‘collect it all’ mission has gone

http://www.theguardian.com/commentisfree/2013/aug/11/nsa-internet-surveillance-email

Israeli military intelligence unit drives country’s hi-tech boom
Unit 8200, Israel’s ‘GCHQ’, has spawned more technology millionaires than many business schools
http://www.theguardian.com/world/2013/aug/12/israel-military-intelligence-unit-tech-boom
Is This Iran’s First ICBM Launch Site?
http://killerapps.foreignpolicy.com/posts/2013/08/08/is_this_where_iran_will_launch_its_first_icbm_from

Hackers & Compromising Systems –

Coming Soon: The Cybercrime of Things
Once everything in your house contains a computer, everything in your house can be hacked…

http://www.theatlantic.com/technology/archive/2013/08/coming-soon-the-cybercrime-of-things/278409/
Hackers called into civic duty
http://online.wsj.com/article/SB10001424127887324263404578613850076916028.html
Monitoring digital footprints to prevent reputation damage and cyber attacks |
http://www.wired.co.uk/news/archive/2013-07/01/digital-shadows-alastair-paterson
XP’s retirement will be hacker heaven
Hackers will bank bugs until after Microsoft retires Windows XP in April 2014; expect attacks, say security experts

http://www.computerworld.com/s/article/9241585/XP_s_retirement_will_be_hacker_heaven?taxonomyId=17

Enjoy!

Semper Fi,

謝謝

紅龍

Cyber SA…Global Perspectives

Good Monday Folks;

Much news from Cyber~Land today – and thus, you may enjoy the most recent Global Perspectives of Cyber Situation Awareness (SA)…
Of particular note – information loss in the People’s Republic of China…now a crime bubbling to the service…Kenyan PC’s with Chinese malware and so much more in the China Section below, including missing US CBP & China cooperation posts; Iran’s Cyber Motivations & Actions…and of course, German and French Governments respond to PRISM…

All the cyber SA you might want in one dose!

中國人民共和國 – People’s Republic of China….

Infosecurity – Report: China Uses Taiwan as Test-Bed for US Cyber-Espionage Attacks
http://www.infosecurity-magazine.com/view/33553/report-china-uses-taiwan-as-testbed-for-us-cyberespionage-attacks/

People’s Republic of China: 1,213 arrested for personal information trafficking – People’s Daily Online
“… 468 gangs and arrested 1,213 people for suspected personal information trafficking, according to a statement released Sunday by the Ministry of Public Security.”

http://english.peopledaily.com.cn/90882/8360132.html
Stronger laws urged to protect personal information – People’s Daily Online
http://english.peopledaily.com.cn/90882/8305906.html
People’s Republic of China ‘top source’ of malicious software in Kenyan computers
http://www.nation.co.ke/business/news/China+top+source+of+malicious+software/-/1006/1944356/-/rj5e4/-/index.html
People’s Republic of China New York Times hackers strike again with evolved malware
http://www.v3.co.uk/v3-uk/news/2288076/new-york-times-hackers-strike-again-with-evolved-malware

Censorship, external authentication, and other social media lessons from China’s Great Firewall
http://www.techinasia.com/china-social-media-lessons-from-great-firewall/

China’s Xiaomi sells 100,000 units of new $130 phone in 90 seconds, chalks up 7.45m reservations |
http://thenextweb.com/asia/2013/08/12/chinas-xiaomi-sells-100000-units-of-new-130-phone-in-90-seconds-chalks-up-7-45m-reservations/
Xiaomi Beats Samsung To Top China’s Smartphone Charts | TechCrunch
http://techcrunch.com/2013/08/12/xiaomi-beats-samsung-to-top-chinas-smartphone-charts/

CBP – U.S. Customs and Border Protection / U.S., China Announce Results of First Joint Intellectual Property Operation
http://www.noodls.com/view/E418DA4AF877ADF8970BBEE9B0E38FDDAB89AC35
This original CBP Press relaese was removed from the web here:
http://www.cbp.gov/xp/cgov/newsroom/news_releases/local/07312013_7.xml

Also removed from South China Morning Post:
http://www.scmp.com/news/china/article/1293516/china-us-team-seize-fake-apple-samsung-dr-dre-electronics
U.S., People’s Republic of China team up to seize counterfeit goods in joint operation
http://www.reuters.com/article/2013/07/31/us-china-usa-counterfeit-idUSBRE96U0X120130731

HUAWEI…

Intelligence: People’s Republic of China Dodges Accusations
Chinese telecommunications equipment manufacturer Huawei continues to be dogged by accusations that it is acting as an economic and military espionage agent for the Chinese military.

