Chinese Cryptography
449 views | +0 today
Follow
Chinese Cryptography
Chinese Cryptography
Your new post is loading...
Your new post is loading...
Scooped by Red-DragonRising
Scoop.it!

Whodunnit? Conflicting accounts on ARAMCO hack underscore difficulty of attribution

Whodunnit? Conflicting accounts on ARAMCO hack underscore difficulty of attribution | Chinese Cryptography | Scoop.it

A recent report suggests that the devastating cyber attack that wiped out thousands of computers belonging to Saudi Arabia's national oil company was the work of a lone hacker -& state sponsored attack

more...
No comment yet.
Rescooped by Red-DragonRising from OSINT News
Scoop.it!

(U//FOUO) DHS U.S.-Canada Marine Transportation System Terrorist Threat Assessment |

(U//FOUO) DHS U.S.-Canada Marine Transportation System Terrorist Threat Assessment | | Chinese Cryptography | Scoop.it

While passenger vessels and terminals will likely remain potentially attractive targets for terrorist attacks, trends in overseas terrorist attacks and the lack of any reporting on maritime terrorist plots against the U.S.-Canada MTS suggests the...


Via Paulo Félix
more...
No comment yet.
Rescooped by Red-DragonRising from Threat IQ
Scoop.it!

Russian Underground Cybercrime market offering sophisticated services

Russian Underground Cybercrime market offering sophisticated services | Chinese Cryptography | Scoop.it
Russian Underground Cybercrime market offering sophisticated services...

Via Barry J Coatesworth
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

DDoS attacks against banks raise question: Is this cyberwar? - Network World

DDoS attacks against banks raise question: Is this cyberwar? - Network World | Chinese Cryptography | Scoop.it
DDoS attacks against banks raise question: Is this cyberwar?Network WorldCould this be cyberwar?
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

IDF to Double Unit 8200 Cyber-War Manpower Tikun-Olam Tikun ...

IDF to Double Unit 8200 Cyber-War Manpower Tikun-Olam Tikun ... | Chinese Cryptography | Scoop.it
The Israel's Channel 2 reports (Hebrew) that the IDF intends to double the manpower of its Unit 8200, which is charged with waging cyber-war on Israel's enemies. It plays a role akin to the NSA here in the U.S.
more...
No comment yet.
Rescooped by Red-DragonRising from OSINT News
Scoop.it!

How to Uncover Information on the Deep Web | Web Intelligence Blog

How to Uncover Information on the Deep Web | Web Intelligence Blog | Chinese Cryptography | Scoop.it

Traditional search engines like Google, Yahoo and Bing only cover a small fraction of the web, less than 10%, which leaves a massive, untapped repository of information to be explored.


Via Bonnie Hohhof, Paulo Félix
more...
No comment yet.
Rescooped by Red-DragonRising from OSINT News
Scoop.it!

An Army Introduction to Open Source Intelligence | Secrecy News

An Army Introduction to Open Source Intelligence | Secrecy News | Chinese Cryptography | Scoop.it

A new U.S. Army publication provides an introduction to open source intelligence, as understood and practiced by the Army. Open-source intelligence is the.


Via Paulo Félix
more...
No comment yet.
Rescooped by Red-DragonRising from The New Cold Wars. "Hotting Up" ?
Scoop.it!

Top 5 Obstacles to AirSea Battle | The Naval Diplomat

Top 5 Obstacles to AirSea Battle | The Naval Diplomat | Chinese Cryptography | Scoop.it
Deciphering what it is and fitting into a strategy could be a challenge.

 

Is there no end to the Naval Diplomat's treachery? Last week I sallied outside the comfortable redoubt of The Diplomat to comment on why the U.S. military's AirSea Battle concept is, and must be, about China. It's not because a U.S.-China war is fated, but because of expediency. Military planners are negligent if they don't plan against the toughest challenge elected leaders may order them to face. For instance, the U.S. Navy planned for war with Britain's Royal Navy well into the interwar years. No one wanted or expected an Anglo-American conflict, but the Royal Navy remained the gold standard for naval power. It only made sense for the U.S. Navy to measure itself against the most exacting standard available while hedging against the unexpected. Herewith, my list of the Top 5 hurdles facing executors of (and commentators on) the emerging operational concept:

 

5. Deciphering what it is.

4. Conflating politics with operational planning.

3. Developing the right hardware.

2. Transforming service cultures.

1. Fitting it into a strategy.


Via SASFOR
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Denmark : Postdoc within the area of Symmetric Cryptography ...

