Home » Entries posted by Flash Critic
Stories written by Flash Critic

The 3 biggest cybersecurity threats to America

Read More

U.S. needs to ramp up iWar counterattacks with ‘Information America’

U.S. needs to ramp up iWar counterattacks with ‘Information America’

By Bill Gertz 
 
Russia’s intelligence service hacks Democratic Party computer networks and puts out stolen emails in a bid to influence the 2016 election. China says it owns 90 percent of the South China Sea and begins building military bases under a vague historical claim to the strategic waterway. Iranian hackers break into American banks and a water control computer network at an upstate New York dam. Welcome to the new form of conflict in the 21st century: information warfare. 
  American adversaries have found asymmetric ways to attack and…

Foreign states preparing cyber attacks on infrastructure in future war

Foreign nations’ cyber intrusions into key infrastructure network are preparation for damaging attacks in a future conflict, the commander of Cyber Command told Congress Tuesday. Adm. Mike Rogers, the commander who is also director of the National Security Agency, said one of his major concerns is cyber attacks on critical infrastructures used to run the electric grid, financial systems, communications networks, the transportation systems, and others. “We assess that several countries, including Iran, have conducted disruptions or remote intrusions into critical infrastructure systems in the United States,” Rogers said in his prepared…

Chinese supercomputers threaten U.S. security

China is eclipsing the United States in developing high-speed supercomputers used to build advanced weapons, and the loss of American leadership in the field poses a threat to U.S. national security. That’s the conclusion of a recent joint National Security Agency-Energy Department study, based on an assessment of China’s new supercomputer called the TaihuLight. “National security requires the best computing available, and loss of leadership in [high-performance computing] will severely compromise our national security,” the report warns. Full story…
Washington Times
May 3, 2017… Read More

Cyber sabotage of North Korea’s missiles

The unsuccessful test launch of a North Korean medium-range missile on Saturday has fueled media speculation the missile blew up as a result of U.S. clandestine cyber attacks. Asked if secret U.S. intervention caused the explosion of the North Korean test launch, White House Deputy National Security Adviser K.T. McFarland said Sunday, “We can’t talk about secret intelligence and things that might have been done, covert operations that might have happened.” If U.S. intelligence succeeded in getting into the supply chain used by North Korea to acquire parts for missiles from abroad,…

Intel: Russian election hacking was long-term information ‘assault’

New details emerged in Senate testimony revealing how Russia’s Vladimir Putin directed a large-scale information “assault” on the U.S. presidential election to undermine the American democratic system, senior U.S. intelligence leaders disclosed during Senate testimony Tuesday. Director of National Intelligence James Clapper told the Senate Intelligence Committee that intelligence agencies did not seek to assess the impact the Russian activity on the outcome of the election. But Clapper said the combined Russian hacking and influence campaign was wide-ranging, continued for years and was among the most aggressive covert actions by Moscow in…

Ai Weiwei: How censorship works

BEIJING — In the space of a month in 2014, at separate art exhibitions in Beijing and Shanghai that included my work, my name was blotted out — in one case by government officials and by exhibitors themselves in the other case. Some people might take such treatment in stride, as nothing to get huffy about. But as an artist, I view the labels on my work as a measure of the value I have produced — like water-level markers at a riverbank. Other people might just shrug, but I…

A truly ‘open Internet’ would be free of burdensome FCC regulation

In late April, FCC chairman Ajit Pai announced at a press conference at the Newseum that his agency would revisit its 2015 determination that Title II of the Communications Act of 1934 gave it broad authority to regulate the Internet, including the ability to scrutinize online content, routine negotiations between firms, and cutting-edge services. The American public will hear howling all summer from D.C., New York, and San Francisco, as tech bloggers, lobbyists, late-night talk-show hosts, and leading newspapers attempt to spin the decision as some kind of corporate giveaway.…

Page 1 of 135123Next ›Last »