Archive for the ‘Cyber Warfare’ Category

CHINA AND ARTIFICIAL INTELLIGENCE

Thursday, December 5th, 2019

 

Another very unsettling article about the future of Artificial Intelligence and how China will probably be able to use our own data information against us.
We are about to enter a whole new world !  Nancy
 

Artificial Intelligence and the Adversary

What will Beijing do with the data it stole about American military service members and others?

By Samantha Ravich    Ms. Ravich is chairman of the Center on Cyber and Technology Innovation at the Foundation for Defense of Democracies and serves as a co-chairman of the Secretary of Energy Advisory Board’s Artificial Intelligence Working Group.
Wednesday, December 4, 2019

The potential benefits of artificial intelligence are proclaimed loudly, for all to hear. The dangers, however, are discussed quietly among national-security experts. The time has come to bring the general population into the discussion.

The benefits are enticing. With AI, the future promises longer life expectancy, increased productivity, and better preservation of precious resources. You will be able to take a picture of a mole on your leg and send it electronically to a dermatologist, who will use deep neural networks to determine whether it is skin cancer. Data-driven sensors and drones will determine the perfect amount of pesticide and water to promote agricultural diversity and counter monocropping. The AI revolution in transportation will herald autonomous planes, trains and automobiles. Music will be created to improve not only mood but heart rate and brain activity.

But we should know by now that advanced technology can also be used for ill. The whispered worst-case scenarios stem from malign actors gaining control of the massive data sets that will train machines to compute faster, better and perhaps with more-penetrating insight.

A fierce contest between the U.S. and China is under way over who will dominate this new frontier. The Chinese Communist Party has proclaimed that it will become the world’s leader in AI by 2030. Already China is hard at work, building out 5G networks world-wide and launching a new cryptocurrency as part of a strategy of “eco-political terraforming,” or building a world that will enable it to control massive amounts of information and use it for political and economic advantage. Beijing already hoards vast quantities of data about its own 1.4 billion people, none of whom have privacy rights under the Communist regime.

Nevertheless, Beijing isn’t satisfied. It has turned its sights on the U.S. and has already exfiltrated some of the most sensitive information on the American people and military. These include repeated breaches since 2013 of medical systems and databases, and the decadelong targeting of the U.S. Navy’s ship-maintenance records and the names and personal details of 100,000 of its personnel.

In time, through artificial intelligence, China will be able to use Americans’ data against us. Personalized medical records could become personalized bioweapons, for instance. In 2017 Zhang Shibo, a retired Chinese general, wrote that biotech could provide China an offensive capability through the creation of “specific ethnic genetic attacks.” As for the stolen Navy data, understanding how the U.S. maintains its fleets will help China point out vulnerabilities in U.S. weapons systems and ship design to be exploited during a confrontation.

(more…)

Share

ARTIFICIAL INTELLIGENCE AND OUR FUTURE

Tuesday, December 3rd, 2019

 

WASHINGTON EXAMINER

Embracing AI: How thinking weapons will simplify — and vastly complicate — future warfare

  Jamie McIntyre is the Washington Examiner’s senior writer on defense and national security. His morning newsletter, “Jamie McIntyre’s Daily on Defense,” is free and available by email subscription at dailyondefense.com. | November 14, 2019

For the Pentagon, it was an ominous glimpse into the future.

The date was July 11, 2014, and Ukrainian forces assembled about five miles from the Russian border in southeastern Ukraine were preparing for a final push to the border.

As Defense Secretary Mark Esper recounted to a forum sponsored by the National Security Commission on artificial intelligence this month, the Ukrainian troops, flushed with recent battlefield success against Russian-backed separatists, were feeling confident.

Suddenly, they heard the hum of Russian drones overhead, followed quickly by cyberattacks that jammed their communications, blinding their command and control systems.

Then a devastating fusillade of Russian artillery fire rained down on them, and in a matter of minutes, dozens of Ukrainian soldiers were killed, hundreds more wounded, and most of their armored vehicles destroyed.

