Cyber SA for 1302Z26AUG2013

Good Monday Morning Fans!

Extraordinary amount of Cyber Situational Awareness (SA) news from around the globe today!

The People’s Republic of China suffers a massive DDoS attack; Chinese military modernization of information warfare doctrine circa 2000 & 2008 – There are also stories about Russian Cybercrime; India’s cyber architecture and much other relevant good stuff to share in the variety of news posts below!

Enjoy!

People’s Republic of China suffers major DDoS attack on .cn domain
http://www.pcworld.com/article/2047427/china-suffers-major-ddos-attack-on-cn-domain.html#
People’s Republic of China’s Internet hit by biggest cyberattack in its history
http://money.cnn.com/2013/08/26/technology/china-cyberattacks/index.html?

Information Defense: An Important Part of Information Warfare…解放军报网络版-军事沙龙
This is Chinese Military (中國人民解放軍) Information Warfare (信 息战争) Doctrine Circa 2000

http://www.pladaily.com.cn/item/vote/houqing/content/7-015.htm
Chinese Military Networks also Need to Relate To Battle Strategies…网络攻防战也需讲谋略
This is Circa 2007 – 中國人民解放軍信 息作战

http://www.chinamil.com.cn/site1/xwpdxw/2007-11/06/content_1007865.htm
Cyber Warfare & the People’s Republic of China…Has the Wolf Come Yet?网络战,狼真的来了吗
This is Circa 2007 – 中國人民解放軍信 息作战

http://www.chinamil.com.cn/site1/xwpdxw/2007-11/01/content_1002668.htm
Chinese Military Active Defense: Target Enemy Critical Infrastructure信息防卫–信息化战争的重要一环
This is Chinese Military (中國人民解放軍) Information Warfare (信 息战争) Doctrine Circa 2008

http://www.chinamil.com.cn/site1/2008b/2008-06/17/content_1320115.htm

U.S., China and an unthinkable war
Both have planned for a conflict they hope to avoid.
http://www.latimes.com/opinion/commentary/la-oe-gompert-kelly-war-china-u-s–20130826,0,6126914.story?
US Navy seeks more cooperation with China in counter-piracy exercise
http://www.stripes.com/news/navy/us-navy-seeks-more-cooperation-with-china-in-counter-piracy-exercise-1.237354?
John McCain, China Trade Barbs Over Senkaku Islands
http://thediplomat.com/the-editor/2013/08/26/john-mccain-china-trade-barbs-over-senkaku-islands/?
China’s worried elites
Not since Mikhail Gorbachev began speaking of ‘Glasnost’ and ‘Perestroika’ has there been such a ferment among policy intellectuals.

http://www.upi.com/Top_News/Analysis/Walker/2013/08/26/Walkers-World-Chinas-worried-elites/UPI-48771377490260/

China IP Rights. The Lackey View.
http://www.chinalawblog.com/2013/08/china-ip-rights-the-lackey-view.html

Sinopec profits surge as China eases pricing rules
http://www.bbc.co.uk/news/business-23838922
China to investigate vice president of oil firm CNPC
http://uk.reuters.com/article/2013/08/26/uk-china-oil-cnpc-idUKBRE97P01V20130826?
China’s Military Says Pacific Rim Is American Propaganda
http://kotaku.com/chinas-military-says-pacific-rim-is-american-propagand-1196612758
PH, Vietnam hold talks to boost defense amid China tension

PH, Vietnam hold talks to boost defense amid China tension

Top Japanese firms’ classified info leaked on People’s Republic of China’s Baidu
http://www.japantimes.co.jp/news/2013/08/08/national/leading-japanese-firms-confidential-documents-leaked-on-chinese-website/

People’s Republic of China Wants to Rise Peacefully, But So What?
http://thediplomat.com/flashpoints-blog/2013/08/22/china-wants-to-rise-peacefully-but-so-what/?

The Pervasiveness of Foreign Collection Efforts via Cyber Espionage
http://ci.speartip.com/blog/bid/329389/The-Pervasiveness-of-Foreign-Collection-Efforts-via-Cyber-Espionage
Cybersecurity Expert: Assume You’re Being Attacked Right Now
http://www.crn.com/news/security/240160280/cybersecurity-expert-assume-youre-being-attacked-right-now.htm

Local man Taiwanese gets suspended sentence spying the People’s Republic of China
http://www.chinapost.com.tw/taiwan/national/national-news/2013/08/23/387135/Local-man.htm
Chinese mainland’s Internet speed ranks 98th |Industries |chinadaily.com.cn
http://www.chinadaily.com.cn/business/2013-08/16/content_16898964.htm

People’s Republic of China’s Huawei, ZTE win bulk of China Mobile’s $3 billion 4G bonanza: sources
http://www.reuters.com/article/2013/08/23/us-chinamobile-4g-idUSBRE97M02020130823
Is Taiwan’s HTC about to get acquired by People’s Republic of China’s ZTE, Lenovo or Huawei?
http://www.networkworld.com/news/2013/082213-android-roundup-273111.html
Electric carmaker Tesla hits roadblock in People’s Republic of China over trademark
Tesla will pay dearly for not havinf read of Apple’s dillemma regarding IP & Trademark registration within the People’s Republic of China…but I’m certain they hired only the best to get them to this point 🙂

http://www.reuters.com/article/2013/08/23/us-china-autos-tesla-idUSBRE97M0D920130823
Despite denials, docs show McAuliffe company asked feds to fast-track visa for investor tied to spy list
MAKING CONNECTIONS: Chinese telecommunications company like Huawei Technologies Co. “provide a wealth of opportunities for Chinese intelligence agencies to insert malicious hardware or software implants into critical telecommunications components and systems,”

http://sayanythingblog.com/entry/despite-denials-docs-show-mcauliffe-company-asked-feds-to-fast-track-visa-for-investor-tied-to-spy-list/?
Africa’s Big Brother Lives in Beijing – Is Huawei wiring Africa for surveillance? Or just for money?
http://www.foreignpolicy.com/articles/2013/07/30/africas_big_brother_lives_in_beijing_huawei_china_surveillance?page=full
U.S. Fears People’s Republic of China’s Huawei Backed Spy Network In Africa (Update) –

U.S. Fears Huawei Backed Spy Network In Africa (Update)


People’s Republic of China’s Huawei Secures $1.5 Billion Equivalent 5-year Term Loan
http://www.cellular-news.com/story/61663.php?
People’s Republic of China’s ZTE to post third quarterly profit due to cost cuts
http://www.reuters.com/article/2013/08/21/us-zte-results-idUSBRE97K0XB20130821
People’s Republic of China’s Baidu buys majority stake in group buying site Nuomi | PCWorld
http://www.pcworld.com/article/2047322/chinas-baidu-buys-majority-stake-in-group-buying-site-nuomi.html

