Cyberwar and secu...
Follow
Find
6.0K views | +1 today
Cyberwar and security
New military challenges in cyberspace, digital crime
Curated by Pierre Levy
Your new post is loading...
Scooped by Pierre Levy
Scoop.it!

Russia: Hidden chips 'launch spam attacks from irons'

Russia: Hidden chips 'launch spam attacks from irons' | Cyberwar and security | Scoop.it
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Merkel, Hollande want to forge new intelligence pacts with U.S.

Merkel, Hollande want to forge new intelligence pacts with U.S. | Cyberwar and security | Scoop.it
After allegations that the U.S. tapped the German leader’s cellphone, Merkel says trust must be rebuilt.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Iranian Breakout Estimates, Updated September 2013

more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

North Korea may have secretly engineered computer games to launch mass cyber attack

North Korea may have secretly engineered computer games to launch mass cyber attack | Cyberwar and security | Scoop.it
Free-to-play games may actually be
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Canadians sue spy agency over mass data collection

Canadians sue spy agency over mass data collection | Cyberwar and security | Scoop.it
A Canadian spy agency is collecting meta-data about its citizens’ phone records and internet activity, according to a new lawsuit, which is the first such case in the country since the PRISM scandal broke in the US this summer.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Snowden leaks: France summons US envoy over NSA surveillance claims

Snowden leaks: France summons US envoy over NSA surveillance claims | Cyberwar and security | Scoop.it
Demand follows claims in Le Monde that US agency has been intercepting phone calls of French citizens on 'a massive scale'
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Ministry data claim

Ministry data claim | Cyberwar and security | Scoop.it
North Korea has staged thousands of cyber-attacks against the South in recent years, causing financial losses of around $805 million, a Seoul lawmaker said Tuesday citing government data.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Iranian cyber warfare commander shot dead in suspected assassination - Telegraph

Iranian cyber warfare commander shot dead in suspected assassination  - Telegraph | Cyberwar and security | Scoop.it
The head of Iran’s cyber warfare programme has been shot dead, triggering further accusations that outside powers are carrying out targeted assassinations of key figures in the country’s security apparatus.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

'Icefog' spying operation targeted Japan, South Korea | PCWorld

'Icefog' spying operation targeted Japan, South Korea | PCWorld | Cyberwar and security | Scoop.it
A hacking group that targeted Japan's parliament in 2011 is believed to have conducted nimble data thefts against organizations mainly in South Korea and Japan, including defense contractors, over the past two years.
more...
luiy's curator insight, September 26, 2013 11:44 AM

A hacking group that targeted Japan's parliament in 2011 is believed to have conducted nimble data thefts against organizations mainly in South Korea and Japan, including defense contractors, over the past two years.

The "Icefog" hackers probed victims one by one, carefully copying select files and then exiting the systems, according to security vendor Kaspersky Lab, which released a 68-page report on the group Wednesday.

 

"The nature of the attacks was also very focused," Kaspersky wrote. "In many cases, the attackers already knew what they were looking for."

Over the past several years, security analysts have noticed an uptick in so-called:

 

"advanced persistent threat" (APT) attacks,

 

... where interlopers plant stealthy malware on networks for cyber spying.

"In the future, we predict the number of small, focused APT-to-hire groups to grow, specializing in hit-and-run operations, a kind of 'cyber mercenaries' of the modern world," the report said.

Scooped by Pierre Levy
Scoop.it!

Hacker group found in China, linked to big cyberattacks -Symantec

* Symantec says Hidden Lynx very likely based in China* Says it is not sure if group is linked to government* Says may be linked to well-known 2009 Operation AuroraBy Jim FinkleBOSTON, Sept 17 (Reuters)...
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

US likely to wage cyber attacks against Syria - The Hill's Hillicon Valley

US likely to wage cyber attacks against Syria - The Hill's Hillicon Valley | Cyberwar and security | Scoop.it
Experts say the U. S.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

CIA et surprise stratégique: Le rôle de l'identité et de la construction sociale

CIA et surprise stratégique: Le rôle de l'identité et de la construction sociale | Cyberwar and security | Scoop.it
Mon ouvrage "Constructing Cassandra: Reframing Intelligence Failure at the CIA, 1947-2001", co-écrit avec mon confrère Milo Jones (IE Business School) vient de paraître chez Stanford University Pre...
more...
luiy's curator insight, August 30, 2013 9:20 AM

Notre recherche montre que quatre caractéristiques fondamentales et persistantes définissent l’identité de la CIA :

Un corps homogène d’analystes qui empêche une diversité d’hypothèses d’être considérée ;Une attitude scientiste, qui privilégie une approche purement analytique et détachée d’une réalité pourtant sociale ;Une préférence pour l’information secrète qui conditionne aussi bien la sélection des priorités que la nature de l’information recherchée (tout ce qui n’est secret n’est pas digne d’intérêt) ;Une primauté du consensus qui fait que toute analyse est le résultat d’un compromis en faveur d’une analyse politiquement acceptable par toutes les parties prenantes.

