Skip to main content

Home/ Geopolitics Weekly/ Group items tagged Cyber Attacks

Rss Feed Group items tagged

Pedro Gonçalves

Cyber Blitz Hits U.S., Korea - WSJ.com - 0 views

  • U.S. and South Korean computer networks were besieged for days by a series of relatively unsophisticated attacks, possibly from North Korea, that were among the broadest and longest-lasting assaults perpetrated on government and commercial Web sites in both countries.
  • South Korean officials are investigating whether the attacks originated in North Korea, and a senior U.S. official said the U.S. also is probing North Korea's possible role. U.S. officials noted that the attacks, which appear to have started primarily in South Korea on July 4, coincided with North Korea's latest missile launches and followed a United Nations decision to impose new sanctions.
  • The senior U.S. official said the attacks seemed to have come from South Korea, but it was possible Pyongyang was using sympathizers there. "We're trying to assess whether this is some random attack or the North Koreans might be working through a proxy," said the official.
  • ...12 more annotations...
  • If a North Korea link is found, it would mark a new turn in Pyongyang's attempts to lash out at the U.S. North Korea has been building up its capability for cyberattacks in the past couple of years, computer security specialists said. North Korea recently increased the number of people in a cyber-warfare unit, South Korea's Yonhap news agency reported last month.
  • U.S. government Web sites attacked included those of the Defense Department, National Security Agency, Treasury Department, Secret Service, State Department, Federal Trade Commission and Federal Aviation Administration, according to the cyber-security unit of VeriSign Inc., a computer-security company, and others familiar with the attacks. The attacks appear to have occurred roughly from Saturday to Tuesday.
  • Private sites attacked, according to a cyber-security specialist who has been tracking the incidents, included those run by the New York Stock Exchange, Nasdaq, the Washington Post, Amazon.com and MarketWatch.
  • Most U.S. federal Web sites appeared to be running properly Wednesday. In South Korea, several government sites were down late Tuesday and early Wednesday but many were back to normal by Wednesday afternoon. "There is a connection between what is going on here in the states and what is going on in [South] Korea," said Richard Howard, director of intelligence at VeriSign's iDefense cyber-security unit.
  • North Korea turned more antagonistic after the illness of dictator Kim Jong Il last August and September. The country had done little to prepare for a successor, and Mr. Kim's illness triggered an internal shuffle that apparently raised the influence of hard-line military figures.
  • At the White House, spokesman Nicholas Shapiro said the attacks over the weekend "had absolutely no effect on the White House's day-to-day operations." The only effect, he said, was that some Internet users in Asia may not have been able to access the White House's Web site for a time.
  • President Barack Obama has made bolstering cyber-security a priority. He said in May he would create a new White House cyber-security post, though it hasn't yet been staffed. People familiar with the process say the White House has had difficulty finding someone to take the job.
  • Defense officials confirmed Pentagon networks were struck but said the intrusions were detected quickly and did no real damage. Adm. Mike Mullen, the nation's top military officer, said Pentagon networks are under near-constant attack. "I grow increasingly concerned about the cyber-world and the attacks," he said.
  • James Lewis, a cyber-security specialist at the Center for Strategic and International Studies, said of the attack, "It's really a test of which U.S. agencies are ready and which aren't."
  • The New York Stock Exchange's parent company, NYSE Euronext, announced at 12:35 p.m. Wednesday that its Web site, but not its trading systems, had been targeted. Exchange officials weren't aware of the attack until notified by the government on Tuesday, said a person familiar with the events. An NYSE spokesman said the exchange's systems detected zero impact either on the Web site or on the separate trading operations. An official of Nasdaq said there wasn't any impact on its business.
  • Those responsible used a method similar to attacks in recent years on the governments of Estonia and Georgia, called a "distributed denial of service" attack. It is a maneuver in which many computers act in concert to overwhelm Web sites.
  • The cyberattacks came as Washington's point man on North Korea sanctions, Ambassador Philip Goldberg, concluded a weeklong trip to China and Malaysia aimed at tightening the financial screws on Pyongyang. Last week, the Obama administration announced sanctions on two North Korea-linked arms companies. The U.S. Treasury last month listed 17 North Korean banks and businesses that it is seeking to constrict financially.
Pedro Gonçalves

