The documents, published Monday in collaboration with Japanese news broadcaster NHK, reveal the complicated relationship the NSA has maintained with Japan over a period of more than six decades. Japan has allowed NSA to maintain at least three bases on its territory and contributed more than half a billion dollars to help finance the NSA’s facilities and operations. In return, NSA has kitted out Japanese spies with powerful surveillance tools and shared intelligence with them. However, there is a duplicitous dimension to the partnership. While the NSA has maintained friendly ties with its Japanese counterparts and benefited from their financial generosity, at the same time it has secretly spied on Japanese officials and institutions.
La ciberguerra ha dejado de ser una excentricidad reservada a actos aislados, a pequeñas cosas. Las nuevas tecnologías forman parte de los civiles y sus ejércitos. Y atacarlas se ha puesto a la par de la guerra convencional.
Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down. We don’t know who is doing this, but it feels like a large nation state. China or Russia would be my first guesses.
An Israeli technology company has been accused of creating and supplying an aggressive interception program capable of taking over Apple’s iPhones and turning them into remote spying devices, after it was allegedly used to target a Middle Eastern human rights activist and others.
El libro pretende incentivar la mirada crítica entre el gran público ante los acontecimientos calificados de “ciberguerra” y alertar de la coartada que puede proporcionar el tremendismo sensacionalista en estos temas a quienes pretenden recortar libertades o privacidad.
Estados Unidos “quebrantó” las redes informáticas de Corea del Norte en 2010 y por eso supo que el país estaba detrás del ataque a Sony Pictures, reportaron The New York Times y Der Spiegel.
Corea del Norte dedicó dos meses a entrar en los sistemas de Sony después de que la empresa anunciara sus planes para producir una comedia sobre el asesinato del líder de este país, titulada “The Interview”.
La Agencia de Seguridad Nacional logró romper las barreras informáticas en 2010 y entrar en los sistemas norcoreanos a través de las redes chinas que conectan a este país con el resto del mundo.
Corea del Norte ha negado repetidamente su responsabilidad en el ciberataque contra Sony.
Algunas cuentas de redes sociales del Comando Central del Ejército de Estados Unidos (CentCom) fueron hackeadas este lunes por un grupo que se declaró simpatizante de Estado Islámico.
Centcom es el comando estadounidense que maneja las operaciones en Medio Oriente, Asia Central y Africa del Norte, y por tanto es donde se coordina la ofensiva contra EI en Irak y Siria.
En la cuenta de Twitter se pudo observar como los piratas informáticos cambiaron las imágenes de la cuenta y ubicaron la de un hombre encapuchado y el siguiente mensaje: “El cibercalifato continúa su ciber yihad. Ya está aquí. Estamos en sus PCs. En cada base militar”.
También fue publicada una lista de generales y una lista de direcciones aparentemente asociadas a ellos.
Además se colocó una serie de lo que parece ser documentos militares vinculados a China y Corea del Norte.
En el sitio de YouTube fueron colocados videos de propaganda del grupo mostrando operaciones militares.
The Twitter account for US military forces in the Middle East and South Asia was hacked on Monday.
@CENTCOM, the account used by the US Central Command, tweetedout “messages from Islamic State (Isis) sympathizers threatening attacks on US military personnel”. Other tweets contained contact details for current and retired senior officers, though they did not appear to disseminate classified material.
The Twitter avatar used by the command was replaced with an image of a masked militant and the legends “CyberCaliphate” and “I love Isis”.
Documents and images tweeted out by the hackers did not appear to be classified, despite their boast that Isis had deeply penetrated the cyber defenses of the US military. Other military websites, including Central Command’s, appeared unaffected, and did not show any mark of cybervandalism, let alone any more hostile acts.
A similar avatar appeared on Central Command’s YouTube channel as well, as did at least two pro-Isis videos. Its Facebook account appeared unaffected.
“American soldiers, we are coming, watch your back!” read one tweet.Another claimed: “Isis is already here, we are in your PCs, in each military base.”
Within minutes of the hijacked tweets, the Twitter account switched to a neutral, egg-like avatar as the unauthorized tweets paused. Twitter appeared to have suspended the account shortly after 1pm ET.
The hack happened nearly the same time President Obama was unveiling a plan to require companies to inform customers when their data has been hacked.
Security experts investigating the devastating hack against Sony Pictures appear to be moving away from the theory that the attack was a carried out by North Korea, focusing instead on disgruntled former employees of the firm.
Researchers at Norse cybersecurity claim that six former employees could have compromised the company’s networks, arguing that accessing and navigating selective information would take a detailed knowledge of Sony’s systems.
Norse is not part of the official FBI investigation, but did brief the government on Monday, the company said. Though noting that the findings are “hardly conclusive”, Norse senior vice president Kurt Stammberger told the Security Ledger that nine researchers had begun to explore the theory that an insider with motive against Sony would be best placed to execute a hack.
“The FBI points to reused code from previous attacks associated with North Korea, as well as similarities in the networks used to launch the attacks,” said writer Bruce Schneier. “This sort of evidence is circumstantial at best. It’s easy to fake, and it’s even easier to interpret it wrong. In general, it’s a situation that rapidly devolves into storytelling, where analysts pick bits and pieces of the ‘evidence’ to suit the narrative they already have worked out in their heads.”
Schneier also said that diplomatically, it may suit the US government to be “overconfident in assigning blame for the attack” to try and discourage future attacks by nation states.
He also pointed to comments by Harvard law professor Jonathan Zittrain, who said Sony might be encouraged to present the hack as an act or terrorism to help fend of likely lawsuits from current and former employees damaged by leaked material.
“If Sony can characterize this as direct interference by or at the behest of a nation-state, might that somehow earn them the kind of immunity from liability that you might see other companies getting when there’s physical terrorism involved, sponsored by a state?” Zittrain told AP.
The sanest thing anyone said in Washington this week was a reminder, on the Friday before Christmas, when Barack Obama took a break from oscillating between reassuring rationality and understated fear to make an accidental joke:
It says something about North Korea that it decided to mount an all-out attack about a satirical movie … starring Seth Rogen.
Unfortunately, acting rational seems out of the question at this point. In between making a lot of sense about Sony’s cowardly “mistake” to pull a film based on a childish, unsubstantiated threat, Obama indicated the US planned to respond in some as-yet-unknown way, which sounds a lot like a cyberattack of our own.
La empresa de seguridad en Internet Karspersky, con sede en Moscú, ha detectado el virus Flame, diseñado para recopilar y robar información estratégica. Se trata del software de espionaje más complejo que se ha descubierto, y ha estado funcionando al menos durante cinco años, según la compañía. La mayoría de los ordenadores afectados, Kaspersky ha detectado unos 600, se encuentra en Irán, Israel, Palestina y Siria, seguidos de otros países de fuera de esa región, como Sudán.