Ces caractéristiques ont un impact considérable sur l’activité de la CIA. L’activité d’un service spécial se décompose en quatre grandes étapes qui définissent le "cycle du renseignement": la définition de la mission, le recueil d’information, son analyse, et enfin la production et la diffusion du résultat de l’analyse sous la forme d’un rapport ou d’une présentation orale.

L’identité organisationnelle influence, avec le contexte social en général, la définition même des problèmes.  Par exemple,  le droit des femmes en Afghanistan est un problème important pour les États-Unis. La question influence donc leur diplomatie et leur action dans le pays, alors qu’il n’est pas vécu comme un problème par une majorité d’habitants de ce pays. Il en va de même pour la culture de pavot. Le droit français considère la possession de marijuana comme un crime tandis qu’une partie de la population la considère comme un plaisir banal et légitime.

Scooped by Pierre Levy
Scoop.it!

The war that isn’t going to happen | Inside Story

The war that isn’t going to happen | Inside Story | Cyberwar and security | Scoop.it
“Cyber war” has more in common with the war on obesity than the second world war, says Thomas Rid. Emily Crawford reviews his new book
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Israel reportedly thwarts cyber attack from China

Israel reportedly thwarts cyber attack from China | Cyberwar and security | Scoop.it
140 targets in defense, security industries receive Trojan-infested email seeking to steal information, according to Channel 2
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

AP Exclusive: Israeli tunnel hit by cyber attack

more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

German Spy Chiefs to Head to US as Snooping Row Widens | SecurityWeek.Com

German Spy Chiefs to Head to US as Snooping Row Widens | SecurityWeek.Com | Cyberwar and security | Scoop.it
German spy chiefs will travel to the United States to demand answers following allegations that US intelligence has been tapping Chancellor Angela Merkel's mobile phone.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Snowden revelations hit war on terror as EU MPs call for suspension of data-sharing deal

Snowden revelations hit war on terror as EU MPs call for suspension of data-sharing deal | Cyberwar and security | Scoop.it
The European Parliament has asked the European Commission to suspend a deal with the U.S. that allowed the sharing of financial data, in order to track terrorist funding. However, that call appears to have been rebuffed.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Wall Street banks learn how to survive in staged cyber attack

Wall Street banks learn how to survive in staged cyber attack | Cyberwar and security | Scoop.it
NEW YORK (Reuters) - A few months ago, a group of Wall Street banks fashioned a risk-manager's worst nightmare to determine how they would survive.
more...
No comment yet.
Rescooped by Pierre Levy from i-HLS Israel Homeland Security
Scoop.it!

Leaks foil N.S.A. Plan for Cyberdefense

Leaks foil N.S.A. Plan for Cyberdefense | Cyberwar and security | Scoop.it
The leaked information about the operations of the N.S.A. in the U.S. have foiled a huge CYBER defense plan.

Via i-hls Israel Homeland Security
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Syrian Electronic Army Attacks Linked to Obama's Mentions of Syria

Syrian Electronic Army Attacks Linked to Obama's Mentions of Syria | Cyberwar and security | Scoop.it
The frequency of attacks that the infamous SEA carries out may correlate with the number of President Obama's public statements about Syria
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Hammond's £500m new cyber army

Hammond's £500m new cyber army | Cyberwar and security | Scoop.it
Fighter planes, warships and regiments face being replaced by futuristic cyber assaults using lethal computer worms and viruses to wipe out enemy targets.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

IDF Hackers Test Readiness In Israel for Cyberattacks

IDF Hackers Test Readiness In Israel for Cyberattacks | Cyberwar and security | Scoop.it
IDF cybersecurity soldiers play hackers and defenders to simulate any possible attack against Israel's defense cyberspace.
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

US intercepts Iranian reprisal plot if Syria is attacked

US intercepts Iranian reprisal plot if Syria is attacked | Cyberwar and security | Scoop.it
Washington readies Mideast resources for potential US strike in Syria and possible retaliation by groups allied with Tehran, Assad
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

Constructing Cassandra

Constructing Cassandra | Cyberwar and security | Scoop.it
Reframing intelligence failure at the CIA
more...
No comment yet.
Scooped by Pierre Levy
Scoop.it!

081.pdf

more...
No comment yet.