Multinationals in China…Guardian warriors and golden eggs
The state’s crackdowns on big firms are not all about bashing foreigners

http://www.economist.com/news/business/21584045-states-crackdowns-big-firms-are-not-all-about-bashing-foreigners-guardian-warriors-and?
Volvo building two additional assembly plants in People’s Republic of China
http://www.leftlanenews.com/volvo-to-build-assembly-plants-in-china.html
Foreign Executives Need to Exercise Due Care in the People’s Republic of China
http://www.china-briefing.com/news/2013/08/23/foreign-executives-need-to-exercise-due-care-in-china.html

Xiaomi’s new funding round skyrockets valuation to $10B
http://venturebeat.com/2013/08/22/xiaomis-new-funding-round-skyrockets-valuation-to-10b/
People’s Republic of China arrests activist who campaigned about leaders’ wealth | Reuters
http://in.reuters.com/article/2013/08/23/china-dissident-idINDEE97M05520130823

Review of US surveillance programs to be led by panel of intelligence insiders
http://www.theguardian.com/world/2013/aug/22/nsa-surveillance-review-panel-insiders
US intelligence services go ‘on the record’ with new Tumblr blog
http://www.theguardian.com/world/2013/aug/22/us-intelligence-community-tumblr-surveillance
If You’ve Ever Traveled to a “Suspicious” Country, This Secret Program May Target You

If You’ve Ever Traveled to a “Suspicious” Country, This Secret Program May Target You


How an Idealistic President Embraced Cyber Espionage
http://www.huffingtonpost.com/nikolas-kozloff/how-an-idealistic-preside_b_3799193.html

Exclusive: UK’s secret Mid-East internet surveillance base is revealed in Edward Snowden leaks
http://www.independent.co.uk/news/uk/politics/exclusive-uks-secret-mideast-internet-surveillance-base-is-revealed-in-edward-snowden-leaks-8781082.html
New Study: Senior U.S. Military Schools Struggle to Include Cyber Education in Curricula
http://pellcenter.salvereginablogs.com/files/2013/08/JPME-Cyber-Leaders-Final.pdf
http://pellcenter.salvereginablogs.com/new-study-senior-u-s-military-schools-struggle-to-include-cyber-education-in-curricula/

New figures reveal extent of cybercrime risk to UK population
http://phys.org/news/2013-08-figures-reveal-extent-cybercrime-uk.html
www.cyber.kent.ac.uk/Survey1.pdf

Nasdaq outage resembles political hacker attacks – These are not the Hackers you are looking for…

Nasdaq outage resembles political hacker attacks

Serious cyber attack hits Belgian military intelligence service
http://www.mo.be/en/article/serious-cyber-attack-hits-belgian-military-intelligence-service

FEATURE-Ex-Soviet hackers play outsized role in cyber crime world
http://www.reuters.com/article/2013/08/22/russia-cybercrime-idUSL6N0G61KM20130822

German IT officials reportedly deem Windows 8 too ‘dangerous’ to use
http://bgr.com/2013/08/21/microsoft-windows-8-nsa-back-door/

Govt to chart road map to safeguard India’s cyber security…
http://www.dnaindia.com/india/1879193/report-govt-to-chart-road-map-to-safeguard-india-s-cyber-security-architecture

Semper Fi;

謝謝
紅龍

Using HoneyPoint as a Nuance Detection System in Utility Companies

I often get asked about how utility companies deploy HoneyPoint in an average implementation. To help folks with that, I whipped up this quick graphic that shows a sample high level deployment. 

Thanks for reading! Let me know what you think, or if you have an interest in discussing an implementation in your environment.

Chinese Military Cyber SA Special Edition ~ 1330Z23AUG2013

Good Morning Fans – it’s Friday;

Today’s Cyber SA is a special edition highlighting historical and very recent cyber military doctrine developments in the People’s Republic of China (中國人民共和國 ) military, the People’s Liberation Army (PLA)中國人民解放軍…

Enjoy this special edition…and while you do, ask yourself the question about why your over priced ‘cyber’ intel vendor didn’t show you these items yet…the fire them and contact the Red Dragon ~ 紅龍 @ MicroSolved…

Enjoy!

Chang Wanquan: Hacker actions never supported by Chinese military – People’s Daily Online
http://english.peopledaily.com.cn/90786/8373519.html
今日利剑在手 明日缚住苍龙…
解放军画报…- Beijing Military Region to strengthen information technology division of qualified personnel
“Today, tomorrow, sword in hand defeats the restrained Black Dragon…”
http://www.plapic.com.cn/txt/201308b/20130807B.htm

Network Management Center of Nanjing Military Region Chen Yande – 南京军区某部网管中心 陈彦德
http://chn.chinamil.com.cn/xwpdxw/jskjxw/2011-07/28/content_4611103.htm
Unidirectional optical transmission cast “network shield”…单向光传输铸“网 盾”■新疆军区某部维修科科长 吴国龙
http://chn.chinamil.com.cn/xwpdxw/jskjxw/2011-07/21/content_4555913.htm
U.S. Department of Defense released the first copies of “cyberspace Action Strategy”
美国防部发布首份《网络空间行动战略》
http://chn.chinamil.com.cn/xwpdxw/2011-07/15/content_4487744.htm
中國人民解放軍信 息战争网 络战…Chinese Military Information Warfare & Network Warfare circa…2008
http://www.chinamil.com.cn/site1/jstppd/2008-02/18/content_1127942.htm
In People’s Republic of China, ‘defaming cultural icons’ online can land you in jail | TechHive
http://www.techhive.com/article/2047103/china-arrests-two-for-using-the-internet-to-defame-cultural-icon.html
Western defense firms refuse Chinese buyers to deter copycats
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1101&MainCatID=11&id=20130815000117
US Snubs Russia, People’s Republic of China Doesn’t
http://thediplomat.com/china-power/us-snubs-russia-china-doesnt/
Airsea Battle VS Offshore Control: Can the US Blockade the People’s Republic of China?
http://thediplomat.com/the-naval-diplomat/2013/08/19/airsea-battle-vs-offshore-control-can-the-us-blockade-china/

Content-Based Mobile Edge Networking (CBMEN)
http://www.darpa.mil/Our_Work/STO/Programs/Content-Based_Mobile_Edge_Networking_(CBMEN).aspx

Anatomy of a brute force attack – how important is password complexity?
http://nakedsecurity.sophos.com/2013/08/16/anatomy-of-a-brute-force-attack-how-important-is-password-complexity/

DDoS Attacks Used As Cover For Other Crimes – The Akamai Blog
https://blogs.akamai.com/2013/08/new-deputy-under-secretary-for-cybersecurity.html?

