-
26 -- Second test of the water and Africa story codes
The sovereign citizen movement, the roots of which lie in white separatism and anti-Semitism, now welcomes non-white adherents. Especially susceptible to recruitment efforts by the movement are African Americans – called “Moorish Americans” or “Moorish Natives” by movement members – from poor and neglected neighborhoods.“They are much more reflective of the demographics of society today,” a former FBI case manager notes.
-
-
25 -- Testing the functionality of the Africa and Water story codes
The sovereign citizen movement, the roots of which lie in white separatism and anti-Semitism, now welcomes non-white adherents. Especially susceptible to recruitment efforts by the movement are African Americans – called “Moorish Americans” or “Moorish Natives” by movement members – from poor and neglected neighborhoods.“They are much more reflective of the demographics of society today,” a former FBI case manager notes.
-
-
22 -- Testof Africa and Water codes functionality
Three members of a right-wing militia have been sentenced to twelve years in prison for conspiring to use weapons of mass destruction in attacks against federal government agencies. The defendants planned to attack critical infrastructure in Georgia while motivating militia groups in other states to rise up and join them in removing government officials who they believed had exceeded their Constitutional power. The militia members planned on starting a revolution against the federal government by conducting an attack aimed at the infrastructure supporting the TSA, DHS, and FEMA.
-
-
21 -- Test of the Waer and Africa codes functionality
Three members of a right-wing militia have been sentenced to twelve years in prison for conspiring to use weapons of mass destruction in attacks against federal government agencies. The defendants planned to attack critical infrastructure in Georgia while motivating militia groups in other states to rise up and join them in removing government officials who they believed had exceeded their Constitutional power. The militia members planned on starting a revolution against the federal government by conducting an attack aimed at the infrastructure supporting the TSA, DHS, and FEMA.
-
-
CybersecurityCombating cyber threats to the global financial industry
Today more than fifteen billion devices are connected to the Internet; in the next five years, that number will grow to fifty billion. With each new device presenting an opportunity to be infiltrated and compromised by hackers, it is easy to understand why the importance of cybersecurity continues to skyrocket. So explained keynote speaker Elizabeth Petrie, director of strategic intelligence analysis for Citigroup, who kicked off a one-day conference at the University of Delaware on cybersecurity issues impacting the global financial industry.
-
-
EncryptionUSMobile launches Scrambl3 mobile, Top Secret communication-standard app
Irvine, California-based USMobile, a developer of private mobile phone services, yesterday launched Scrambl3, a smartphone app that enables users to create their own Private Mobile Network. When Scrambl3 users communicate with each other, Scrambl3 creates a Dark Internet Tunnel between their smartphones. This Tunnel cloaks the calls and texts by making them invisible on the Internet. Scrambl3 App for Android-based phones is available for a 60-day free beta offering from the Google Play Store.
-
-
False tweetsRumor-detection software detects, corrects erroneous claims on Twitter
A week after the Boston marathon bombing, hackers sent a bogus tweet from the official Twitter handle of the Associated Press. It read: “Breaking: Two Explosions in the White House and Barack Obama is injured.” Before the AP and White House could correct the record, the stock market responded, dropping more than 140 points in a matter of minutes. Losses mounted into the billions. The market recovered just as quickly, but analysts said the timeframe could well have been long enough for in-the-know perpetrators to profit through trading. Researchers have developed software to help society identify and correct erroneous claims on Twitter.
-
-
Terrorism & mediaExposure to media coverage of terrorist acts, disasters may cause long-term negative health effects
The city of Boston endured one of the worst terrorist attacks on U.S. soil in April of 2013, when two pressure-cooker bombs exploded near the finish line of the Boston Marathon. While emergency workers responded to the chaos and law enforcement agencies began a manhunt for the perpetrators, Americans fixed their attention to television screens, Internet news sites and forums, and Twitter, Facebook, and other social media. In doing so, some of those people may have been raising their acute stress levels which, in some cases, have been linked with long-term negative health effects. For some individuals, intense exposure to the Boston Marathon bombing through media coverage could be associated with more stress symptoms than those who had direct exposure to the attack.
-
-
HackingA growing threat: Car hacking
A string of high-profile hacks — the most recent on President Obama’s personal email account — have made cybercrime an ever-growing concern in the United States. Despite the publicity, most people still think of hacking as something which is done only to information systems like computers and mobile devices. In reality, hacking is no longer confined to the information world. The level of automation in modern physical systems means that even everyday automobiles are now vulnerable to hacking. Researchers are now looking into the growing threat of automotive hacking. “More and more in your everyday life you see that we’re automating physical systems,” one researcher says. “And unlike an information system, a physical system could kill you by accident.”
