War Games

Icon

A Collection of Studies & Sources on Cyber Warfare

(2010) Internet Traffic from U.S. Government Websites Was Redirected Via Chinese Networks

Nell’Aprile 2010, il 15% del traffico Internet fu maliziosamente rediretto verso router (e in generale apparati di rete) gestiti da un’operatore di telecomunicazioni Cinese. Parte di questo traffico era destinato a siti  di strutture militari e governative Americane. Le operazioni svolte all’interno della rete Cinese non sono ancora ogni documentate e forse non lo saranno mai. La “U.S.-China Economic and Security Review Commission” (http://www.uscc.gov/)ha citato l’evento all’intero del report annuale (2010)

Per continuare la lettura è possibile consultare:

articolo foxnews

articolo BBC

articolo CBC

articolo The Register

Una descrizione (molto) tecnica dei fatti è disponibile sul blog BGPmon

 

Nearly 15 percent of the world’s Internet traffic — including data from the Pentagon, the office of Defense Secretary Robert Gates and other U.S. government websites — was briefly redirected through computer networks in China last April, according to a congressional commission report obtained by FoxNews.com.

It was not immediately clear whether the incident was deliberate, but the April 8 redirection could have enabled malicious activities and potentially caused an unintended “diversion of data” from many U.S. government, military and commercial websites, the U.S.-China Economic and Security Review Commission states in a 316-page report to Congress.

China hijack

China hijack

A draft copy of the report was obtained on Tuesday by FoxNews.com. The final 2010 annual report to Congress will be released during a press conference in Washington on Wednesday.

According to the draft report, a state-owned Chinese telecommunications firm, China Telecom, “hijacked” massive volumes of Internet traffic during the 18-minute incident. It affected traffic to and from .gov and .mil websites in the United States, as well as websites for the Senate, all four military services, the office of the Secretary of Defense, the National Oceanic and Atmospheric Administration and “many others,” including websites for firms like Dell, Yahoo, IBM and Microsoft.

 

U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program

The National Security Agency and the FBI are tapping directly into the central servers of nine leading U.S. Internet companies, extracting audio and video chats, photographs, e-mails, documents, and connection logs that enable analysts to track foreign targets, according to a top-secret document obtained by The Washington Post.

The program, code-named PRISM, has not been made public until now. It may be the first of its kind. The NSA prides itself on stealing secrets and breaking codes, and it is accustomed to corporate partnerships that help it divert data traffic or sidestep barriers. But there has never been a Google or Facebook before, and it is unlikely that there are richer troves of valuable intelligence than the ones in Silicon Valley. Read the rest of this entry »

Keeping the UK safe in cyberspace

The growth of the internet has transformed our everyday lives and is an important part of our economy. The internet-related market in the UK is now estimated to be worth £82 billion a year. British businesses earn £1 in every £5 from the internet.

But with greater openness, interconnection and dependency comes greater vulnerability. The National Security Strategy categorised cyber attacks as a Tier One threat to our national security, alongside international terrorism. The threat to our national security from cyber attacks is real and growing. Terrorists, rogue states and cyber criminals are among those targeting computer systems in the UK. Read the rest of this entry »

Air Force says drone computer virus poses ‘no threat’

Combat drones' computer systems reportedly infected with virusA computer virus has infected the U.S.-based cockpits of the military’s Predator and Reaper drones, according to media reports.

The robotic planes are controlled remotely from Creech Air Force Base in Nevada as they fly above Afghanistan, Libya and other war zones. The drones are manufactured by General Atomics Aeronautical Systems Inc. at its sprawling campus in Poway. Read the rest of this entry »

According to Wikipedia, Cyberwarfare "refers to politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfarealthough this analogy is controversial for both its accuracy and its political motivation". Continue reading on