http://www.strategypage.com/htmw/htintel/articles/20130810.aspx
People’s Republic of China’s Economy Slows but Its Influence Rises
http://blogs.cfr.org/asia/2013/08/12/chinas-economy-slows-but-its-influence-rises/
People’s Republic of China Rising, Huawei Team For Secure Virtualization Solutions – ChinaTechNews
http://www.chinatechnews.com/2013/08/12/19562-chinas-rising-huawei-team-for-secure-virtualization-solutions
People’s Republic of China’s Huawei partners w/Telematics to bolster Unified Communications capabilities in UAE, Qatar –
http://english.mubasher.info/DFM/news/2377832/Huawei-partners-with-Telematics-to-bolster-Unified-Communications-capabilities-in-UAE-Qatar
Serbian Railways Opts for People’s Republoc of China’s Huawei Solutions
http://enterprisechannels.com/ContentDetails.aspx?Moduleid=12159&&ModuleType=Serbian%20Railways%20Opts%20for%20Huawei%20Solutions
People’s Republic of China Blames Cisco for Huawei’s U.S. Woes
http://channelnomics.com/2012/10/12/china-blames-cisco-huaweis-u-s-woes/

It’s Not Just the People’s Republic of China: Indian Hacker Group Spied On Targets In Pakistan, U.S. And Europe – Forbes
http://www.forbes.com/sites/andygreenberg/2013/05/21/its-not-just-china-indian-hacker-group-spied-on-targets-in-pakistan-u-s-and-europe/
Pakistan Intelligence Agency ISI hacks India’s largest telco BSNL Systems by Social Engineering
http://www.thehackerspost.com/2013/08/pakistan-intelligence-agency-hacks-bsnl.html

Escalation Cause: How the Pentagon’s new strategy could trigger war with the People’s Republic of China
“…according to Air-Sea Battle, U.S. forces would launch physical attacks and cyberattacks against the enemy’s “kill-chain” of sensors and weaponry in order to disrupt its command-and-control systems, wreck its launch platforms (including aircraft, ships, and missile sites), and finally defeat the weapons they actually fire. The sooner the kill-chain is broken, the less damage U.S. forces will suffer — and the more damage they will be able to inflict on the enemy.”

http://www.chinausfocus.com/peace-security/escalation-cause-how-the-pentagons-new-strategy-could-trigger-war-with-china/
A Future Without War for the People’s Republic of China & the US |
http://www.chinausfocus.com/foreign-policy/a-future-without-war-for-china-and-the-us/
People’s Republic of China among top five countries on US’ surveillance list – TruthDive
“…the list of NSA’s spying targets, China, Russia, Iran, Pakistan and North Korea are of prime importance for surveillance, Der Spiegal reports.

According to the report, the US is especially interested in gathering intelligence related to the countries’ foreign policy, international trade and economic stability along with topics related to new technology and energy security which score low level priority.”

http://truthdive.com/2013/08/11/Pak-China-among-top-five-countries-on-US-surveillance-list.html
H-6K bombers used by PLA capable of reaching Hawaii: Kanwa Defense Review
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130812000082&cid=1101
The untold truth behind the US rebalancing policy…WantChinaTimes.com
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130811000079&cid=1703

People’s Republic of China investigates France’s Sanofi for alleged bribery: Xinhua
http://www.reuters.com/article/2013/08/10/us-sanofi-china-idUSBRE97902L20130810

ISLAMIC REPUBLIC OF IRAN ~ Cyber

Iran’s cyber warfare could hit public more than military: report
http://www.washingtontimes.com/news/2013/jul/29/irans-cyber-warfare-could-hit-public-more-military/
Iran’s Covert Cyber War
http://blog.heritage.org/2013/08/07/irans-covert-cyber-war/

INTERNATIONAL HACKING>>>

Inside the Tor exploit | ZDNet
http://www.zdnet.com/inside-the-tor-exploit-7000018997/
Hackers put a bull’s-eye on small business | PCWorld
http://www.pcworld.com/article/2046300/hackers-put-a-bulls-eye-on-small-business.html
Reported data breached records in US from 2005 to present exceed 500 million | ZDNet
http://www.zdnet.com/reported-data-breached-records-in-us-from-2005-to-present-exceed-500-million-7000018991/
Meet Darknet, the hidden, anonymous underbelly of the searchable Web | PCWorld
http://www.pcworld.com/article/2046227/meet-darknet-the-hidden-anonymous-underbelly-of-the-searchable-web.html