Semper Fi,

謝謝
紅龍

More on Persistent Penetration Testing from MSI

MicroSolved has been offering Persistent Penetration Testing (PPT) to select clients now for a couple of years. We have been testing and refining our processes to make sure we had a scalable, value driven, process to offer our full client base. We have decided to open the PPT program up to another round of clients, effective immediately. We will be open to adding three additional clients to the PPT group. In order to qualify, your organization must have an appetite for these services and meet the criteria below:

The services:

  • MSI will actively emulate a focused team of attackers for either a 6 or 12  month period, depending on complexity, pricing and goals
  • During that time, MSI will actively and passively target your organization seeking to reach a desired and negotiated set of goals (usually fraud or theft of IP related data, deeper than traditional pen testing)
  • Full spectrum attacks will be expressed against your organization’s defenses in red team mode, across the time window 
  • Once an initial compromise occurs and the appropriate data has been identified and targeted, we will switch to table top exercises with the appropriate team members to discuss exploitation and exfiltration, prior to action
  • If, and only if, your organization approves and desires, then exploitation and exfiltration will occur (note that this can be pivoted from real world systems to test/QA environments at this point)
  • Reporting and socialization of the findings occurs, along with mitigation strategies, awareness training and executive level briefings
  • The process then repeats, as desired, through the terms and sets of goals

The criteria for qualification; Your organization must:

  • Have full executive support for the initiative, all the way to the C-level and/or Board of Directors
  • Have a mature detection and egress process in place (otherwise, the test will simply identify the needs for these components)
  • Have the will to emulate real world threat activity without applying compliance-based thinking and other unnatural restraints to the process
  • Have a capable security team for MSI to work with that has the capability to interface with the targeted lines of business in a rapid, rational and safe manner
  • If desired, have the capability to construct testing/QA platforms and networks to model real world deployments in a rapid and accurate fashion (requires rapid VM capability)
  • Be open to engaging in an exercise with an emulated aggressive adversary to establish real world risk and threat profiles
  • Be located in the US (sorry, we are not currently accepting non-US organizations for this service at this point)

If your organization meets these requirements and you are interested in discussing PPT services, please drop me a line (Twitter: @lbhuston), or via email at Info at microsolved dot com. You can also reach me via phone at (614) 351-1237 x 201.

CYBER SA for 1130Z22AUG2013

Good morning Cyber Fans –

Remember Red Dragon’s rules of cyber SA and newsworthy items – with writer deadlines both Wednesday, yesterday and the weekends are when you are likely to discover & learn about the nascent and unusual from cyber land…

In today’s edition of CYBER SA we have a decent batch of cyber related stories out of the People’s Republic of China…(中國人民共和國), news of Russia’s Cyber Initiatives; Iranian Oil going to China thanks to Hillary; proof that the United Kingdom has been definitely colonized by the Chinese under the ROE for Operation Middle Kingdom; HUAWEI’s endeavors in both Poland and Indonesia..yes and the latest silliness from our own shores…

Enjoy my friends – it is only Thursday!

Chinese Ransomlock Malware Changes Windows Login Credentials |
http://www.symantec.com/connect/blogs/chinese-ransomlock-malware-changes-windows-login-credentials
Poison Ivy RAT Spotted in Three New Attacks…ties to hackers in People’s Republic of China

Poison Ivy RAT Spotted in Three New Attacks


Revamped Aumlib, Ixeshe Malware Found in New People’s Republic of China Attacks

Revamped Aumlib, Ixeshe Malware Found in New China Attacks

In global cyber war, Silicon Valley urged to take care of own
As U.S., People’s Republic of China spar over attacks, Google others told to step up.
http://www.sltrib.com/sltrib/money/56411570-79/china-security-cyber-government.html.csp

Veterans of 2001 Sino-US cyberwar become entrepreneurs
While some veterans of the Sino-US cyberwar of 2001 remain true to the ‘spirit of geeks’, many have since carved out profitable internet businesses
http://www.scmp.com/news/china/article/1298200/hackers-entrepreneurs-sino-us-cyberwar-veterans-going-straight

People’s Republic of China: ‘An economic force to be reckoned with’ | Asia | DW.DE | 21.08.2013
http://www.dw.de/china-an-economic-force-to-be-reckoned-with/a-17036412?maca=en-rss-en-all-1573-xml-atom
People’s Republic of China Takes Aim at Western Ideas
http://www.nytimes.com/2013/08/20/world/asia/chinas-new-leadership-takes-hard-line-in-secret-memo.html?_r=1&&pagewanted=all

Surrounded: How the U.S. Is Encircling People’s Republic of China with Military Bases
US military options now must counter People’s Republic of China’s Operation Middle Kingdom in Asia Pacific….
http://killerapps.foreignpolicy.com/posts/2013/08/20/surrounded_how_the_us_is_encircling_china_with_military_bases

US, People’s Republic of China still wary of each other despite military cooperation talk
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130821000115&cid=1703

People’s Republic of China’s Rise, Disputed Territories & Competition Between Major Powers In Asia-Pacific Concern For Canada And Australia – Report
http://www.eurasiareview.com/21082013-chinas-rise-disputed-territories-and-competition-between-major-powers-in-asia-pacific-concern-for-canada-and-australia-report/?

The untold truth behind the US rebalancing policy|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1703&MainCatID=17&id=20130811000079

A gap in U.S. sanctions law allows People’s Republic of China to import more Iranian oil
http://online.wsj.com/article/SB10001424127887324619504579026333611696094.html

UK’s BBC Strikes China Content Deal…agrees to OP Middle Kingdom ROE

BBC Strikes China Content Deal


People’s Republic of China media: Online rumours
http://www.bbc.co.uk/news/world-asia-china-23776560
Xinhua reveals People’s Republic of China’s ‘Area 51’ in Inner Mongolia
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1101&MainCatID=11&id=20130821000013

Security probes into foreign companies backed by People’s Republic of China’s netizens
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130821000139&cid=1101
People’s Republic of China’s Sinochem plans further investment in Brazil’s offshore oil
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130821000010&cid=1102
People’s Republic of China’s Everbright’s strategic investments keep firm afloat after errors
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130821000062&cid=1206
People’s Republic of China arrests Weibo users for “inciting public dissatisfaction with the government”
http://www.techinasia.com/china-arrests-weibo-users-inciting-public-dissatisfaction-government/?
A Chinese Wikipedia editor is banned from leaving People’s Republic of China until 2016
http://www.techinasia.com/wikipedia-china-editor-banned-from-leaving-country/?
Indonesia’s flagship airline Garuda spotted using People’s Republic of China’s AliPay
http://www.techinasia.com/garuda-indonesia-alipay/?
Apple’s iPad sees People’s Republic of China market share shrink to 28%
http://www.techinasia.com/apple-ipad-market-share-china-shrinks-to-28-percent-q2-2013/?