BBC NEWS | Americas | US launches cyber security plan - 0 views

  • US President Barack Obama has announced plans for securing American computer networks against cyber attacks.He said that from now on, America's digital infrastructure would be treated as a strategic national asset. He announced the creation of a cyber security office in the White House, and said he would personally appoint a "cyber tsar".
  • Acts of terror today, he said, could come "not only from a few extremists in suicide vests, but from a few key strokes of a computer - a weapon of mass disruption."
  • In 2007 alone the Pentagon reported nearly 44,000 incidents of what it called malicious cyber activity carried out by foreign militaries, intelligence agencies and individual hackers.
  • ...2 more annotations...
  • In the past, no one US department was responsible for cyber-security, resulting in poor communication and co-ordination, he said. The new cyber-security office will be a multi-billion dollar effort designed to restrict access to government computers and to protect systems - such as those that run the stock exchange and air traffic control - that keep the country going.
  • The Obama administration is also expected to create a new cyber command at the Pentagon with the dual task of eradicating potential vulnerabilities in America's sensitive computer networks, while simultaneously creating ways to exploit them in the systems of potential enemies. An influential study published last year suggested that having an offensive computer warfare capability would have a deterrent effect against would-be attackers.
Argos Media

Computer Spies Breach Fighter-Jet Project - WSJ.com - 0 views

  • Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project -- the Defense Department's costliest weapons program ever -- according to current and former government officials familiar with the attacks.
  • Similar incidents have also breached the Air Force's air-traffic-control system in recent months, these people say. In the case of the fighter-jet program, the intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say, potentially making it easier to defend against the craft.
  • The latest intrusions provide new evidence that a battle is heating up between the U.S. and potential adversaries over the data networks that tie the world together. The revelations follow a recent Wall Street Journal report that computers used to control the U.S. electrical-distribution system, as well as other infrastructure, have also been infiltrated by spies abroad.
  • ...18 more annotations...
  • Attacks like these -- or U.S. awareness of them -- appear to have escalated in the past six months, said one former official briefed on the matter.
  • while the spies were able to download sizable amounts of data related to the jet-fighter, they weren't able to access the most sensitive material, which is stored on computers not connected to the Internet.
  • The Joint Strike Fighter, also known as the F-35 Lightning II, is the costliest and most technically challenging weapons program the Pentagon has ever attempted. The plane, led by Lockheed Martin Corp.
  • A Pentagon report issued last month said that the Chinese military has made "steady progress" in developing online-warfare techniques. China hopes its computer skills can help it compensate for an underdeveloped military, the report said.
  • The Chinese Embassy said in a statement that China "opposes and forbids all forms of cyber crimes." It called the Pentagon's report "a product of the Cold War mentality" and said the allegations of cyber espionage are "intentionally fabricated to fan up China threat sensations."
  • The U.S. has no single government or military office responsible for cyber security. The Obama administration is likely to soon propose creating a senior White House computer-security post to coordinate policy and a new military command that would take the lead in protecting key computer networks from intrusions, according to senior officials.
  • The Bush administration planned to spend about $17 billion over several years on a new online-security initiative and the Obama administration has indicated it could expand on that.
  • Former U.S. officials say the attacks appear to have originated in China. However it can be extremely difficult to determine the true origin because it is easy to mask identities online.
  • Six current and former officials familiar with the matter confirmed that the fighter program had been repeatedly broken into. The Air Force has launched an investigation.
  • Foreign allies are helping develop the aircraft, which opens up other avenues of attack for spies online. At least one breach appears to have occurred in Turkey and another country that is a U.S. ally, according to people familiar with the matter.
  • Joint Strike Fighter test aircraft are already flying, and money to build the jet is included in the Pentagon's budget for this year and next.
  • Computer systems involved with the program appear to have been infiltrated at least as far back as 2007, according to people familiar with the matter. Evidence of penetrations continued to be discovered at least into 2008. The intruders appear to have been interested in data about the design of the plane, its performance statistics and its electronic systems, former officials said.
  • The intruders compromised the system responsible for diagnosing a plane's maintenance problems during flight, according to officials familiar with the matter. However, the plane's most vital systems -- such as flight controls and sensors -- are physically isolated from the publicly accessible Internet, they said.
  • The intruders entered through vulnerabilities in the networks of two or three contractors helping to build the high-tech fighter jet, according to people who have been briefed on the matter. Lockheed Martin is the lead contractor on the program, and Northrop Grumman Corp. and BAE Systems PLC also play major roles in its development.
  • The spies inserted technology that encrypts the data as it's being stolen; as a result, investigators can't tell exactly what data has been taken. A former Pentagon official said the military carried out a thorough cleanup.
  • Investigators traced the penetrations back with a "high level of certainty" to known Chinese Internet protocol, or IP, addresses and digital fingerprints that had been used for attacks in the past, said a person briefed on the matter.
  • As for the intrusion into the Air Force's air-traffic control systems, three current and former officials familiar with the incident said it occurred in recent months. It alarmed U.S. national security officials, particularly at the National Security Agency, because the access the spies gained could have allowed them to interfere with the system, said one former official. The danger is that intruders might find weaknesses that could be exploited to confuse or damage U.S. military craft.
  • In his speech in Austin, Mr. Brenner, the U.S. counterintelligence chief, issued a veiled warning about threats to air traffic in the context of Chinese infiltration of U.S. networks. He spoke of his concerns about the vulnerability of U.S. air traffic control systems to cyber infiltration, adding "our networks are being mapped." He went on to warn of a potential situation where "a fighter pilot can't trust his radar."
Pedro Gonçalves

