Turkey Downs `Drone’ on Syria Border Amid Russia Tensions

The nationality of the craft is unknown, according to a statement by the military. It had violated Turkish airspace before it was warned and then shot down, the military said. The Anadolu Agency posted pictures of soldiers inspecting a crashed drone and Haberturk television also reported that it was an unmanned aircraft, without saying how it got the information. It said the drone fell inside the Turkish border near the town of Kilis. The military declined to comment on the reports.

Continue reading

China reportedly compiling ‘Facebook’ of U.S. government employees

According to CrowdStrike founder Dmitri Alperovitch, Chinese hackers are using information gained from the breaches of the U.S. Office of Personnel Management, as well as intrusions into the Anthem and CareFirst BlueCross BlueShield health insurance networks, to build a complete profile of federal employees in what the company calls a “Facebook of Everything.”

As Fox News has reported, the most sensitive information stolen in the OPM breach was lifted from what is known as the Standard Form 86, or SF-86. The 127-page security clearance application is essentially a road map to your life. It contains highly detailed information on everything from where an applicant lived and worked, to personal references, family members, friends and associates, as well as drug history and intimate health information. Continue reading

China Reveals Its Cyberwar Secrets

A high-level Chinese military organization has for the first time formally acknowledged that the country’s military and its intelligence community have specialized units for waging war on computer networks.

China’s hacking exploits, particularly those aimed at stealing trade secrets from U.S. companies, have been well known for years, and a source of constant tension between Washington and Beijing. But Chinese officials have routinely dismissed allegations that they spy on American corporations or have the ability to damage critical infrastructure, such as electrical power grids and gas pipelines, via cyber attacks.

Continue reading