What Is the People’s Republic of China Unable To Make?
http://www.ibtimes.com/chinese-companies-struggling-gain-foothold-global-market-1392949?ft=rc480
Chinese Telecom ZTE Latches Onto Firefox for Image of Privacy – The Epoch Times
http://www.theepochtimes.com/n3/255482-chinese-telecom-latches-onto-firefox-for-image-of-privacy/
People’s Republic of china to Lead – Growth in Wind Energy to Boost Global Operations and Maintenance (O&M) Market
http://www.investorideas.com/news/2013/renewable-energy/08201.asp
ChinaSoft International and Alibaba Cloud to Build Pilot Smart Government Services Cloud for Zhejiang
http://www.istockanalyst.com/business/news/6541645/chinasoft-international-and-alibaba-cloud-to-build-pilot-smart-government-services-cloud-for-zhejiang

Apple loses ground in People’s Republic of China smartphone market
http://www.eetasia.com/ART_8800688899_499488_NT_71fe3e9a.HTM
Apple Takes A Small Step Toward Boosting Its Presence In the People’s Republic of China
http://www.businessinsider.com/apple-takes-a-small-step-toward-boosting-its-presence-in-china-2013-8?
Apple’s iPad suffers drastic decline in share of Chinese tablet market while cheap competitors grow
http://appleinsider.com/articles/13/08/20/apples-ipad-suffers-drastic-decline-in-share-of-chinese-tablet-market-while-cheap-models-grow

Japan’s nuclear crisis deepens, China expresses ‘shock’
http://www.reuters.com/article/2013/08/21/us-japan-fukushima-severity-idUSBRE97K02B20130821
Malaysia’s Celcom signs five year digital services deal with People’s Republic of China’s Huawei
http://www.telegeography.com/products/commsupdate/articles/2013/08/21/celcom-signs-five-year-digital-services-deal-with-huawei/?
People’s Republic of China’s Huawei Helps Polish Government Build
…the World’s First 3.6GHz~3.8GHz eLTE Broadband Access Network
Poland is the Operation Middle Kingdom target for colonization in Eastern Europe…

http://www.istockanalyst.com/business/news/6540174/huawei-helps-polish-government-build-the-world-s-first-3-6ghz-3-8ghz-elte-broadband-access-network

Soldier of Fortune –
Memories of army life from both sides of the Chinese Civil War to a reeducation camp after the Korean War
http://english.caixin.com/2013-08-09/100567733.html

Australia’s glittering investments from People’s Republic of China are not all gold
http://www.usatoday.com/story/news/world/2013/08/20/australia-elections-china-financial-boom/2574249/?
New Zealand spy bills key up controversy
Laws expected to pass this week anger surveillance-wary New Zealanders and irk China, a major trading partner.
http://www.aljazeera.com/indepth/features/2013/08/2013812113057818160.html

Russian Military Creating Cyber Warfare Branch | Defense | RIA Novosti
http://en.ria.ru/military_news/20130820/182856856/Russian-Military-Creating-Cyber-Warfare-Branch.html
Russia Preparing New Cyber Warfare Branch, Military Official Says
http://news.softpedia.com/news/Russia-Preparing-New-Cyber-Warfare-Branch-Military-Official-Says-376807.shtml
Russia’s FSB mulls ban on ‘Tor’ online anonymity network — RT Russian
http://rt.com/politics/russia-tor-anonymizer-ban-571/

Poison Ivy: Assessing Damage and Extracting Intelligence
http://www.fireeye.com/blog/technical/targeted-attack/2013/08/pivy-assessing-damage-and-extracting-intel.html
You Had Me at NIST…謝謝您.. Persistent Threat @AdvancedThreat

You Had Me at NIST

From Nuclear Deterrence To Cyber Deterrence – OpEd
http://www.eurasiareview.com/21082013-from-nuclear-deterrence-to-cyber-deterrence/?

Dancho Danchev’s Blog – Mind Streams of Information Security Knowledge: The Cost of Anonymizing a Cybercriminal’s Internet Activities – Part Three
http://ddanchev.blogspot.nl/2013/08/the-cost-of-anonymizing-cybercriminals.html
McAfee: ‘$1 trillion global cyber crime cost was over the top’
http://www.computing.co.uk/ctg/news/2289953/mcafee-usd1-trillion-global-cyber-crime-cost-was-over-the-top

Millions stolen from US banks after ‘wire payment switch’ targeted
http://www.scmagazine.com.au/News/354155,millions-stolen-from-us-banks-after-wire-payment-switch-targeted.aspx

In ‘cyber’ Maryland, a bid for business growth
http://articles.baltimoresun.com/2013-08-16/business/bs-bz-federal-cybersecurity-industry-20130816_1_business-growth-business-group-national-cybersecurity-center

The 2013 Cybersecurity Executive Order: Potential Impacts On The Private Sector – Strategy – United States
http://www.mondaq.com/unitedstates/x/258936/technology/The+2013+Cybersecurity+Executive+Order+Potential+Impacts+on+the+Private+Sector
Resilience of the Internet Interconnection Ecosystem — ENISA
http://www.enisa.europa.eu/activities/Resilience-and-CIIP/critical-infrastructure-and-services/inter-x/interx/report

Enjoy!

Semper Fi,

謝謝
紅龍

Wednesday Cyber SA 21AUG2013 – TREMENDOUS Amount of News!

Good Wednesday Morning Fans of Cyber Mania News…

Lots of cyber related news out of the People’s Republic of China today – ENISA & NIST sound off, Islamic Republic of Iran has some noteworthy items and of course the token Russia Cyber story for the cyber fan from Leeds, UK…enjoy!

People’s Republic of China denies role in cyber-attacks on United States; Claim themselves victim of hacking – The Economic Times
http://economictimes.indiatimes.com/tech/internet/china-denies-role-in-cyber-attacks-on-united-states-claim-themselves-victim-of-hacking/articleshow/21931101.cms
Beijing’s Rising Hacker Stars…How Does Mother China React?
http://fmso.leavenworth.army.mil/documents/Beijings-rising-hackers.pdf

People’s Republic of China monitors online chatter as users threaten state hold on the internet
http://www.theguardian.com/world/2013/aug/20/china-internet-listening-citizens-views
Chinese lawyers targeted as Xi Jinping tightens control – Telegraph
http://www.telegraph.co.uk/news/worldnews/asia/china/10254632/Chinese-lawyers-targeted-as-Xi-Jinping-tightens-control.html
Xue Manzi: How Chinese social media can be a force for good
http://www.danwei.com/xue-manzi-how-chinese-social-media-can-be-a-force-for-good/