The Coming Cyber Wars - Harvard - Belfer Center for Science and International Affairs - 0 views

  • Congress should demand answers to questions like: What is the role of cyber war in US military strategy? Is it acceptable to do "preparation of the battlefield" by lacing other countries' networks with "Trojan horses" or "back doors" in peacetime? Would the United States consider a preemptive cyber attack on another nation? If so, under what circumstances? Does US Cyber Command have a plan to seize control and defend private sector networks in a crisis? Do the rules of engagement for cyber war allow for military commanders to engage in "active defense" under some circumstances? Are there types of targets we will not attack, such as banks or hospitals? If so, how can we assure that they are not the victims of collateral damage from US cyber attacks?
Pedro Gonçalves

France24 - IT school denies role in cyber-attack on Google - 0 views

  • A Chinese vocational school which trains IT technicians for the army has denied US media reports that it was behind recent cyber-attacks against Internet giant, Google.
  • the Lanxiang Vocational School in Shandong Province,
  • The New York Times reported on Thursday that the cyber-attacks aimed at Google and dozens of other firms were reportedly traced to computers at two Chinese schools.
  • ...1 more annotation...
  • newspaper said trails led to Shanghai Jiaotong University and the Lanxiang Vocational School, which was created with military backing and trains some of its computer scientists.
Argos Media

New Military Command to Focus on Cybersecurity - WSJ.com - 0 views

  • The Obama administration plans to create a new military command to coordinate the defense of Pentagon computer networks and improve U.S. offensive capabilities in cyberwarfare, according to current and former officials familiar with the plans.
  • The initiative will reshape the military's efforts to protect its networks from attacks by hackers, especially those from countries such as China and Russia. The new command will be unveiled within the next few weeks, Pentagon officials said.
  • The move comes amid growing evidence that sophisticated cyberspies are attacking the U.S. electric grid and key defense programs. A page-one story in The Wall Street Journal on Tuesday reported that hackers breached the Pentagon's biggest weapons program, the $300 billion Joint Strike Fighter, and stole data.
  • ...8 more annotations...
  • A White House team reviewing cybersecurity policy has completed its recommendations, including the creation of a top White House cyberpolicy official
  • Defense Secretary Robert Gates plans to announce the creation of a new military "cyber command" after the rollout of the White House review, according to military officials familiar with the plan.
  • The cyber command is likely to be led by a military official of four-star rank, according to officials familiar with the proposal. It would, at least initially, be part of the Pentagon's Strategic Command, which is currently responsible for computer-network security and other missions.
  • Pentagon officials said the front-runner to lead the new command is National Security Agency Director Keith Alexander, a three-star Army general.
  • Former President George W. Bush's top intelligence adviser, Mike McConnell, first proposed the creation of a unified cyber command last fall. The military's cybersecurity efforts are currently divided between entities like the NSA and the Defense Information Systems Agency, which is responsible for ensuring secure and reliable communications for the military. The Air Force also runs a significant cybersecurity effort.
  • Cyber defense is the Department of Homeland Security's responsibility, so the command would be charged with assisting that department's defense efforts. The relationship would be similar to the way Northern Command supports Homeland Security with rescue capabilities in natural disasters. The NSA, where much of the government's cybersecurity expertise is housed, established a similar relationship with Homeland Security through a cybersecurity initiative that the Bush administration began in its final year.
  • NSA's increasingly muscular role in domestic cybersecurity has raised alarms among some officials and on Capitol Hill. Rod Beckstrom, former chief of the National Cyber Security Center, which is charged with coordinating cybersecurity activities across the U.S. government, resigned last month after warning that the growing reliance on the NSA was a "bad strategy" that posed "threats to our democratic processes."
  • In a rare public appearance Tuesday at a cybersecurity conference in San Francisco, Gen. Alexander called for a "team" approach to cybersecurity that would give the NSA lead responsibility for protecting military and intelligence networks while the Department of Homeland Security worked to protect other government networks.
Pedro Gonçalves

