Quantcast
Channel: Politically Motivated Computer Crime and Hacktivism
Browsing latest articles
Browse All 25 View Live

Google Throws Down the Gauntlet to China - Maybe

A flood of news reports have come out concerning the looming battle between Google and China over intrusions into the accounts of human rights activists ala Ghostnet.To add to the confusion are almost...

View Article



Attempted Cyberattack on Law Firm that Sued China

The U.S. law firm Gipson Hoffman & Pancione has received email with malicious code they belive originated from China. Gipson Hoffman & Pancione is the firm representing Solid Oak Software Inc.,...

View Article

Indian National Security Advisor Believes Cyber Attacks Originated from China

MK Narayanan, India's National Security Adviser, has reported that his office was subjected to attempted cyber attacks from malicious code contained in PDF files sent in emails. The attacks occurred on...

View Article

Attack on London Based Jewish Website

The London based Jewish Chronicle's website was defaced with anti-Semitic and pro-Palestinian messages:"In a message posted in English and Turkish, a group calling itself the "Palestinian Mujaheeds"...

View Article

Analyzing the Google Attacks - Plenty of Room for Mistakes

SecureWorks has posted an analysis of the malicious code alleged to have been used to attack Google and other companies, collectively referred to as "Operation Aurora". SecureWorks' posting is one of...

View Article


Wide Ranging Espionage by China in Britian

The Sunday Times reports on a leaked MI5 memo warning UK companies of extensive espionage by China including both traditional means and cyber attacks.The targets are described as:"UK defence, energy,...

View Article

US Faces "Significant" Threat from Cyber Espionage

John Brennan, Deputy National Security Adviser for Homeland Security and Counterterrorism, stated during a television interview that the United States faced a "serious and significant" threat from...

View Article

Hacktivists Attack Australian Government Systems

A hacktivist group call "Anonymous" is claiming responsibility for Distributed Denial-of-Service attacks against government systems in Australia. The attacks are a protest against proposed filtering of...

View Article


In a Cyberwar, US Would Lose

The U.S. Senate heard testimony from "industry experts" warning of catastrophic consequences from cyber war attacks - including pronouncements that the "government faces the prospect of losing in an...

View Article


Political Motivation Behind Google Ruling in Italy?

The New York Times suggests the recent Italian court ruling that Google executives are criminally responsible for offensive Internet content may have a broader political motivation and that the ruling...

View Article

Germany Suspends Communication Data Retention Law

Citing security and transparency concerns, the German Federal Constitution Court has suspended the law requiring communication providers and ISPs to retain traffic information for six months for use by...

View Article

NATO Facing Increased Cyber Threats

NATO's Secretary-General commented at a NATO seminar in Finland that the alliance needs to increase defenses against cyber threats. While not releasing any details it appears NATO is concerned about a...

View Article

Political Cyber Crimes Growing

The increasing nature of politically motivated computer crime is the subject of a recent article discussing how companies focus on profit motivated cyber crime while ignoring other threats. The author...

View Article


Law Firms Increasingly the Victims of Espionage

Law firms are one of the latest targets of alleged cyber espionage from China and others interested in obtaining information on clients or litigation that involve their interests:"Law firms are...

View Article

Report: Internet Controls Violate Human Rights

The U.S. Department of State's 2009 Human Rights Report highlights Internet censorship as a major human rights concern. The report's introduction included cyber monitoring and controls resulting in...

View Article


Increasing Use of the Internet by Terrorist Groups

The LA Times reports on the extensive and effective use of the Internet by traditional terrorist organizations:"From charismatic clerics who spout hate online, to thousands of extremist websites, chat...

View Article

U.K. Internet Cafes Asked to Monitor Web Usage for Terrorism

After several terrorism related convictions in the U.K. where suspects were believed to have used Internet cafes, police are seeking cooperation for the cafe owners:"The new initiative involves getting...

View Article


Fine Line between Criminal Activity and National Security

NPR ran a lengthy report on cyber war centered around last month's congressional testimony by the Director of National Intelligence Dennis Blair citing cyber attacks as a top threat to U.S....

View Article

North Korea Develops Its Own Operating System Aimed at User Monitoring

South Korea's Science and Technology Policy Institute has released information concerning a homegrown operating system developed by North Korea called Red Star. It appears to be based on Linux and...

View Article

Recommended Reading: Shadows in the Cloud

In a followup to the "Tracking GhostNet" report, a new analysis of attacks against Tibetan and Indian cyber targets has been released titled "Shadows in the Cloud: Investigating Cyber Espionage 2.0". I...

View Article

Increased Espionage against US Defense Contractors

The Counterintelligence Directorate of the U.S. Defense Security Office recently released a report on espionage against the U.S. defense industry. The study identified four broad methods of information...

View Article


Applying International Law to Cyber Space

How well can existing international law map to cyber space? A recent article in The Legal Intelligencer looks at the legal concept of a "duty to assist" and how it might apply in...

View Article


North Korea Not Believed to Be Responible for 2009 Attacks

A series of attacks targeting U.S. government and South Korean web sites during early July of 2009 were initially blamed on North Korea:"In the days after the fast-moving, widespread attack, analysis...

View Article

Recommended: Internet Use in Ukraine's Orange Revolution

Researchers Volodymyr Lysenko and Kevin Desouza have published an analysis of the effect and use of technology in Ukraine's Orange Revolution. The report provides an extensive review of the development...

View Article

Cyber Terrorism

I was recently requested to write an opinion piece for the Czech Republic's Prague Post on cyber terrorism:"The risk is real for a malicious and intentional disruption of basic infrastructure but,...

View Article

Browsing latest articles
Browse All 25 View Live




Latest Images