Chinese Man Who Offered To Install “Hacker” software is arrested 男子给网吧提供“黑客”软件 获刑三年罚金十万-资讯-黑基安全网
http://www.hackbase.com/news/2013-08-20/116340.html

Conflict Breeds Cyber Attacks | Analysis Intelligence
http://analysisintelligence.com/cyber-defense/conflict-breeds-cyber-attacks/?
Mapped: The 7 Governments the U.S. Has Overthrown – By J. Dana Stuster
http://www.foreignpolicy.com/articles/2013/08/19/map_7_confirmed_cia_backed_coups?page=full

PLA (中國人民解放軍)advancing laser weapons program|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130820000102&cid=1101
中國人民解放軍 (PLA) Lanzhou MAC organizes confrontation training – People’s Daily Online
http://english.people.com.cn/90786/8370233.html
More college students applying for entry into the military, Zhao Shengnan reports in Beijing.
http://english.peopledaily.com.cn/90786/8368846.html
Hagel, Chinese Defense Minister Commit To Cooperation But Tensions Clear
http://breakingdefense.com/2013/08/19/hagel-pla-leader-commit-to-cooperation-but-tensions-clear/?
People’s Republic of China, U.S. agree on new steps to enhance military cooperation – People’s Daily Online
http://english.peopledaily.com.cn/90786/8370788.html
US, People’s Republic of China (中華人民共和國) agree on new ways to enhance military cooperation|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130820000123&cid=1101
Advance toward new type of China-U.S. mil-to-mil relations – People’s Daily Online
http://english.peopledaily.com.cn/90786/8370960.html
Chinese professor warns of “democracy trap” – Xinhua | English.news.cn
http://news.xinhuanet.com/english/indepth/2013-08/20/c_132646879.htm

People’s Republic of China, U.S. Ink Deal to Counter Illicit Atomic Trafficking | GSN | NTI
http://www.nti.org/gsn/article/us-inks-multiple-deals-counter-illicit-atomic-trafficking/
Chinese shipbuilder reveals breakthrough technology – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-08/20/c_132646180.htm
CNOOC Gas undertakes China’s first floating LNG project – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-08/15/c_132633910.htm
People’s Republic of China’s Huawei And Security: The Bigger Picture
http://www.crn.com/news/networking/240160101/huawei-and-security-the-bigger-picture.htm?
People’s Republic of China’s Huawei Exec: We Need To Be A Better Communicator
http://www.crn.com/news/networking/240160097/huawei-exec-we-need-to-be-a-better-communicator.htm?

3 reasons Baidu is aiming high in Indonesia
http://www.techinasia.com/3-reasons-why-baidu-expanding-indonesia/?

Business Insider’s Reporting on the (中華人民共和國) People’s Republic of China
http://blog.hiddenharmonies.org/2013/08/business-insiders-reporting-on-china/
JPMorgan Chase Hit With China Bribery Probe
http://www.thenewamerican.com/economy/sectors/item/16360-jpmorgan-chase-hit-with-china-bribery-probe

Apple iPad market share plummets in China as domestic vendors grow
http://www.computerworld.com/s/article/9241731/Apple_iPad_market_share_plummets_in_China_as_domestic_vendors_grow?
Apple said to be close to 4G deal with China Mobile|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1204&MainCatID=12&id=20130816000097
Commentary: Well-behaved int’l firms welcomed in the People’s Republic of China – Xinhua | English.news.cn
http://news.xinhuanet.com/english/indepth/2013-08/19/c_132643309.htm
Xinhua Insight: Police reveal details of GSK China’s alleged violations – Xinhua | English.news.cn
http://news.xinhuanet.com/english/indepth/2013-07/26/c_132574386.htm

Why is China so Afraid of a Small Protest?
http://thediplomat.com/china-power/why-is-china-so-afraid-of-a-small-protest/?
With Bo Xilai on Trial, China Adopts Chongqing Model
http://thediplomat.com/china-power/with-bo-xilai-on-trial-china-adopts-chongqing-model/?

Russia Setting up Cyber Warfare Unit Under Military
http://www.ibtimes.co.uk/articles/500220/20130820/russia-cyber-war-hack-moscow-military-snowden.htm#!

Iran Trains Students to Target Drones |
http://defensetech.org/2013/08/19/iran-trains-students-to-target-drones/
Three Major Al-Qaida Forums Disrupted by DDOS Attack
http://news.softpedia.com/news/Three-Major-Al-Qaida-Forums-Disrupted-by-DDOS-Attack-376443.shtml

Digital Dao: The Cyber Kill Chain: Trademarked by Lockheed Martin?
Lockheed Martin is just angry they did not receive a $ SIX BEEELIION Cyber Contract from Uncle Sam…C’mon guys your background check would have caught the traitor Booz Allen Hamilton gave the world 🙂

http://jeffreycarr.blogspot.com/2013/08/the-cyber-kill-chain-trademarked-by.html

Infosecurity… Major Media Organizations Still Vulnerable Despite High Profile Hacks |
http://www.infosecurity-us.com/view/34043/infosecurity-exclusive-major-media-organizations-still-vulnerable-despite-high-profile-hacks/
Countering Advanced Persistent Threats with Comprehensive Network Security
http://www.infosecisland.com/blogview/23351-Countering-Advanced-Persistent-Threats-with-Comprehensive-Network-Security-.html
Total Defense | Blog | The cyber-attacks transformation
http://www.totaldefense.com/blogs/2013/08/19/the-cyber-attacks-transformation.aspx?
Angry Kitten…Electronic Warfare Development Targets Fully Adaptive Threat Response Technology
http://www.gatech.edu/newsroom/release.html?nid=228881

Thinking Differently: Unlocking the Human Domain in Support of the 21st Century Intelligence Mission | Small Wars Journal
http://smallwarsjournal.com/jrnl/art/thinking-differently-unlocking-the-human-domain-in-support-of-the-21st-century-intelligence

NIST Updates Patching and Malware Avoidance Guides
http://www.infosecurity-us.com/view/34070/nist-updates-patching-and-malware-avoidance-guides/
Thousands affected in US Energy agency breach
http://www.scmagazine.com.au/News/354011,thousands-affected-in-us-energy-agency-breach.aspx?utm_source=feedly
ENISA Report Outlines Incidents Causing Major Outages at Telcos | SecurityWeek.Com
http://www.securityweek.com/enisa-report-outlines-incidents-causing-major-outages-telcos?

Enjoy!

Semper Fi,

謝謝
紅龍

August Touchdown Task: Change Management Audit

This month’s touchdown task is to take a quick audit of your organization’s change management process. Give it a quick walkthrough.

