ThysenKrupp, a German conglomerate that produces submarines for Israel’s Navy, announced Thursday that its computer systems were attacked in the beginning of the year and that a great amount of technical and other data was stolen. Continue reading
According to the annual report of the US-China Economic and Security Review Commission, Chinese cyber espionage is a “major problem” for America
China has gained military benefits in recent years from stealing defense secrets through industrial and cyber espionage carried out by its intelligence services, according to a US congressional report.
“In recent years, Chinese agents have extracted data on some of the most advanced weapons and weapons systems in the US arsenal, such as jet fighters and unmanned submersible vehicles,” states the annual report of the US-China Economic and Security Review Commission, released on November 16.
“The loss of these and other sensitive defense technologies undermines US military superiority by accelerating China’s military modernization and giving China insight into the capabilities and operation of US weapons and weapons systems,” the report adds. Continue reading
Georgia’s secretary of state has claimed the Department of Homeland Security tried to breach his office’s firewall and has issued a letter to Homeland Security Secretary Jeh Johnson asking for an explanation.
Brian Kemp issued a letter to Johnson on Thursday after the state’s third-party cybersecurity provider detected an IP address from the agency’s Southwest D.C. office trying to penetrate the state’s firewall. According to the letter, the attempt was unsuccessful. Continue reading
Russian authorities say they prevented a large-scale cyber attack by “a foreign intelligence service”, which had been designed to destabilize the country’s financial system and subvert its economy. In an official statement published on its website last week, Russia’s Federal Security Service (FSB) said the perpetrators of the foiled attack had planned to carry it out on December 5. The spy agency, which stems from the Soviet-era KGB, said that the cyber attack had been designed to bring down computer systems belonging to some of Russia’s largest banking institutions. Continue reading
The Navy’s Littoral Combat Ship program is behind schedule, hundreds of millions over budget, and incapable of conducting most of the basic missions it was intended to carry out. Senators on Thursday said they wanted to know why.
“Like so many major programs that preceded it, LCS’s failure followed predictably from an inability to define and stabilize requirements, unrealistic initial cost estimates, and unreliable assessments of technical and integration risk, made worse by repeatedly buying ships and mission packages before proving they are effective and can be operated together,” said Senate Armed Services Chairman John McCain, R-Ariz., told Pentagon witnesses during a hearing.
Sen. Lindsey Graham, R-S.C., was more blunt. “The process is completely broken. If you want this to stop, somebody needs to get fired.” Continue reading
BERLIN – Until recently, the phenomenon of Russian government propaganda was only interesting to a small group of Russia experts, news junkies and counter-propaganda fundraisers. It was mainly seen as a tool for keeping Russians supportive of Vladimir Putin. No longer. Thanks to post-U.S. election blame games, and the upcoming election season in Europe, how the Russian state pushes its messages to Western audiences is a hot political topic. It’s also woefully misunderstood.
As the Russian journalist Alexey Kovalev, who started his own project to debunk Russian government propaganda, puts it: “The fight against fake news has itself turned into fake news. It’s a kind of meta-propaganda.” Continue reading
MOSCOW could use satellites to attack other spacecraft or Earth, senior US scientists and military bosses have spectacularly warned.
In a terrifying scenario plucked straight from the pages of a James Bond espionage thriller, the experts said Russia could use kamikaze satellites to take out vital space infrastructure or “swallow” smaller satellites.
Spacecraft could also be manipulated to attack targets on Earth in a conflict reminiscent of a Star Wars movie. Continue reading
Nearly a million customers of telecoms company Deutsche Telekom AG began experiencing network outages, possibly to due hacker sabotage.
Deutsche Telekom said that an outage of service to nearly one million customers over the weekend was possibly a botched attempt to capture a massive botnet.
Deutsche Telekom’s head of IT security Thomas Tschersich, speaking to German newspaper Der Tagesspiegel, blamed the outages that hit 900,000 customers over the 26 November weekend on hackers who tried and failed to recruit those customers’ routers into a botnet. Continue reading
ISLAMIST terrorists infiltrated Germany’s intelligence agency and planned to blow it up by planting a bomb in the Cologne office, killing hundreds in the process.
A 51-year-old employee of the domestic intelligence service has been arrested after he made Islamist terror inspired comments on social media.
The German national is understood to have been planning to detonate a bomb in the Bundesamt fur Verfassungsschutz (BfV) building and offered to share classified information with terrorists. Continue reading
Agent told ‘by end of month we’re not covering it anymore’
An active smuggling route at the U.S. southern border with Mexico will be largely abandoned by the government at the end of this month, an agent with U.S. Border Patrol has informed WND.
The so-called “S2 route” runs along a two-lane county road through a remote area. More than 900 illegal immigrants have been apprehended on the route over the past year, said the agent, who works out of the USBP’s El Centro sector but asked not to be identified.
“For basically the last year we’ve been out there covering that route. Now we were told by the end of this month we’re not going to cover it anymore,” said the agent, who said he has personally patrolled the route in the past. “Nobody is going to be on this road come Oct. 1. Continue reading
Chinese-authored spyware that can be used to track a user’s movements and communications has been found on some 700 million Android smartphones, security researchers said.
The spyware, discovered by Virginia-based Kryptowire, was reportedly authored by Chinese startup Shanghai Adups Technology Company. Continue reading
WASHINGTON, NOV. 16, 2016 – None of America’s four military branches rates higher than “marginal” in its ability to protect American interests, and one — the Army — is classified as “weak,” according to the 2017 Index of U.S. Military Strength, released today by The Heritage Foundation.
The current U.S. military force is capable of meeting the demands of a single major regional conflict while also handling its other missions worldwide, Index editors say. But handling two major conflicts simultaneously — a distinct possibility, given the growing threats detailed elsewhere in the Index — is likely beyond the ability of the force given its current condition. Continue reading
THEY CALLED IT Project X. It was an unusually audacious, highly sensitive assignment: to build a massive skyscraper, capable of withstanding an atomic blast, in the middle of New York City. It would have no windows, 29 floors with three basement levels, and enough food to last 1,500 people two weeks in the event of a catastrophe.
But the building’s primary purpose would not be to protect humans from toxic radiation amid nuclear war. Rather, the fortified skyscraper would safeguard powerful computers, cables, and switchboards. It would house one of the most important telecommunications hubs in the United States — the world’s largest center for processing long-distance phone calls, operated by the New York Telephone Company, a subsidiary of AT&T.
The building was designed by the architectural firm John Carl Warnecke & Associates, whose grand vision was to create a communication nerve center like a “20th century fortress, with spears and arrows replaced by protons and neutrons laying quiet siege to an army of machines within.” Continue reading