Internet Anthropologist Think Tank: RUMINT, China

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Thursday, May 29, 2008

    RUMINT, China


    This just in: Authorities in three West European countries have arrested ten individuals whom they believe to have links to Islamic Extremist factions in Uzbekistan. It is reported that those arrested were obtaining funding for a militant group within Uzbekistan that allegedly has ties with al-Qaida.

    Yuldeshev and his Uzbeks are going to be trouble, many are Russian Army trained, very disciplined and they play rough. Rumors are that the Chinese are terrified of them regarding the Olympics, talk of a dirty bomb there. The Uzbeks would do it and they have all the access they need with the Tibetans

    SOURCED Co C.

    xxxxxxxxxxxxxxxxxx

    Excerpts:
    China's Cyber Militia

    by Shane Harris

    One prominent expert told National Journal he believes that China's People's Liberation Army played a role in the power outages. Tim Bennett, the former president of the Cyber Security Industry Alliance, a leading trade group, said that U.S. intelligence officials have told him that the PLA in 2003 gained access to a network that controlled electric power systems serving the northeastern United States. The intelligence officials said that forensic analysis had confirmed the source, Bennett said. "They said that, with confidence, it had been traced back to the PLA." These officials believe that the intrusion may have precipitated the largest blackout in North American history, which occurred in August of that year. A 9,300-square-mile area, touching Michigan, Ohio, New York, and parts of Canada, lost power; an estimated 50 million people were affected.....There has never been an official U.S. government assertion of Chinese involvement in the outage, but intelligence and other government officials contacted for this story did not explicitly rule out a Chinese role. One security analyst in the private sector with close ties to the intelligence community said that some senior intelligence officials believe that China played a role in the 2003 blackout that is still not fully understood.
    ..............

    The Central Intelligence Agency's chief cyber-security officer, Tom Donahue, said that hackers had breached the computer systems of utility companies outside the United States and that they had even demanded ransom. Donahue spoke at a January gathering in New Orleans of security executives from government agencies and some of the nation's largest utility and energy companies. He said he suspected that some of the hackers had inside knowledge of the utility systems and that in at least one case, an intrusion caused a power outage that affected multiple cities. The CIA didn't know who launched the attacks or why, Donahue said, "but all involved intrusions through the Internet."

    ......................
    "Cyber-networks are the new frontier of counterintelligence," Brenner emphasized. "If you can steal information or disrupt an organization by attacking its networks remotely, why go to the trouble of running a spy?"

    Stephen Spoonamore, CEO of Cybrinth, a cyber-security firm that works for government and corporate clients, said that Chinese hackers attempt to map the IT networks of his clients on a daily basis. He said that executives from three Fortune 500 companies, all clients, had document-stealing code planted in their computers while traveling in China, the same fate that befell Gutierrez.


    .................

    Private Sector Foot-Dragging

    There is little indication that cyber-intrusions, however menacing, have severely impaired government operations for very long. So why are so many officials increasingly sounding the alarm about network attacks, Chinese hacking and espionage, and the advent of cyberwar?

    Part of the answer lies in officials’ most recent appraisals of the cyber-threat. They cite evidence that attacks are increasing in volume and appear engineered more to cause real harm than sporadic inconvenience. Without naming China, Robert Jamison, the top cyber-security official at DHS, told reporters at a March briefing, “We’re concerned that the intrusions are more frequent, and they’re more targeted, and they’re more sophisticated.”

    “In terms of breaches within government systems, it’s something that has happened quite a bit over the last six, seven years,” says Shannon Kellogg, the director of information-security policy for EMC Corp., which owns RSA, a top cyber-security research firm. “But the scale of these types of breaches and attacks seems to have increased substantially.”

    Government officials are more concerned now than in recent years about the private sector’s inability, or unwillingness, to stop these pervasive attacks. When Donahue, the CIA cyber-security officer, warned the gathering in New Orleans about foreign hackings of power plants, some saw it as a direct challenge to American companies.


    .......................

    The Air Force is in the process of setting up a Cyberspace Command, headed by a two-star general and comprising about 160 individuals assigned to a handful of bases. As Wired noted in a recent profile, Cyberspace Command "is dedicated to the proposition that the next war will be fought in the electromagnetic spectrum and that computers are military weapons." The Air Force has launched a TV ad campaign to drum up support for the new command, and to call attention to cyberwar. "You used to need an army to wage a war," a narrator in the TV spot declares. "Now all you need is an Internet connection."


    SOURCED: MUCH MORE:

    xxxxxxxxxxxxxxxxx

    Internet Anthropologist cyber team has pointed out that the WWW is currently at risk.

    And emailed DHS's NICC information on a new NEW VECTOR EXPLOIT.
    and have yet to hear back from them, " it " can walk thru all current security programs and Vista isn't even a constraint, nor are MACs.

    Our sources place the number of Chinese hackers in the 11,000 range.

    Paradigm Intel indicates we are in the middle of a massive invisible infection, motive unknown.
    To see the evidence on your PC down load "Haute secure".
    ( we have no connection to this compan.)


    Gerald
    Internet Anthropologist, ad Magnum

    .


    xxxxxxxxxxxx

    Chinese perspective (w/corrections ) American Economy


    China's actions should trigger SEC. Investigation Insider Trading...


    China hackers penetrate Pentagon ...


    China blackmailing USA, China ...



    Beijing will not do Anything against Iran's Interests

    Pearl Harbor of cyber war

    China is presenting some NEW dangerous paradigm threats in asymmetrical warfare.
    ( and don't forget space weapons, and their new supersonic evasive missiles, ie aircraft carriers )

    Labels: , , , ,

    0 Comments:

    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home