  • Make sure that you are tracking when admins make changes to machine configurations or network device configs
  • Are proper peer review and approval processes being followed?
  • Check to make sure that the proper folks are in the loop for various kinds of communication, error handling and reporting
  • Review risk acceptance for changes and make sure it meets your expected processes
  • Examine a couple of changes and walk them through the entire process to see if things are falling through the cracks
  • Update any change management documentation to reflect new processes or technologies that may be in place now

Give this a quick review this month and you can rest assured for a while that change management is working strongly. With the coming fall and holiday rush ahead, you’ll know you have this base covered and can depend on it as a good foundation for the rest of your security initiatives. 

Until next time, as always, thanks for reading and stay safe out there! 

Cyber Threat SA for 20AUG2013

Good Tuesday morning Folks –

Much cyber news and situational awareness(SA) to take note of today…of mention is the extensive plan by the People’s Republic of China to increase bandwidth to consumers throughout the Middle Kingdom…Apple & Samsung get no love in China…Corruption in China’s State Owned Enterprise (SOE) China Mobile…

We also have a few stories on the Islamic Republic of Iran’s cyber plans and methodologies…ph yes, don’t forget about North Korean and Pakistan too.., for a complete discussion on the nation states – you really should view and apply to join their respective LinkedIn discussion Groups….
http://www.linkedin.com/groups/Iranian-Cyber-Warfare-4217323?trk=myg_ugrp_ovr and http://www.linkedin.com/groups/North-Korean-Cyber-Warfare-4223285?trk=myg_ugrp_ovr….

Enjoy tomorrow’s cyber news today…

Cyber – the good, the bad and the bug-free
http://www.nato.int/docu/review/2013/Cyber/EN/

中國人民共和國

China’s Report on US Military Cyber Troop Strength
http://goo.gl/0ouvjn
Broadband blueprint to facilitate China’s economic restructuring – Xinhua | English.news.cn |
http://news.xinhuanet.com/english/indepth/2013-08/19/c_132643900.htm
BEIJING: People’s Republic of China in big push against opinion-leading blogs – Technology
http://www.miamiherald.com/2013/08/19/3571859/china-in-big-push-against-opinion.html
Chang meets Hagel for Sino-US Pentagon talks
http://www.scmp.com/news/china/article/1297773/chang-meets-hagel-sino-us-pentagon-talks
Pacifying the Maoists
http://www.economist.com/blogs/analects/2013/08/bo-xilai-s-trial
Chinese Politiks…Blasts from the past
http://www.economist.com/blogs/analects/2013/08/chinese-politics
Degrees of Uncertainty in the People’s Republic of China’s Future –
http://english.caixin.com/2013-08-17/100571121.html

People’s Republic of China’s Huawei offends Pakistan with independence day message
http://www.techinasia.com/huawei-steps-political-minefield-independence-day-message-pakistan/?\
Yahoo’s email service is now closed in People’s Republic of China
http://www.techinasia.com/yahoo-china-email-service-now-shut/?
This new startup connects developers with China’s multitude of Android app stores
Significant cyber avenues of approach…

http://www.techinasia.com/appinchina-distributes-apps-to-top-china-android-app-stores/?
Philippines, Taiwan Conflict Results in Cyber Firefight | Analysis Intelligence
http://analysisintelligence.com/cyber-defense/philippines-taiwan-cyberwar/
China Steps Up Anti-Monopoly Probe in Oil and Telecom中国掀反垄断风暴 央企无豁免权_财经频道_一财网
http://www.yicai.com/news/2013/08/2942628.html
Another China Mobile Exec Investigated on Suspicion of Corruption –
http://english.caixin.com/2013-08-19/100571515.html
People’s Republic of China’s Alibaba Buys Stake in U.S. Online Vendor 阿里巴巴投资美国电商 “国际化”增加估值_财经频道_一财网
http://www.yicai.com/news/2013/08/2948460.html
People’s Republic of China’s Lenovo Continues Inexorable Rise Towards World Domination
http://www.ibtimes.co.uk/articles/499290/20130815/lenovo-continues-inexorable-rise-towards-world-domination.htm
Chinese consumers losing interest in Apple and Nokia and turn to Samsung and domestic brands
http://www.phonearena.com/news/Chinese-consumers-losing-interest-in-Apple-and-Nokia-and-turn-to-Samsung-and-domestic-brands_id46531?
Baidu Deal May Reduce App Piracy in the People’s Republic of China
http://www.nytimes.com/2013/08/19/business/global/baidu-deal-may-reduce-app-piracy-in-china.html?
US probes JP Morgan China staff
http://www.bbc.co.uk/news/business-23750199

Liaoning will serve as the commanding ship of PLA Navy:…
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130819000007&cid=1101

Not Really Made in China (or the United States)
http://economix.blogs.nytimes.com/2013/08/19/not-really-made-in-china-or-the-united-states/?

Cyber Security in South Korea: The Threat Within
http://thediplomat.com/2013/08/19/cyber-security-in-south-korea-the-threat-within/?all=true

Blogs begin to play a prominent political role | Russia
http://rbth.ru/politics/2013/08/19/blogs_begin_to_play_a_prominent_political_role_29015.html

MTNL’s Mumbai website hacked by Pakistani hacker:
http://www.ibtimes.co.in/articles/499648/20130817/mtnl-website-cyber-attack-pakistan-hacker-india.htm

The Convenient Timing of Iran-Linked Hacker Operations | Analysis…
http://analysisintelligence.com/cyber-defense/iran-linked-cyber-teams/?
Iran’s Top Diplomat to Take Key Nuclear Complex Post |
http://www.nti.org/gsn/article/irans-top-diplomat-takes-key-nuclear-post/
CIA Confirms Role in 1953 Iran Coup
Documents Provide New Details on Mosaddeq Overthrow and Its Aftermath
http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB435/

Al-Qaida Members Seen Using Chat Rooms to Plan Attacks |
http://www.nti.org/gsn/article/al-qaida-members-seen-using-chat-rooms-plan-attacks/

U.S. Dept. of Energy reports second security breach
http://www.csoonline.com/article/738230/u.s.-dept.-of-energy-reports-second-security-breach?
U.S. power plants, utilities face growing cyber vulnerability
http://www.homelandsecuritynewswire.com/dr20130819-u-s-power-plants-utilities-face-growing-cyber-vulnerability
Cyber security economics like a Ponzi scheme: Gartner
http://www.techworld.com.au/article/524067/cyber_security_economics_like_ponzi_scheme_gartner/?
ZeuS-P2P internals – understanding the mechanics: a technical report
http://www.cert.pl/news/7386/langswitch_lang/en
A Closer Look: Perkele Android Malware Kit — Krebs on Security
http://krebsonsecurity.com/2013/08/a-closer-look-perkele-android-malware-kit/
DIY automatic cybercrime-friendly ‘redirectors generating’ service spotted in the wild
http://blog.webroot.com/2013/08/19/diy-automatic-cybercrime-friendly-redirectors-generating-service-spotted-in-the-wild/

Enjoy!