-
-
EncryptionTech companies urge rejection of push by FBI, DOJ for electronic devices “backdoors”
In a 19 May letter to President Barack Obama, a group of Silicon Valley tech companies, cyber-security experts, and privacy advocacy groups urged the president to reject the implementation of “backdoors” in smartphone and computer encryption. The letter offered evidence of the strong objection of the tech industry to demands from the Justice Department and the Federal Bureau of Investigation (FBI) to allow secret backdoor passages into consumer electronics, which would make it possible for law enforcement to read encrypted private communications and data.
-
-
CybersecurityOne false tweet sent financial markets into a tailspin
A false tweet from a hacked account owned by the Associated Press (AP) in 2013 sent financial markets into a tailspin. The Dow Jones Industrial Average dropped 143.5 points and the Standard & Poor’s 500 Index lost more than $136 billion of its value in the seconds that immediately followed the post. Once the nature of the tweet was discovered, the markets corrected themselves almost as quickly as they were skewed by the bogus information, but the event, known as Hack Crash, demonstrates the need better to understand how social media data is linked to decision making in the private and public sector.
-
-
AviationHow a hacker could hijack a plane from their seat
Reports that a cybersecurity expert successfully hacked into an airplane’s control system from a passenger seat raises many worrying questions for the airline industry. It was once believed that the cockpit network that allows the pilot to control the plane was fully insulated and separate from the passenger network running the in-flight entertainment system. This should make it impossible for a hacker in a passenger seat to interfere with the course of the flight. But the unfolding story of this hacker’s achievement, which has prompted further investigation by authorities and rebuttals from plane manufacturers, means that this assumption needs to be revisited.
-
-
CybersecurityOngoing attack against oil tankers aims to defraud oil brokers
A new report details a malicious and largely unknown targeted attack on oil tankers. First discovered in January 2014, the ongoing attack on oil cargos began in August 2013, and is designed to steal information and credentials for defrauding oil brokers. Despite having been compromised by this cyber-attack, which has been dubbed the “Phantom Menace,” none of the dozens of affected companies have been willing to report the invasion and risk global attention for vulnerabilities in their IT security networks.
-
-
China syndromeMassive cyberattack by Chinese government hackers on Penn State College of Engineering
The Penn State College of Engineering has been the target of two sophisticated cyberattacks conducted by so-called “advanced persistent threat” actors. The FireEye cybersecurity forensic unit Mandiant, which was hired by Penn State after the breach was discovered, has confirmed that at least one of the two attacks was carried out by a threat actor based in China, using advanced malware to attack systems in the college. In a coordinated response by Penn State, the College of Engineering’s computer network has been disconnected from the Internet and a large-scale operation to securely recover all systems has been launched. On 21 November 2014 Penn State was alerted by the FBI to a cyberattack of unknown origin and scope on the school’s College of Engineering.
-
-
Cyber businessPentagon to invest in Silicon Valley tech startups to help develop advanced cyber solutions
The Pentagon will begin to invest in Silicon Valley tech startups as part of the department’s plan to develop and acquire more advanced cyber solutions to secure the country and military’s digital infrastructure. The investments will be made through In-Q-Tel, a nonprofit strategic investing firm the Central Intelligence Agency launched sixteen years ago. In-Q-Tel does not invest in companies alone, but rather relies on traditional venture firms to partner and contribute the lion’s share of the funding, so having them on board is critical for the program’s success.
-
More headlines
Who's online
The long view
Infrastructure protectionU.S. contemplates responses to a cyber-Pearl Harbor attack on critical infrastructure
Cybersecurity experts often contemplate how U.S. security agencies would react to a cyber-9/11 or a digital Pearl Harbor, in which a computer attack would unplug the power grid, disable communications lines, empty bank accounts, and result in loss of life. “Ultimately, it absolutely could happen,” says one expert. “Yeah, that thought keeps me up at night, in terms of what portion of our critical infrastructure could be really brought to its knees.”
Cyber insuranceTo bolster the world’s inadequate cyber governance framework, a “Cyber WHO” is needed
A new report on cyber governance commissioned by Zurich Insurance Group highlights challenges to digital security and identifies new opportunities for business. It calls for the establishment of guiding principles to build resilience and the establishment of supranational governance bodies such as a Cyber Stability Board and a “Cyber WHO.”
CybersecurityU.S. adopts a more assertive cyber defense posture
Recent cyberattacks and intrusions by hackers, operating alone or backed by nation-states, have prompted the Pentagon and DHS to reaffirm their commitment to upholding the reliability and integrity of America’s cyber network and the systems connected to it. Americans rely on the connected Web to deliver critical services such as water and electricity, and should the Web be breached by bad actors, the consequences could threaten national security. “If we look at cyberspace as a hostile environment and there are bad people out there who want to do bad things to us, it may cause a wholesale re-examination of the way we build our systems in the first place,” noted one expert.