The Ukrainian offensive was stopped dead in its tracks.

“The world was quickly awakened to a new era of warfare advanced by the Russians,” Esper said. “It’s clear the threats of tomorrow are no longer the ones we have faced and defeated in the past.”

Fast forward five years to today when rapid advances in artificial intelligence technology, or AI, foreshadow a grave new world of thinking machines and killer robots that will change the nature of modern warfare as profoundly as smart bombs and GPS did during the 1991 Persian Gulf War nearly three decades ago.

“Whichever nation harnesses AI first will have a decisive advantage on the battlefield for many, many years,” said Esper, who has made accelerating AI research and development a top Pentagon priority. “We have to get there first.”

Simply defined, artificial intelligence is the ability of computer systems to solve problems and perform tasks that would otherwise require human intelligence.

(more…)

Share

AMAZON’S CEO OWNS A TERROR-LINKED PAPER

Tuesday, August 20th, 2019

 

AMAZON’S CEO OWNS A TERROR-LINKED PAPER
The Washington Post’s ties to Islamic terrorists are a national security risk.
August 16, 2019   Daniel Greenfield  Daniel Greenfield, a Shillman Journalism Fellow at the Freedom Center, is an investigative journalist and writer focusing on the radical Left and Islamic terrorism

Millions of Americans brought Alexa into their homes only to learn, belatedly, that not only software, but human beings, were listening in on them. Amazon employees and contractors from Costa Rica to India were caught reviewing thousands of recordings, of casual requests, private conversations and intimate moments, and sharing clips that they thought were funny in chat sessions with each other.

The Amazon product is always listening and maintains recordings of your conversations indefinitely.

But now there’s something bigger at stake than privacy violations. Amazon expects a $10 billion cloud contract for the military. The $10 billion contract was a sweetheart deal for a politically influential company that seemed unstoppable until President Trump suddenly slammed the brakes on JEDI.

The deal had always been dubious and many critics had questioned how or why a single company could expect to have a monopoly on the JEDI cloud for the United States military. Amazon’s cloud business is huge, but the Capital One breach of 100 million credit card applications by a former Amazon employee highlighted the company’s security and workforce issues. Capital One kept its data in the cloud through AWS or Amazon Web Services and the hacker was a former AWS employee with specialized knowledge.

In the Obama era, Amazon had received a $600 million cloud contract that covers all 17 intelligence agencies. The secret deal was met with protests especially since Amazon’s wasn’t even the lowest bid.

Just as with JEDI, all the national security eggs were being put into one very fragile basket.

Amazon’s federal cloud contracts took off in the Obama era. Many of the biggest contracts are classified making it difficult to measure how much taxpayer money is being sucked into the Bezos business. But Amazon is winning contracts in the usual Washington D.C. way, by spending millions a year on lobbying.

The dot com titan began lobbying the Pentagon in 2016. That was the year Amazon’s lobbying expenditures hit a whopping $11 million, up from $1.62 million during the Bush administration. Amazon’s PAC, which the company strongly encourages employees to donate to, accounted for $515,200 in donations to members of Congress.

Amazon was the fourth biggest contributor to Senator Mark Warner. And when President Trump put Amazon’s JEDI deal on hold, Warner was among the first to protest the move. In his letter, Warner urged the Secretary of Defense to “resist political pressures” that might scuttle $10 billion for Amazon.

Senator Warner, who was applying political pressure to the Secretary of Defense, to protect a contract that would benefit his contributors, appeared to be unaware of the irony of his message.

But Amazon’s lobbying millions were only the tip of the iceberg of its dubious political influence.

(more…)

Share

U.S. LAUNCHED CYBERATTACKS ON IRAN

Tuesday, June 25th, 2019

 

We may be entering a whole era of cyber warfare.  Experts say that is how  future wars with be fought.    Nancy
THE WALL STREET JOURNAL

U.S. Launched Cyberattacks on Iran

The cyberstrikes on Thursday targeted computer systems used to control missile and rocket launches

June 23, 2019

Updated June 23, 2019 1:52 pm ET

The U.S. covertly launched offensive cyber operations against an Iranian intelligence group’s computer systems on Thursday, the same day President Trump pulled back on using more traditional methods of military force, according to U.S. officials familiar with the matter.