Semper Fi,

謝謝
紅龍

Global Cyber SA for MON 19AUG2013

Good Monday morning folks;

Tremendous amount of cyber news from around the globe today – enjoy…

The first section has a rather lengthy series of stories related to the People’s Republic of China…including hacking, cuber warfare, the economy, and cyber crime…please take a look at the ‘cyber-mainia’ section which really illustrates the prevailing calm before the cyber storm…

Enjoy!

People’s Republic of China’s “Warfare” Strategies and Tactics
http://thediplomat.com/2013/08/16/chinas-warfare-strategies-and-tactics/?all=true

Don’t Buy the Cyberhype
How to Prevent Cyberwars From Becoming Real Ones
http://www.foreignaffairs.com/articles/139819/martin-c-libicki/dont-buy-the-cyberhype?page=show
Cyberwar Is Mostly Bunk
http://reason.com/archives/2013/08/16/cyberwar-is-mostly-bunk
Cyberwar: nerds to the front! | World | DW.DE | 08.08.2013
http://www.dw.de/cyberwar-nerds-to-the-front/a-17004851
The Changing and Terrifying Nature of the New Cyber-Warfare
http://www.vanityfair.com/culture/2013/07/new-cyberwar-victims-american-business?mbid=social_retweet?mbid=social_mobile_tweet
The cyberwar against the media
http://www.politico.com/story/2013/08/the-cyberwar-against-the-media-95527.html

US Facing Barriers in Cyber Talks with People’s Republic China…
No kidding…no one in USGOV careerland (e,g, Painter) speaks or understands…信 息作战, 網絡戰, 网 络战 or 信 息战争…

http://www.defensenews.com/article/20130813/DEFREG02/308130008/US-Facing-Barriers-Cyber-Talks-China
Chinese government evaluating IBM, Oracle, EMC for security risks | Electronista
http://www.electronista.com/articles/13/08/15/move.by.ministry.of.public.security.response.to.prism.huawei.allegations/
How to protect yourself when outsourcing to China
http://online.wsj.com/article/SB10001424127887323681904578639461757495312.html?
Baidu Deal May Reduce App Piracy in China
http://www.nytimes.com/2013/08/19/business/global/baidu-deal-may-reduce-app-piracy-in-china.html?_r=0&pagewanted=all
IBM, Oracle, EMC Targeted In People’s Republic of China Security Probe: Report
The cyber tech cold war continues….

http://www.ibtimes.com/ibm-oracle-emc-face-probe-china-over-security-concerns-chinese-media-report-1388071?ft=a73y7
Goldman, Morgan Stanley in talks to buy stake in People’s Republic of China’s Huarong: FT
http://www.reuters.com/article/2013/08/16/us-huarong-china-idUSBRE97F08Y20130816

Will Lockheed Martin Risk People’s Republic of China’s Wrath by Supplying 66 F-16s to Taiwan? (LMT)
http://www.fool.com/investing/general/2013/08/18/will-lockheed-martin-supply-66-f-16s-to-taiwan.aspx
30 Boeing Attack Helicopters Headed for Taiwan (BA)
http://www.fool.com/investing/general/2013/08/18/30-boeing-attack-helicopters-headed-for-taiwan.aspx

People’s Republic of China’s voyage of discovery to cross the less frozen north
http://www.theguardian.com/world/2013/aug/18/china-northeastern-sea-route-trial-voyage

Are Chinese Hackers Really From China?
http://hacksurfer.com/amplifications/210-are-chinese-hackers-really-from-china?

Network-Centric Warfare in Asia
http://www.isn.ethz.ch/Digital-Library/Articles/Detail/?lng=en&id=167921

China’s New “Secret Stimulus” Program: Likonomics Is Dead
http://www.forbes.com/sites/gordonchang/2013/08/18/chinas-new-secret-stimulus-program-likonomics-is-dead/

People’s Republic of China Says Broadband Speeds Of 20 Mbps By 2015
http://www.forbes.com/sites/kenrapoza/2013/08/18/china-says-broadband-speeds-of-20-mbps-by-2015/

Ethiopia signs mobile expansion deal with People’s Republic of China’s ZTE
http://www.foxnews.com/world/2013/08/18/ethiopia-signs-mobile-expansion-deal-with-china-zte/?

China’s Everbright probed over share spike | Reuters
http://uk.reuters.com/article/2013/08/18/china-everbright-idUKL4N0GJ05K20130818?
People’s Republic of China Everbright Bank joins hands with telecom giant in mobile finance – Xinhua
http://news.xinhuanet.com/english/china/2013-08/18/c_132641264.htm
People’s Republic of China expects nationwide broadband by 2020 – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-08/17/c_132639104.htm
IT key to economic future: State Council – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-08/15/c_132633025.htm
Efforts stepped up to curb fraudulent ID card use – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-08/15/c_132632856.htm
Agency fails to disclose full evaluation of China’s state-run firms|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130814000084&cid=1502

‘United Asean will try to convince China on sea code of conduct’ |
http://www.thejakartapost.com/news/2013/08/19/united-asean-will-try-convince-china-sea-code-conduct.html

N.Korea’s Vast Cyber Warfare Army
http://english.chosun.com/site/data/html_dir/2013/08/13/2013081300891.html
“IDF 8200 (cyberwar unit) is the best technology school on earth”
http://www.opednews.com/articles/IDF-8200-cyberwar-unit–by-Joseph-Zernik-130816-906.html

Gen. Dempsey: U.S. military options against Iran “better” than last year
http://www.homelandsecuritynewswire.com/dr20130815-gen-dempsey-u-s-military-options-against-iran-better-than-last-year

Threshold for kinetic response to cyber higher than for physical attack
http://www.fiercegovernmentit.com/story/threshold-kinetic-response-cyber-higher-physical-attack-says-paper/2013-08-15

“Estimating the cost of cyber crime and espionage”
http://outsidelens.scmagazine.com/video/Estimating-the-Cost-of-Cyber-Cr;recent
Cyber criminals add new exploit for recently patched Java vulnerability to their arsenal
http://images.infoworld.com/d/security/cyber-criminals-add-new-exploit-recently-patched-java-vulnerability-their-arsenal-225058?

Industrial control ‘honeypots’ show systems are under attack
http://gcn.com/articles/2013/08/07/ics-honeypots.aspx

Researchers Seek Better Ways To Track Malware’s Family Tree
http://m.darkreading.com/133696/show/feee44982d70974da336f56262ce9c84/?

Encryption is less secure than we thought
For sixty-five years, most information-theoretic analyses of cryptographic systems have made a mathematical assumption that turns out to be wrong.

http://www.homelandsecuritynewswire.com/dr20130815-encryption-is-less-secure-than-we-thought

Semper Fi,

謝謝
紅龍

China & Global Cyber SA for 16AUG2013

Good Friday Everyone!