New Cyberwar Rules Of Engagement: Will The U.S. Draft Companies To Fight? - 0 views

  • In a speech to business leaders in New York City Oct. 11, Panetta for the first time admitted the U.S. armed forces were prepared to take on an offensive role against any cyber attackers who seek to cause significant harm to the U.S. - or the loss of life to its citizens. Prior to this statement, the military has acknowledged only a defensive stance against such attacks.
  • The Washington Post reports that among those new rules of engagement, "for the first time, military cyber-specialists would be able to immediately block malware outside the Pentagon’s networks in an effort to defend the private sector against an imminent, significant physical attack, The Post has reported. At present, such action requires special permission from the President."
  • at least one academic paper has argued that companies be drafted to participate in cyberwarfare. "Cyberwarfare… will penetrate the territorial borders of the attacked state and target high-value civilian businesses," wrote University of Dayton Professor Susan Brenner in 2011. "Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is able to respond effectively to cyberattacks. "While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose," Brenner and her co-author, attorney Leo Clarke, added.
Argos Media

Electricity Grid in U.S. Penetrated By Spies - WSJ.com - 0 views

  • Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials.
  • The spies came from China, Russia and other countries, these officials said, and were believed to be on a mission to navigate the U.S. electrical system and its controls. The intruders haven't sought to damage the power grid or other key infrastructure, but officials warned they could try during a crisis or war.
  • Many of the intrusions were detected not by the companies in charge of the infrastructure but by U.S. intelligence agencies, officials said. Intelligence officials worry about cyber attackers taking control of electrical facilities, a nuclear power plant or financial networks via the Internet.
  • ...9 more annotations...
  • "The Chinese have attempted to map our infrastructure, such as the electrical grid," said a senior intelligence official. "So have the Russians."
  • "Over the past several years, we have seen cyberattacks against critical infrastructures abroad, and many of our own infrastructures are as vulnerable as their foreign counterparts," Director of National Intelligence Dennis Blair recently told lawmakers. "A number of nations, including Russia and China, can disrupt elements of the U.S. information infrastructure."
  • Officials said water, sewage and other infrastructure systems also were at risk.
  • Authorities investigating the intrusions have found software tools left behind that could be used to destroy infrastructure components, the senior intelligence official said. He added, "If we go to war with them, they will try to turn them on."
  • protecting the electrical grid and other infrastructure is a key part of the Obama administration's cybersecurity review, which is to be completed next week
  • It is nearly impossible to know whether or not an attack is government-sponsored because of the difficulty in tracking true identities in cyberspace. U.S. officials said investigators have followed electronic trails of stolen data to China and Russia.
  • Russian and Chinese officials have denied any wrongdoing. "These are pure speculations," said Yevgeniy Khorishko, a spokesman at the Russian Embassy. "Russia has nothing to do with the cyberattacks on the U.S. infrastructure, or on any infrastructure in any other country in the world."
  • A spokesman for the Chinese Embassy in Washington, Wang Baodong, said the Chinese government "resolutely oppose[s] any crime, including hacking, that destroys the Internet or computer network" and has laws barring the practice. China was ready to cooperate with other countries to counter such attacks, he said, and added that "some people overseas with Cold War mentality are indulged in fabricating the sheer lies of the so-called cyberspies in China."
  • Specialists at the U.S. Cyber Consequences Unit, a nonprofit research institute, said attack programs search for openings in a network, much as a thief tests locks on doors. Once inside, these programs and their human controllers can acquire the same access and powers as a systems administrator.
Argos Media