The cyberstrikes, which were approved by Mr. Trump, targeted computer systems used to control missile and rocket launches that were chosen months ago for potential disruption, the officials said. The strikes were carried out by U.S. Cyber Command and in coordination with U.S. Central Command.

The officials declined to provide specific details about the cyberattacks, but one said they didn’t involve loss of life and were deemed “very” effective. They came during the peak of tensions this week between the U.S. and Iran over a series of incidents across the Middle East, including Tehran’s shooting down of an American reconnaissance drone.

The attacks also came as U.S. fears have grown that Iran may seek to lash out with cyberattacks of its own, as multiple cybersecurity firms said they had already seen signs Tehran is targeting relevant computer networks for intrusion and appeared particularly focused on the U.S. government and the American energy sector, including oil and gas providers.

While little was known about Thursday’s digital attacks, they were the latest indication that the U.S. has ramped up its willingness to use disruptive or destructive cyber weapons under President Trump after years of caution and drawn-out interagency deliberations that often led to inaction in previous administrations.

The National Security Council didn’t respond to requests for comment. “As a matter of policy and for operational security, we do not discuss cyberspace operations, intelligence or planning,” a Pentagon spokesman said. Details of the cyber operations were first reported late Friday by Yahoo News.

Asked Sunday about reports of the cyberattacks, Vice President Mike Pence declined to address the matter. “We never comment on covert operations,” Mr. Pence said during an interview with CBS.

Current and former U.S. officials have warned that cyberattacks against Iran could increase the likelihood that Iran may respond in kind, and have noted Iran is particularly unpredictable in its own use of cyberattacks.

(more…)

Share

NAVY, INDUSTRY PARTNERS ARE ‘UNDER CYBER SIEGE’ BY CHINESE HACKERS

Tuesday, March 12th, 2019

 

THE WALL STREET JOURNAL

Navy, Industry Partners Are ‘Under Cyber Siege’ by Chinese Hackers, Review Asserts

Hacking threatens U.S.’s standing as world’s leading military power, study says

Navy Secretary Richard V. Spencer testified before the Senate Committee on Armed Services last week.
Navy Secretary Richard V. Spencer testified before the Senate Committee on Armed Services last week. PHOTO: RON SACHS/ZUMA PRESS

March 12, 2019 2:32 p.m. ET

WASHINGTON—The Navy and its industry partners are “under cyber siege” by Chinese hackers and others who have stolen tranches of national security secrets in recent years, exploiting critical weaknesses that threaten the U.S.’s standing as the world’s top military power, an internal Navy review has concluded.

The assessment, delivered to Navy Secretary Richard Spencer last week and reviewed by The Wall Street Journal, depicts a branch of the armed forces under relentless cyberattack by foreign adversaries and struggling in its response to the scale and sophistication of the problem.

Drawing from extensive research and interviews with senior officials across the Trump administration, the tone of the review is urgent and at times dire, offering a rare, unfiltered look at the military’s cybersecurity liabilities.

KEY TAKEAWAYS FROM THE NAVY REVIEW

The Navy report’s authors conducted 31 site visits and interviewed 85 current senior military officers and civilians across both the Navy and wider Defense Department, as well as senior officials at the Federal Bureau of Investigation, Department of Homeland Security and White House National Security Council, among others. Here are their main conclusions:

  • The Navy and its industry partners are facing relentless cyber attacks that seek to steal sensitive national security data by a wide range of foes, with China and Russia the most adept and strategic.
  • The U.S. is at risk of losing global military and economic advantages due to cyberthefts of secrets and intellectual property.
  • Despite efforts to address the problem, the defense industrial base has suffered “a flood of breaches of significant data” and “continues to hemorrhage critical data.”
  • The Navy and Defense Department have only a limited understanding of the totality of losses they and their partners are suffering.
  • The Navy is focused on “preparing to win some future kinetic battle, while it is losing the current global, counter-force, counter-value, cyber war,” the review’s authors conclude.