What sort of cyber situation awareness do we have today? Much news about the People’s Republic of China – it is relentless…we now have Frutas and news of other exploits taking advantage of poorly secured systems and infrastructure…

Enjoy!

China China China hack hack hack redux | Beyond The Beyond | Wired.com
http://www.wired.com/beyond_the_beyond/2013/08/china-china-china-hack-hack-hack-redux-2/
NY Times website down for HOURS. Hacked by People’s Republic of Hacking…err…China again?
http://blogs.computerworld.com/ny-times-website-down-hacked-china-22652-itbwcw
They’re ba-ack: Hacker gang that infiltrated NYT for months returns
http://arstechnica.com/security/2013/08/theyre-ba-ack-hacker-gang-that-infiltrated-nyt-for-months-returns/
The Chinese hacker group that hit the N.Y. Times is back with updated tools
The APT 12 hacker group has updated its malware programs to evade network-level detection

http://www.computerworld.com/s/article/9241577/The_Chinese_hacker_group_that_hit_the_N.Y._Times_is_back_with_updated_tools?taxonomyId=17

Frutas RAT…Targeted Attacks Delivering Fruit |
http://www.symantec.com/connect/blogs/targeted-attacks-delivering-fruit
8,700 Chinese detained for online crime–China Economic Net
http://en.ce.cn/National/Politics/201308/14/t20130814_1186553.shtml
Information consumption to fuel People’s Republic of China’s economic growth – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-08/15/c_132633835.htm
All the facts and stats on the People’s Republic of China’s 591 million web users (INFOGRAPHIC)
http://www.techinasia.com/china-591-million-web-users-infographic-2013/?
Merger spree hits People’s Republic of China’s Internet giants–China Economic Net
http://en.ce.cn/Insight/201308/15/t20130815_1221087.shtml
People’s Republic of China: Language and Censorship in State Media – China Digital Times (CDT)

Language and Censorship in State Media


The new president’s “rule of law” campaign apparently doesn’t apply to the Communist Party.
http://www.globalpost.com/dispatch/news/regions/asia-pacific/china/130813/no-james-madisons-here-china-arrests-dozens-citizens

People’s Republic of China could target oil firms, telecoms, banks in price probes: report
http://www.reuters.com/article/2013/08/15/us-china-antitrust-ndrc-idUSBRE97E04U20130815
People’s Republic of China’s Lenovo Sells More Mobiles Than PCs Now As It Rides High On Chinese Demand | TechCrunch

Lenovo Sells More Mobiles Than PCs Now As It Rides High On Chinese Demand


New iPhone, 4G technology may mean Apple, China Mobile tie-up closer
http://www.reuters.com/article/2013/08/14/us-chinamobile-apple-idUSBRE97D18Y20130814
WeChat passes 100 million users outside the People’s Republic of China =Hacker Force Multiplier…
http://www.telegraph.co.uk/technology/10244264/WeChat-passes-100-million-users-outside-China.html
HTC Changes China Chief
http://blogs.wsj.com/digits/2013/08/15/htc-changes-china-chief/?

Guam to host security conference: National experts and intelligence analysts to discuss US, Asia strategies
http://www.guampdn.com/article/20130815/NEWS01/308150006/1002/NEWS01

Western defense firms refuse Chinese buyers to deter copycats|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130815000117&cid=1101

People’s Republic of Chain’s PetroChina poised to dominate Iraqi oil–China Economic Net
OIL = Operation Iraqi Liberation

http://en.ce.cn/Business/Enterprise/201308/14/t20130814_1186662.shtml

People’s Republic of China’s banking assets top 23 trln USD by June 2014 –China Economic Net
http://en.ce.cn/Industries/Financial-services/201308/14/t20130814_1187002.shtml
People’s Republic of china’s Zhongguancun may host private bank–China Economic Net
http://en.ce.cn/Industries/Financial-services/201308/14/t20130814_1187005.shtml

The Trauma of Colonialism…People’s Republic of China says”Now it is China’s prerogative”
Operation Middle Kingdom = People’s Republic of China’s colonization of the West…

http://www.nytimes.com/2013/08/15/opinion/global/the-trauma-of-colonialism.html?

People’s Republic of China probe into optical fibers from India–China Economic Net
http://en.ce.cn/Business/ti/201308/15/t20130815_1224772.shtml

Taiwanese firm faces patent infringement probe in US|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1204&MainCatID=12&id=20130623000023

People’s Republic of China strongly condemns Japan over shrine visit – Xinhua |
http://news.xinhuanet.com/english/china/2013-08/15/c_132633571.htm
People’s Republic of China urges Japan to respect victims of wartime ‘aggression’ –
http://english.sina.com/china/2012/0815/496714.html
Beijing urges Japan to reflect on wartime aggression|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1101&MainCatID=11&id=20130815000153
Taiwan urges Japan not to hurt feelings of its neighbors|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1101&MainCatID=11&id=20130815000144
Right-wing Japan challenging postwar order, experts warn|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1101&MainCatID=11&id=20130815000141

Iranian Internet Infrastructure and Policy Report
http://smallmedia.org.uk/IIIPJune.pdf
Syrian Electronic Army Hacks Washington Post
http://www.security-vision.co.uk/?p=3456&doing_wp_cron=1376589588.6183819770812988281250

IT Security Industry To Expand Tenfold
http://www.forbes.com/sites/richardstiennon/2013/08/14/it-security-industry-to-expand-tenfold/
Aggressive defence needed against cyber threats…from Canada no less…
http://www.ottawacitizen.com/news/Aggressive+defence+needed+against+cyber+threats+expert+says/8789398/story.html

Browlock Ransomware Targets New Countries –
http://www.f-secure.com/weblog/archives/00002590.html
Researchers figure out how to hack tens of thousands of servers
http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/14/researchers-figure-out-how-to-hack-tens-of-thousands-of-servers/

How A ‘Deviant’ Philosopher Built Palantir, A CIA-Funded Data-Mining Juggernaut
http://www.forbes.com/sites/andygreenberg/2013/08/14/agent-of-intelligence-how-a-deviant-philosopher-built-palantir-a-cia-funded-data-mining-juggernaut/

Latest NSA Archive Release…The Secret History of the U-2 & other treats…
1) US Spy Planes Targeted China to Help India; Used British Crews to “Confuse the Soviets” and Overflew French Nuclear Sites
2) Groom Lake/Area 51 Finally Declassified
Less Redacted CIA History Released Under FOIA
3) National Security Archive Electronic Briefing Book No. 434

http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB434/

Enjoy my curious friends!!!

Semper Fi,

謝謝
紅龍