BBC NEWS | Technology | Spies 'infiltrate US power grid' - 0 views

  • The US government has admitted the nation's power grid is vulnerable to cyber attack, following reports it has been infiltrated by foreign spies.
  • The Wall Street Journal (WSJ) newspaper reported that Chinese and Russian spies were behind this "pervasive" breach. It said software had been left behind that could shut down the electric grid.
  • "There is a pretty strong consensus in the security community that the SCADA equipment, a class of technology that is used to manage critical infrastructure, has not kept pace with the rest of the industry," said Dan Kaminsky, a cyber security analyst and director of penetration testing for IOActive.
  • ...5 more annotations...
  • The WSJ reported that the intruders had not sought to damage the power grid or any other key infrastructure so far, but suggested they could change their approach in the event of a crisis or war.
  • Security watchers said that, if true, the involvement of the Chinese and Russians in such a scenario would show they were strategically thinking about how either to constrain the US or to inflict more damage if they felt a need to do so.
  • "I think that China recognises if in a very strategic sense you want to ensure you have the ability to exploit another country's potential weakness or vulnerability, but do it in a way that isn't confrontational or cause an international crisis, then this is a very good way of doing that," Eric Rosenbach, of Harvard University's Kennedy School of Government's Belfer Center, told Reuters news agency.
  • The motives behind these alleged attacks are undoubtedly military or political in nature, said Tim Mather, chief security strategist for the RSA Conference, the world's biggest security event.
  • In the coming weeks, a government review of cyber security is due to land on the desk of US President Barack Obama.
Pedro Gonçalves

Obama orders US to draw up overseas target list for cyber-attacks | World news | guardi... - 0 views

  • The 18-page Presidential Policy Directive 20, issued in October last year but never published, states that what it calls Offensive Cyber Effects Operations (OCEO)
  • An intelligence source with extensive knowledge of the National Security Agency's systems told the Guardian the US complaints again China were hypocritical, because America had participated in offensive cyber operations and widespread hacking – breaking into foreign computer systems to mine information.Provided anonymity to speak critically about classified practices, the source said: "We hack everyone everywhere. We like to make a distinction between us and the others. But we are in almost every country in the world."The US likes to haul China before the international court of public opinion for "doing what we do every day", the source added.
Pedro Gonçalves

2 Chinese Schools Said to Be Linked to Online Attacks - NYTimes.com - 0 views

  • A series of online attacks on Google and dozens of other American corporations have been traced to computers at two educational institutions in China, including one with close ties to the Chinese military, say people involved in the investigation.
  • the attacks, aimed at stealing trade secrets and computer codes and capturing e-mail of Chinese human rights activists, may have begun as early as April, months earlier than previously believed.
  • Computer security experts, including investigators from the National Security Agency, have been working since then to pinpoint the source of the attacks. Until recently, the trail had led only to servers in Taiwan.
  • ...6 more annotations...
  • The Chinese schools involved are Shanghai Jiaotong University and the Lanxiang Vocational School
  • Lanxiang, in east China’s Shandong Province, is a huge vocational school that was established with military support and trains some computer scientists for the military. The school’s computer network is operated by a company with close ties to Baidu, the dominant search engine in China and a competitor of Google.
  • Within the computer security industry and the Obama administration, analysts differ over how to interpret the finding that the intrusions appear to come from schools instead of Chinese military installations or government agencies. Some analysts have privately circulated a document asserting that the vocational school is being used as camouflage for government operations. But other computer industry executives and former government officials said it was possible that the schools were cover for a “false flag” intelligence operation being run by a third country. Some have also speculated that the hacking could be a giant example of criminal industrial espionage, aimed at stealing intellectual property from American technology firms.
  • Independent researchers who monitor Chinese information warfare caution that the Chinese have adopted a highly distributed approach to online espionage, making it almost impossible to prove where an attack originated. “We have to understand that they have a different model for computer network exploit operations,” said James C. Mulvenon, a Chinese military specialist and a director at the Center for Intelligence Research and Analysis in Washington. Rather than tightly compartmentalizing online espionage within agencies as the United States does, he said, the Chinese government often involves volunteer “patriotic hackers” to support its policies.
  • Google’s decision to step forward and challenge China over the intrusions has created a highly sensitive issue for the United States government. Shortly after the company went public with its accusations, Secretary of State Hillary Rodham Clinton challenged the Chinese in a speech on Internet censors, suggesting that the country’s efforts to control open access to the Internet were in effect an information-age Berlin Wall.
  • A report on Chinese online warfare prepared for the U.S.-China Economic Security Review Commission in October 2009 by Northrop Grumman identified six regions in China with military efforts to engage in such attacks. Jinan, site of the vocational school, was one of the regions.
Argos Media