The 57-page document is especially scathing in its assessment of how the Navy has addressed cybersecurity challenges facing its contractors and subcontractors, faulting naval officials for not anticipating that adversaries would attack the defense industrial base and for not adequately informing those partners of the cyber threat. It also acknowledges a lack of full understanding about the extent of the damage.

(more…)

Share

CYBERATTACKS – STRIKE BACK AGAINST EACH ONE

Tuesday, January 29th, 2019

 

Experts say our future  wars will not be fought with tanks. ships  and planes but will be cyber warfare.  We had better be ready.  Nancy
 
THE WALL STREET JOURNAL

Strike Back Against Every Cyberattack

The U.S. can keep foreign hacks at bay by showing its ability and will to retaliate.

Jan. 27, 2019

EXCERPT FROM THIS ARTICLE: 

Washington should commit to use its weapons against all aggressors. One example of America’s potential is Stuxnet, a U.S.- and Israeli-made virus that in 2007 infected Iran’s uranium-enrichment centrifuges, causing them to spin out of control. Stuxnet was certainly an offensive cyberweapon, but not a retaliatory one.

The U.S. really needs a second-strike cyberweapons program. In December 2015 the Russians launched cyberattacks on Ukraine, shutting down three power plants (which ran on Windows PCs). The U.S. should have immediately flickered all the lights in Moscow, to show them we can. Meddle in our elections? Fill Russia’s VK social network with endless Beto O’Rourke dental videos—it’s only fair. When the Chinese stole plans for the F-35 stealth fighter fromLockheed , we should have made every traffic light in Shanghai blink red, announcing “Stop, Don’t Hack Us Again.” North Korea’s Sonyhack? Scramble state-run TV signals in Pyongyang. They’ll get the message.

 

Another week, another data breach. The latest is 773 million online accounts for sale, many with passwords included, known as Collection #1. More are likely to come—go ahead and check your status at HaveIBeenPwned.com. All this the same month Marriott admitted that five million unencrypted passport numbers were snatched from its system, probably by the Chinese. Oh, and the Russians might have hacked the Democratic National Committee again after the 2018 midterms. How do we stop this?

The foreign hacks are the most disturbing. Last month members of a Chinese espionage ring known as Advanced Persistent Threat Group 10 (a k a “Godkiller” and “Stone Panda”) were charged by the Justice Department with hacking NASA, the Jet Propulsion Laboratory and even IBM . Earlier last year the Chinese were caught stealing submarine data from a U.S. Navy contractor. And horror of horrors, in 2017 an Iranian national hacked HBO and threatened to release unaired episodes and plot summaries from “Game of Thrones.”

The U.S. has done close to nothing in response. Sure, special counsel Robert Mueller indicted 12 Russian intelligence officers last summer. I’m sure they’re quaking in their boots. Maybe those “Game of Thrones” episodes could have taught our leaders something about retaliation and revenge.

So what is America’s policy? That’s unclear. But a good start would be to heed the words of Israeli Prime Minister Benjamin Netanyahu, who told the press last week that his state has a permanent policy of hurting “everyone who is trying to hurt us.” The U.S. needs a similar stance to halt cyberattacks.