Applications are invited for an 18 month (with a possible extension of 6 months) Postdoc position at the Danish-Chinese Center for Applications of Algebraic Geometry in Coding and Cryptology. The center is located at the ...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Intel marching on in China « phil muncaster

Intel marching on in China « phil muncaster | Chinese Cryptography | Scoop.it
As an example of its growing influence in the country, Fedder explained how Intel is trying to broker a deal to ensure the closed Chinese crypto-standard Trusted Cryptography Module (TCM) is made interoperable with the ...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Chinese characters: an introduction to the world's biggest language

Chinese characters: an introduction to the world's biggest language | Chinese Cryptography | Scoop.it
Simplified Chinese is now the dominant script. It is found in mainland China, Singapore and Malaysia for Mandarin Chinese. A heated debate over the relative merits of Traditional and Simplified Chinese characters has raged ...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

ste williams » Intel tries to wangle China crypto-standards deal

ste williams » Intel tries to wangle China crypto-standards deal | Chinese Cryptography | Scoop.it
The Chinese TCM requires that cryptographic algorithms and protocols used to perform specific security tasks, such as verifying that only authorized codes run on a system, be based on Chinese technology.
more...
No comment yet.
Rescooped by Red-DragonRising from OSINT News
Scoop.it!

[Special Report] Cyber-war clouds gather over China and West | Intelligence Online

[Special Report] Cyber-war clouds gather over China and West | Intelligence Online | Chinese Cryptography | Scoop.it

China has been highly active in cyber-warfare and now finds itself several steps ahead of Western nations. In what is shaping up to be a veritable computer arms race, Europe and the US are in turn developing large-scale offensive capabilities.


Via Paulo Félix
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Putting Cyber Warfare Into Perspective | SecurityWeek.Com

Putting Cyber Warfare Into Perspective | SecurityWeek.Com | Chinese Cryptography | Scoop.it
Cyberwar is not war in and of itself. It is not even another battlefield. Nor is it as novel as some people claim. It is just a logical conclusion and evolution of the widespread adoption of computers and technology in modern culture.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Mao Zedong Thought 'guiding principle' |Latest News |chinadaily.com.cn

Mao Zedong Thought 'guiding principle' |Latest News |chinadaily.com.cn | Chinese Cryptography | Scoop.it
A leading Party theory professor has dismissed speculation that Mao Zedong Thought would be amended or removed from CPC's Constitution.
more...
No comment yet.
Rescooped by Red-DragonRising from Threat IQ
Scoop.it!

UK Ministry of Defence hacked by NullCrew

UK Ministry of Defence hacked by NullCrew | Chinese Cryptography | Scoop.it
UK Ministry of Defence hacked by NullCrew...

Via Barry J Coatesworth
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Huawei proposes national Cyber Security Evaluation Centre - CSO

Huawei proposes national Cyber Security Evaluation Centre - CSO | Chinese Cryptography | Scoop.it
ABC OnlineHuawei proposes national Cyber Security Evaluation CentreCSOOctober 24, 2012 — IDG News Service — Telecommunications equipment provider, Huawei, has proposed a national Cyber Security Evaluation Centre, which will test the security credentials...
more...
No comment yet.
Rescooped by Red-DragonRising from OSINT News
Scoop.it!

China hosts first Environmental Security Seminar with INTERPOL

China hosts first Environmental Security Seminar with INTERPOL | Chinese Cryptography | Scoop.it
China hosts its first National Environmental Security Seminar with INTERPOL support

 

BEIJING, China ‒ International efforts to develop a cooperative and collaborative multi-agency strategy to tackle environmental crime received a boost after China hosted its first National Environmental Security Seminar with the support of INTERPOL.

 

At the meeting China announced it would seek out and develop opportunities to enhance its international environmental enforcement efforts in cooperation with INTERPOL. To take this initiative further, it was agreed that an expanded meeting will be organized involving all Chinese Divisions and Ministries responsible for environmental law enforcement.

 

Following the official launch by INTERPOL’s Environmental Crime Programme of its National Environmental Security Task Force (NEST) initiative in September, Chinese authorities decided to organize a National Environmental Security Seminar with INTERPOL and invited the head of INTERPOL’s Environmental Crime Programme, David Higgins, who welcomed their initiative.

 

“China has set a good example for the entire international environmental compliance and enforcement community and we look forward to forging closer ties and working alongside China in our common endeavour to prevent environmental crime and enhance environmental security,” said Mr Higgins.

 

Critical issues such as the survival of wild tigers and the protection of forest were on the agenda, together with INTERPOL initiatives such as Project PREDATOR and Project LEAF, which are actively supported by the US Agency for International Development, the Norwegian Agency for Development Cooperation and the UK Department for Environment, Food and Rural Affairs.