U.S. to create cybersecurity military command: report | Technology | Internet | Reuters - 0 views

  • The Obama administration plans to create a new military command to focus on Pentagon computer networks and offensive capabilities in cyberwarfare, The Wall Street Journal reported on Tuesday, citing current and former officials familiar with the plans.
  • The initiative will reshape the military's efforts to protect its networks from attacks by hackers, especially those from countries such as China and Russia, the newspaper said.
  • Pentagon officials were quoted as saying the new command will be unveiled within the next few weeks. The cyber command will likely to be led by a military official of four-star rank and initially would be part of the Pentagon's Strategic Command, the newspaper said, citing officials familiar with the proposal.
  • ...2 more annotations...
  • The newspaper earlier reported that computer spies have repeatedly breached the Pentagon's costliest weapons program -- the $300 billion Joint Strike Fighter project.
  • The Journal quoted former U.S. officials as saying the attacks seemed to have originated in China, although it noted it was difficult to determine the origin because of the ease of hiding identities online.
Pedro Gonçalves

Chinese Army Cyberunit Apparently Attacking U.S. Targets Again - ReadWrite - 0 views

  • The New York Times is reporting that Unit 61398 has resumed operations and is actively engaged in hacking into any U.S. systems that might hold information considered to be of use for the People's Republic of China.
Pedro Gonçalves

UPDATE 4-Powerful 'Flame' cyber weapon found in Iran | Reuters - 0 views

  • a highly sophisticated computer virus is infecting computers in Iran and other Middle East countries and may have been deployed at least five years ago to engage in state-sponsored cyber espionage. Evidence suggest that the virus, dubbed Flame, may have been built on behalf of the same nation or nations that commissioned the Stuxnet worm that attacked Iran's nuclear program in 2010, according to Kaspersky Lab
  • Iran has accused the United States and Israel of deploying Stuxnet.
  • Kaspersky's research shows the largest number of infected machines are in Iran, followed by Israel and the Palestinian territories, then Sudan and Syria.
  • ...4 more annotations...
  • Flame can gather data files, remotely change settings on computers, turn on PC microphones to record conversations, take screen shots and log instant messaging chats.
  • There is some controversy over who was behind Stuxnet and Duqu. Some experts suspect the United States and Israel, a view that was laid out in a January 2011 New York Times report that said it came from a joint program begun around 2004 to undermine what they say are Iran's efforts to build a bomb.
  • Hungarian researcher Boldizsar Bencsath, whose Laboratory of Cryptography and Systems Security first discovered Duqu, said his analysis shows that Flame may have been active for at least five years and perhaps eight years or more. That implies it was active long before Stuxnet.
  • "The scary thing for me is: if this is what they were capable of five years ago, I can only think what they are developing now," Mohan Koo, managing director of British-based Dtex Systems cyber security company.
Pedro Gonçalves

Breakthrough in Tribunal Investigation: New Evidence Points to Hezbollah in Hariri Murd... - 0 views

