Good morning from Abu Dhabi – yes I know it is Zero Dark Thirty here… thank you my Australian friends for pointing that out…
The restless, passionate and wicked never sleep…
Nonetheless, here is the latest Cyber Threat Intelligence you need to be aware of…
This one is my favorite! IN fact this is a very well written article…
Chinese Cyber Espionage: Don’t Believe the Hype
http://securitywatch.pcmag.com/security/311911-chinese-cyber-espionage-don-t-believe-the-hype
Of course, then this list of compromised US Military technology is also hype, isn’t?
The following is reproduced from the nonpublic version of the Defense Science Board report “Resilient Military Systems and the Advanced Cyber Threat” as posted originally by the Washington Post:
Table 2.2 Expanded partial list of DoD system designs and technologies compromised via cyber exploitation
SYSTEM DESIGNS
Terminal High Altitude Area Defense
Patriot Advanced Capability-3
Extended Area Protection and Survivability System (EAPS)
F-35
V-22
C-17
Hawklink
Advanced Harpoon Weapon Control System
Tanker Conversions
Long-term Mine Reconnaissance System
Global Hawk
Navy antenna mechanisms
Global Freight Management System
Micro Air Vehicle
Brigade Combat Team Modernization
Aegis Ballistic Missile Defense System
USMC Tracked Combat Vehicles
Warfighter Information Network-Tactical (WIN-T)
T700 Family of Engines
Full Authority Digital Engine Controller (FADEC)
UH-60 Black Hawk
AMRAAM (AIM-120 Advanced Medium-Range Air-to-Air Missile)
Affordable Weapons System
Littoral Combat Ship
Navy Standard Missile (SM-2,3,6)
P-8A/Multi-Mission Aircraft
F/A and EA-18
RC-135 Detect./Collect.
Mk54 Light Weight Torpedo
TECHNOLOGIES
Directed Energy
UAV video system
Specific Emitter identification
Nanotechnology
Dual Use Avionics
Fuze/Munitions safety and development
Electronic Intelligence Processing
Tactical Data Links
Satellite Communications
Electronic Warfare
Advanced Signal Processing Technologies for Radars
Nanostructured Metal Matrix Composite for Light Weight Ballistic Armor
Vision-aided Urban Navigation & Collision Avoidance for Class I Unmanned Air Vehicles (UAV)
Space Surveillance Telescope
Materials/processing technologies
IR Search and Track systems
Electronic Warfare systems
Electromagnetic Aircraft Launch
Rail Gun
Side Scan sonar
Mode 5 IFF
Export Control, ITAR, Distribution Statement B,C,D Technical Information
CAD drawings, 3D models, schematics
Software code
Critical technology
Vendor/supply chain data
Technical manuals
PII (email addresses, SSN, credit card numbers, passwords, etc.)
Attendee lists for program reviews and meetings
Indeed – don’t believe the hype, these are not the Chinese Hackers you are looking for…they already took your data! 🙂
Chinese vice premier, military leader meet US nat’l security adviser
http://english.peopledaily.com.cn/90883/8261728.html
China demonstrates defence determination to US: ministry
http://english.peopledaily.com.cn/90786/8223335.html
People’s Republic of Hacking: Chinese hackers ‘access sensitive US weapons systems’
Russia Uses ‘Single Register’ Law To Selectively Block Internet Content
Semper Fi,
謝謝
紅龍
Day Three Homeland Security Summit Middle East…Cyber Threat Intelligence SA | MSI :: State of Security http://t.co/MJbkSxVcqI
Day Three Homeland Security Summit Middle East…Cyber Threat Intelligence SA | MSI :: State of Security http://t.co/9sdEyXWBYS