The Classifieds
“Are American spies the next victims of the Internet age?”

http://www.foreignpolicy.com/articles/2013/08/09/the_classifieds_open_source_intelligence_prieto?page=full
Deutsche Telekom and United Internet launch ‘made in Germany’ email in response to PRISM | ZDNet
http://www.zdnet.com/deutsche-telekom-and-united-internet-launch-made-in-germany-email-in-response-to-prism-7000019266/
Spy or Die – Can corporate suicide stop the NSA?
http://www.foreignpolicy.com/articles/2013/08/09/spy_or_die_nsa_lavabit_silent_circle?page=full

HACKSURFER
http://hacksurfer.com/
Fort Disco: The new brute-force botnet | ZDNet
http://www.zdnet.com/fort-disco-the-new-brute-force-botnet-7000019126/#%21
The Danger of Mixing Cyberespionage With Cyberwarfare
http://insights.wired.com/profiles/blogs/the-danger-of-mixing-cyberespionage-with-cyberwarfare#axzz2bmMnUKxL

France has its own PRISM system: Report | ZDNet
As the US and the UK admit that they are intercepting data for intelligence purposes, an investigative report has revealed that the French government is doing the same.

http://www.zdnet.com/france-has-its-own-prism-system-report-7000017694/

Enjoy!

Semper Fi,

謝謝
紅龍

Cyber-Mania & Situation Awareness in the Binary Worlds…

Good Friday Afternoon Folks;

In today’s issue of the latest cyber news we have quite a bit in the way of Cyber-Mania & Situation Awareness in the Binary Worlds…

Pay particular attention to the immediate section below and the latest items of interest from the People’s Republic of Cyber Espionage…er, sorry, China…
There are a couple of interesting items regarding cuber attacks and a cuber timeline from NATO…yeah OTAN…go figure!
And yes the F-B-I is looking for Hacker love…be sure to use a condom … or those executable files ail ruin your weekend…:-)

People’s Republic of China allows spies to plunder companies
http://www.news.com.au/business/chinese-inaction-over-industrial-spies/story-e6frfm1i-1226693898798
Slight shift seen in official Chinese attitude on cybersecurity
http://www.fiercegovernmentit.com/story/slight-shift-seen-official-chinese-attitude-cybersecurity/2013-08-07
People’s Republic ofChina firmly pursues peaceful development: defense minister
http://english.qstheory.cn/news/201308/t20130801_255078.htm
How America Is Fighting Back Against Chinese Hackers |
http://gizmodo.com/how-america-is-fighting-back-against-chinese-hackers-754599685
President Xi inspects Chinese Academy of Sciences in Beijing _ Qiushi Journal
http://english.qstheory.cn/news/201307/t20130718_250255.htm
People’s Republic of China’s Huawei Looks to Build Up Enterprise-Network Business
http://online.wsj.com/article/SB10001424127887323977304578654840024408084.html

NATO History of Cyber Attacks – A Timeline
http://www.nato.int/docu/review/2013/Cyber/timeline/EN/
Fitting cyber attacks to jus ad bellum — Consequence-based approachPart III
http://resources.infosecinstitute.com/fitting-cyber-attacks-to-jus-ad-bellum-consequence-based-approachpart-iii/?
Cyberattacks devastated my business!
http://money.cnn.com/gallery/smallbusiness/2013/05/28/cybercrime
NSA behind cyber attacks the took down ‘Dark Web’ used by online pedophiles
http://bbb-news.com/blog/2013/08/09/eric-eoin-marques-nsa-behind-cyber-attacks-the-took-down-dark-web-used-by-online-pedophiles/
Defendant in Romanian Cyber Crime Ring Convicted of Wire Fraud and Identification Document Fraud Conspiracies
http://www.fbi.gov/newyork/press-releases/2013/defendant-in-romanian-cyber-crime-ring-convicted-of-wire-fraud-and-identification-document-fraud-conspiracies?