  • The United Nations special tribunal investigating the murder of former Lebanese Prime Minister Rafik al-Hariri has reached surprising new conclusions -- and it is keeping them secret. According to information obtained by SPIEGEL, investigators now believe Hezbollah was behind the Hariri murder.
  • The Hariri assassination has been the source of wild speculation ever since. Was it the work of terrorist organization al-Qaida, angered by Hariri's close ties to the Saudi royal family? Or of the Israelis, as part of their constant efforts to weaken neighboring Lebanon? Or the Iranians, who hated secularist Hariri?
  • In late 2005, an investigation team approved by the United Nations and headed by German prosecutor Detlev Mehlis found, after seven months of research, that Syrian security forces and high-ranking Lebanese officials were in fact responsible for the Hariri murder. Four suspects were arrested. But the smoking gun, the final piece of evidence, was not found. The pace of the investigation stalled under Mehlis's Belgian successor, Serge Brammertz.
  • ...8 more annotations...
  • At the time of the attack, it was known that Hariri, a billionaire construction magnate who was responsible for the reconstruction of the Lebanese capital after decades of civil war, wanted to reenter politics. It was also known that he had had a falling out with Syrian President Bashar Assad after demanding the withdrawal of Syrian occupation forces from his native Lebanon. As a result, the prime suspects in the murder were the powerful Syrian military and intelligence agency, as well as their Lebanese henchmen. The pressure on Damascus came at an opportune time for the US government. Then-President George W. Bush had placed Syria on his list of rogue states and wanted to isolate the regime internationally.
  • The establishment of a UN special tribunal was intended to provide certainty. It began its work on March 1, 2009. The tribunal, headquartered in the town of Leidschendam in the Netherlands, has a budget of more than €40 million ($56 million) for the first year alone, with the UN paying 51 percent and Beirut 49 percent of the cost. It has an initial mandate for three years, and the most severe sentence it can impose is life in prison. Canadian Daniel Bellemare, 57, was appointed to head the tribunal. Four of the 11 judges are Lebanese, whose identities have been kept secret, for security reasons.
  • As its first official act, the tribunal ordered the release, in early April, of the four men Mehlis had had arrested. By then, they had already spent more than three years sitting in a Lebanese prison.
  • Intensive investigations in Lebanon are all pointing to a new conclusion: that it was not the Syrians, but instead special forces of the Lebanese Shiite organization Hezbollah ("Party of God") that planned and executed the diabolical attack. Tribunal chief prosecutor Bellemare and his judges apparently want to hold back this information, of which they been aware for about a month.
  • a secretly operating special unit of the Lebanese security forces, headed by intelligence expert Captain Wissam Eid, filtered out the numbers of mobile phones that could be pinpointed to the area surrounding Hariri on the days leading up to the attack and on the date of the murder itself. The investigators referred to these mobile phones as the "first circle of hell."
  • They were apparently tools of the hit team that carried out the terrorist attack.
  • there was also a "second circle of hell," a network of about 20 mobile phones that were identified as being in proximity to the first eight phones noticeably often. According to the Lebanese security forces, all of the numbers involved apparently belong to the "operational arm" of Hezbollah, which maintains a militia in Lebanon that is more powerful than the regular Lebanese army.
  • The romantic attachment of one of the terrorists led the cyber-detectives directly to one of the main suspects. He committed the unbelievable indiscretion of calling his girlfriend from one of the "hot" phones. It only happened once, but it was enough to identify the man. He is believed to be Abd al-Majid Ghamlush, from the town of Rumin, a Hezbollah member who had completed training course in Iran. Ghamlush was also identified as the buyer of the mobile phones. He has since disappeared, and perhaps is no longer alive.
Argos Media

China accused over global computer spy ring | World news | The Guardian - 0 views

  • An enormous electronic espionage programme run from servers in China has been used to spy on computers in more than 100 countries, according to two reports published at the weekend.
  • The reports name the system GhostNet, and claim that it has been used to attack governments in south and south-east Asia as well as the offices of the Dalai Lama. In two years, the reports suggest, the operation infiltrated 1,295 computers in 103 countries.
  • While one of the reports remains mute on the identity of the perpetrators, the other has no such qualms, warning that the Chinese government ran a series of cyber attacks on Tibetan exile groups.
  • ...2 more annotations...
  • But the authors of Tracking GhostNet argue that things may not be as they seem in the world of electronic espionage. "We're a bit more careful about it, knowing the nuance of what happens in the subterranean realms," said Ronald Deibert from the University of Toronto. "This could well be the CIA or the Russians.
  • The 10-month investigation also detected bugged computers in the foreign ministries of several countries, including Iran and Indonesia, and in the embassies of India, South Korea, Taiwan, Portugal, Germany and Pakistan
1 - 16 of 16
Showing 20 items per page