After the debate, it would appear Trump has very little clue what to do when it comes to the cybersecurity. While Hillary Clinton suggested Russia was one of the main culprits behind the DNC hack, Trump had his own take on the situation. In response to his suggestion it was a 400-pound hacker, everyone on Twitter referenced the same TV show.
Anonymous’ latest exploits haven’t been impressive. It went after the Klu Klux Klan,
but produced only a dubious list of alleged Klansmen. It went after
Donald Trump, exposing some basic personal information and doing
absolutely nothing to his campaign.
The age of Anonymous, the years it was known for exposing
institutional corruption and taking down major government websites,
might well be over. But Anonymous’ influence reaches far beyond its own operations. The secretive hacktivist group inspired a generation of rebels ready to wreak havoc. Hollywood Leaks, Ghost Sec, Lulzsec and more are carrying the torch.
In the next two weeks, I will be making a motion graphics piece that will be a PSA on cyber war. The question is what is the definition of cyber warfare? I will be explaining the grey area that is being debated in the new Cyber Defense Sector of the US Government. When is the line crossed during a cyber attack and becomes an act of war? The US Government has not taken the proper precautions in cyber defense. The US is leaning more towards only taking action once a catastrophic event similar to 9/11 or Pearl Harbor occur. The US feels like the only way to a strong defense is a strong offense. This video explains what cyber war is, and how the US is going about securing national security. The is some research for my PSA coming up. The government needs to speed up their process on securing public safety throughout cyberspace. Plans for securing vital infrastructure is key, because that is the worst case senario for America.
A leading computer security firm has used logs produced by a single server to trace the hacking of more than 70 corporations and government organizations over many months, and experts familiar with the analysis say the snooping probably originated in China.
Among the targets were the Hong Kong and New York offices of the Associated Press, where unsuspecting reporters working on China issues clicked on infected links in e-mail, the experts said.
Other targets included the networks of the International Olympic Committee, the United Nations secretariat, a U.S. Energy Department lab, and a dozen U.S. defense firms, according to a report released Wednesday by McAfee, a security firm that monitors network intrusions around the world.
McAfee said hundreds of other servers have been used by the same adversary, which the company did not identify.
But James A. Lewis, a cybersecurity expert at the Center for Strategic and International Studies, said “the most likely candidate is China.” The target list’s emphasis on Taiwan and on Olympic organizations in the run-up to the Beijing Games in 2008 “points to China” as the perpetrator, he said. “This isn’t the first we’ve seen. This has been going on from China since at least 1998.”
Lets not get too excited. This could have been a useful political tool to bargain with the PRC all the way through the 2000s if successive western governments hadn’t decided to look the other way. The question is: Can they afford to not pay attention now?
Guess what, everybody? Arabs and Israelis have found a new way to hate each other. Since the turn of the year, a hacking war has been taking place in the Middle East. The conflict was primarily ignited by two guys: one called “0xOmar,” who’s battling for Saudi Arabia and claims to be from the Saudi capital of Riyadh, and another called (confusingly) “OxOmer,” aka Omer Cohen, an IDF soldier and proud Israeli. Between them, these two men have been leading newly-formed legions of keyboard warriors in a rush and a push to spill the other side’s credit card details all over the web and generally make their lives as tedious and annoying as possible.
In the old nuclear age, you could sit under a big screen under a mountain in Colorado and you could see where the missiles were coming from. If there’s a cyber attack from China or Russia or Romania or Mexico, it may well run through a server in another country. And it may take months before you know where it really came from.
New York Times’ chief Washington correspondent David Sanger on cyberattacks.