Are Black Hats and White Hats Really Grey Hats?
http://www.digitalcommunities.com/articles/Are-Black-Hats-and-White-Hats-Really-Grey-Hats.html

FBI director calls on private sector to help with cyber threat
I’ll be sure to send him a .pdf with an executable file in it – oh wait the Minneapolis Cyber Field Office already received it….Nyarch!
http://arstechnica.com/tech-policy/2013/08/fbi-director-calls-on-private-sector-to-help-with-cyber-threat/
CIA, FBI and NSA Leaders Ask for Help Fighting Cyberattacks
http://mashable.com/2013/08/08/cia-fbi-nsa-cyberattacks/?
The Government Wants to Create Cybersecurity Insurance
http://gizmodo.com/the-government-wants-to-create-cybersecurity-insurance-1046375980
IPv6 is latest tool for stealing credit card numbers and passwords
http://www.v3.co.uk/v3-uk/news/2286734/ipv6-is-latest-tool-for-stealing-credit-card-numbers-and-passwords

Semper Fi,

謝謝
紅龍

8/8…八/八 Cyber Situation Awareness…People’s Republic of Hacking…

Good day Folks;

Today is usually considered an auspicious day in the People’s Republic of China…八八…8/8 ~ the number 8 being lucky, auspicious while the eight day of the eighth month doubles your good fortune…unfortunately for a couple of our favorite state owned enterprises (SOE), Huawei and Sinovel are in today’s issue of Chinese Cyber SA as they have been linked to economic cyber espionage … naughty, naughty…

People’s Republic of China’s Sinovel charged with cyber espionage in US…|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130808000097&cid=1206
Chinese inaction gives technology thieves a shield…FACT: People’s Republic of China supports commercial economic cyber espionage
http://www.seattlepi.com/business/technology/article/Chinese-inaction-gives-technology-thieves-a-shield-4716698.php
Breaking Down the China Chopper Web Shell – Part I – 推酷
http://www.tuicool.com/articles/zURZnm
Report: Joint U.S.-China Aviation Ventures Are More Prone to Cyber Intrusions than U.S. Firms
Hey – infosec boyz @ Boeing in Seattle – you paying attention to this….!?

http://www.nextgov.com/cybersecurity/2013/08/report-joint-us-china-aviation-ventures-are-more-prone-cyber-intrusions-us-firms/68225/?oref=ng-skybox
People’s Republic of China has a massive Windows XP problem
How do you say ‘cyber target rich environment’? Outdated OS in China….

http://www.computerworld.com/s/article/9241429/China_has_a_massive_Windows_XP_problem
NSA spy server in Chongqing could be used to bury Bo Xilai: Duowei
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130808000136&cid=1101

People’s Republic of China’s Huawei: We’re not a security threat, we’re just a pawn | Digital Trends
http://www.digitaltrends.com/mobile/huawei-were-not-a-security-threat-were-just-a-pawn/
People’s Republic of China’s Huawei Seeks Foothold in Enterprise Market
http://blogs.wsj.com/digits/2013/08/08/huawei-seeks-foothold-in-enterprise-market/
People’s Republic of China’s Huawei unveils SDN programmable switch, taking aim at Cisco | PCWorld
http://www.pcworld.com/article/2046185/chinas-huawei-unveils-sdn-programmable-switch-taking-aim-at-cisco.html#tk.rss_all
Taiwan’s animators ridicule People’s Republic of China over cozy SOE relationships…ZTE & Huawei
http://appleinsider.com/articles/13/08/08/taiwans-animators-ridicule-china-over-pr-smear-campaign-against-apple-inc

Rumor: Apple planning development center in Taiwan for future iPhones…Bye-Bye People’s Republic of China…
http://appleinsider.com/articles/13/08/08/rumor-apple-planning-development-center-in-taiwan-for-future-iphones

Time to break the hegemony of western discourse – People’s Daily Online
From News of the Communist Party of China…
http://english.cpc.people.com.cn/206972/206977/8353120.html
Reflections on “The China Threat”
http://www.strategicstudiesinstitute.army.mil/index.cfm/articles/Reflections-on-The-China-Threat/2013/08/01
Where There is Smoke, There is Fire: South Asian Cyber Espionage Heats Up
http://www.threatconnect.com/news/where-there-is-smoke-there-is-fire-south-asian-cyber-espionage-heats-up/

DNS Servers of 3 Dutch Hosting Firms Hijacked, Thousands of Sites Serve Malware
http://news.softpedia.com/news/DNS-Servers-of-3-Dutch-Hosting-Firms-Hijacked-Thousands-of-Sites-Serve-Malware-373308.shtml

Special Ops Mined Social Media for Data to Advance Mission
http://www.nextgov.com/defense/whats-brewin/2013/08/special-ops-mined-social-media-data-advance-mission/68216/

U.S. Cybersecurity Policy: Problems and Principles
http://heartland.org/sites/default/files/08-01-13_titch_policy_brief_cybersecurity.pdf

Enjoy!

Semper Fi,

謝謝

紅龍