(more…)
Share

RUSSIAN HACKERS AND OUR ELECTRICAL GRID

Friday, January 11th, 2019

 

This article was on the front page of the Wall Street Journal this morning.  While our country has been distracted with the shiny object of Russian Collusion by the Trump Administration, this is what the Russians have really  been doing for at least the last year.  It doesn’t matter whether you are a liberal, conservative, Democrat or a Republican, this should concern you.  Nancy
THE WALL STREET JOURNAL

America’s Electric Grid Has a Vulnerable Back Door—and Russia Walked Through It

A Wall Street Journal reconstruction of the worst known hack into the nation’s power system reveals attacks on hundreds of small contractors

Share

THE AMERICAN ARSENAL IS VULNERABLE TO CYBERATTACKS

Wednesday, October 17th, 2018

 

THE WALL STREET JOURNAL

THE AMERICAN ARSENAL IS VULNERABLE TO CYBERATTACKS

U.S. firepower could be crippled by software flaws. The Pentagon has been slow to respond.

October 16, 2018

by Brian E. Finch  Mr. Finch is a partner at Pillsbury Winthrop Shaw Pittman LLP, where he is a leader of the firm’s cybersecurity team. His clients include cybersecurity vendors that may support the U.S. Defense Department under Comply to Connect.

 

Modern American military history is replete with examples of poorly designed weapons. Submarine torpedoes failed to explode after hitting Japanese ships. M16 rifles only could be counted on to jam in the middle of a firefight in Vietnam. Pentagon planners have since spent countless hours and billions of dollars to create acquisition programs that wring the bugs out of U.S. arms before they reach the hands of soldiers and sailors.

Despite the hard work, the U.S. still fields weapons systems with dramatic weaknesses. A new Government Accountability Office auditthis month indicates that huge swaths of American firepower could be rendered inert by software flaws. There are solutions to the cyber weaknesses plaguing our arsenal, but bureaucratic inertia at the Defense Department is hampering their implementation. Faster action is needed to clear the logjam and harden America’s weapons before it’s too late.

The GAO could not have been clearer about the threat: “A successful attack on one of the systems the weapon depends on can potentially limit the weapon’s effectiveness, prevent it from achieving its mission, or even cause physical damage and loss of life.” American ships, airplanes, combat vehicles, satellites and other systems have design flaws that leave them vulnerable to debilitating cyberattacks. Meanwhile, the Pentagon is growing more reliant on automation and artificial intelligence.

Share

RUSSIAN HACKERS REACH U.S. UTILITY CONTROL ROOMS, HOMELAND SECURITY OFFICIALS SAY

Tuesday, August 7th, 2018

 

Well, this is comforting to know !   Nancy

Russian Hackers Reach U.S. Utility Control Rooms, Homeland Security Officials Say

Blackouts could have been caused after the networks of trusted vendors were easily penetrated

Officials of the Department of Homeland Security said hackers have reached the control rooms of U.S. electric utilities. PHOTO: ANDREW HARRER/BLOOMBERG NEWS

 

Hackers working for Russia claimed “hundreds of victims” last year in a giant and long-running campaign that put them inside the control rooms of U.S. electric utilities where they could have caused blackouts, federal officials said. They said the campaign likely is continuing.

The Russian hackers, who worked for a shadowy state-sponsored group previously identified as Dragonfly or Energetic Bear, broke into supposedly secure, “air-gapped” or isolated networks owned by utilities with relative ease by first penetrating the networks of key vendors who had trusted relationships with the power companies, said officials at the Department of Homeland Security.

“They got to the point where they could have thrown switches” and disrupted power flows, said Jonathan Homer, chief of industrial-control-system analysis for DHS.

DHS has been warning utility executives with security clearances about the Russian group’s threat to critical infrastructure since 2014. But the briefing on Monday was the first time that DHS has given out information in an unclassified setting with as much detail. It continues to withhold the names of victims but now says there were hundreds of victims, not a few dozen as had been said previously.

It also said some companies still may not know they have been compromised, because the attacks used credentials of actual employees to get inside utility networks, potentially making the intrusions more difficult to detect.

(more…)

Share

HACKERS SUBSTITUTE PORN ON ISIS SITES

Friday, November 24th, 2017

 

Hackers Substitute Porn on ISIS Sites

Home > Human Rights > Human Rights Activists > Human Rights Organizations > Hackers Substitute Porn on ISIS Sites
Share
Search All Posts
Categories