 

The meeting, hosted by the Ministry of Public Security at the INTERPOL National Central Bureau in Beijing, was attended by representatives from the following Chinese government agencies and departments:

 

INTERPOL Division, International Cooperation Department, Ministry of Public Security
Firearms Administration Division, Public Order Administration Department, Ministry of Public Security
Criminal Investigation Division, Forestry Public Security Bureau of State Forestry Administration
Wild Animal and Plant Administration Division, Wildlife Protection Department, SFA
Intelligence Division, Anti-smuggling Department, The General Administration of Customs
Law Enforcement Division, CITES Management Authority of China
Wild Animal and Aquatic Plant Protection Division, Fishery Command Centre, Ministry of Agriculture


Via Wildlife Margrit, Paulo Félix
more...
No comment yet.
Rescooped by Red-DragonRising from OSINT News
Scoop.it!

Military tech can monitor all world media at the press of a button - Fox News

Military tech can monitor all world media at the press of a button - Fox News | Chinese Cryptography | Scoop.it

Military tech can monitor all world media at the press of a buttonFox News... week -- and instantly translate and analyze them.


Via Paulo Félix
more...
No comment yet.
Rescooped by Red-DragonRising from ZeroTrustNet
Scoop.it!

Chinese hackers have control of US power grid

Chinese hackers have control of US power grid | Chinese Cryptography | Scoop.it
The company whose software and services remotely administers and monitor large sections of the US energy industry began warning customers about a sophisticated hacker attack.

Via 0 тrυѕт neт
more...
No comment yet.
Rescooped by Red-DragonRising from The New Cold Wars. "Hotting Up" ?
Scoop.it!

The Master ‘PLAN’: China’s New Guided Missile Destroyer

The Master ‘PLAN’: China’s New Guided Missile Destroyer | Chinese Cryptography | Scoop.it
China's navy appears on the verge of creating a new class of warship. It could eventually alter the balance of naval power in the region.

 

late in 2010, namely that the People’s Liberation Army Navy (PLAN) would defy those Western experts who opined that Beijing had slowed or halted its naval buildup.

 

For evidence, such experts claimed that the PLAN had stopped building guided-missile destroyers, or DDGs. If so, Beijing had made a conscious choice to limit its navy’s offensive punch. Not so, said we. Having experimented with various DDG designs, the PLAN was simply settling on a model that incorporated the best of each test platform. And indeed, DDG serial production has recommenced in earnest, judging from pictures of the new Type 052D Luyang II-class DDG that have surfaced on the Internet.

 

Until recently it was fashionable for Western PLA-watchers to contend that Chinese shipyards had slowed or stopped construction of major surface warships like DDGs in favor of smaller, shorter-range, seemingly more defensive-minded vessels like guided-missile frigates and fast-attack boats. They cited the dearth of clear-cut proof of DDG-building since 2005 as evidence of this supposed trend. From this they inferred that Chinese naval development had taken a less menacing turn.

 

This was counterintuitive at best. And indeed, a series of photos on Chinese and Western military websites over the past few years dispels such sanguine prognoses. The images indicate that Chinese shipyards had already resumed DDG construction by 2010, when we essayed our prediction about Chinese shipbuilding.

 

The latest reports suggest that Jiangnan Shipyard in Shanghai launched its sixth Type 052C DDG and is laying down an average of two hulls per year.


Via SASFOR
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Report: Mandarin Will Be Main Villain in 'Iron Man 3' After All - AceShowbiz

Report: Mandarin Will Be Main Villain in 'Iron Man 3' After All - AceShowbiz | Chinese Cryptography | Scoop.it
IFCReport: Mandarin Will Be Main Villain in 'Iron Man 3' After AllAceShowbizAmong those spoilerish information, there was one report coming from Comic Book that suggested The Mandarin as the lead villain in the third armored hero film.
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Mandarin Made Easier learning: Chinese characters with radicals ...

Mandarin Made Easier learning: Chinese characters with radicals ... | Chinese Cryptography | Scoop.it
Mandarin Made Easier learning: Chinese characters with radicals part 1. *. By Lucy Wang. Some students find learning to read and write characters the most difficult part of learning Chinese, and they wonder if there are any ...
more...
No comment yet.
Scooped by Red-DragonRising
Scoop.it!

Hacking Expose!: Intel tries to wangle China crypto-standards deal

Hacking Expose!: Intel tries to wangle China crypto-standards deal | Chinese Cryptography | Scoop.it
The Chinese TCM requires that cryptographic algorithms and protocols used to perform specific security tasks, such as verifying that only authorized codes run on a system, be based on Chinese technology.
more...
No comment yet.