Home » Archives by category » Week in Cyber Threat Space (Page 3)

Advanced cyber threats to U.S. infrastructures posed by China and Russia increase, DNI reveals

Advanced cyber threats to U.S. infrastructures posed by China and Russia increase, DNI reveals

By Bill Gertz 
  Future cyber attacks against the United States will not be limited to data theft but will involve the covert changing of data aimed at influencing governments and causing physical destruction. 
 
China and Russia represent the most advanced strategic cyber threats, with Iran and North Korea close behind. And the danger of actors in cyberspace disrupting critical U.S. infrastructures is growing, according to testimony last week from the America’s highest ranking intelligence official. 
  Director of National Intelligence James Clapper revealed in annual congressional testimony on world threats…

U.S. Cyber Command: OPM hacking reveals new trend in Chinese Big Data spying

U.S. Cyber Command: OPM hacking reveals new trend in Chinese Big Data spying

By Bill Gertz 
  China’s theft of millions of records on Americans was part of a Big Data spying program by Beijing that prompted the Pentagon to take new steps to secure large data concentrations. 
  That was the assessment of U.S. Cyber Command commander Adm. Mike Rogers who on Thursday called the compromise of 22 million records from the Office of Personnel Management (OPM) as well as millions of heath care records in an earlier attack disclosed last year a new form of cyber spying. 
  The Chinese cyber attacks from 2014…

Chinese cyber attacks, failed U.S. response mark 2015 as year of pervasive, growing cyber threats

Chinese cyber attacks, failed U.S. response mark 2015 as year of pervasive, growing cyber threats

By Bill Gertz 
   “We’re sort of in the wild west here with cyber, where there are no limits.” So declared Director of National Intelligence James Clapper to Congress in October. The DNI was reflecting widespread frustration within defense and intelligence circles with Chinese cyber attacks that over the past decade inflicted immense damage on U.S. national security interests. 
   Twenty-fifteen will be remembered as a turning point in exposing new levels of Chinese cyber attacks and online espionage at the same time the U.S. government refused to take effective steps to…

War on Islamic State shifts to cyber space

War on Islamic State shifts to cyber space

By Bill Gertz 
 
The deadly Paris terrorist attacks are prompting western governments to step up efforts to block the Islamic State from using cyber space to communicate, recruit members and propagandize. 
 
The terrorists who killed 130 people and wounded more than 300 Nov. 13 used an encrypted messaging service called Telegram that was developed in Russia that some analysts say was used by Islamic State to coordinate the attacks. 
 
The discovery prompted Telegram, a pro-privacy organization that allows users to communicate using encryption and to self-destruct messages,…

War against Islamic State terrorism shifts to cyber space

War against Islamic State terrorism shifts to cyber space


By Bill Gertz The deadly Paris terrorist attacks are prompting western governments to step up efforts to block the Islamic State from using cyber space to communicate, recruit members and propagandize. The terrorists who killed 130 people and wounded more than 300 Nov. 13 used an encrypted messaging service called Telegram that was developed in Russia that some analysts say was used by Islamic State to coordinate the attacks. The discovery prompted Telegram, a pro-privacy organization that allows users to communicate using encryption and to self-destruct messages, to suspend 78 accounts of…

Chinese cyber espionage is part of communist-led ‘information war’ waged against United States

Chinese cyber espionage is part of communist-led ‘information war’ waged against United States


By Bill Gertz 
  The escalating threat of relentless Chinese cyber attacks on U.S. information networks – both public and private – derives from an information warfare campaign by the government of China designed to boost overall national power and weaken Beijing’s main enemy – the United States. 
  Contrary to American sympathizers who insist the emerging economic and military superpower in Beijing is no longer a state driven by a Marxist-Leninist ideology supposedly declared extinct when the Soviet Union ended, China’s reform communist regime is using classic Cold War-style tactics…

Controversial cyber threat intelligence-sharing bill: Threat to hackers or to Americans’ privacy?

Controversial cyber threat intelligence-sharing bill: Threat to hackers or to Americans’ privacy?

By Bill Gertz 
  The Senate last week voted to move forward with controversial legislation that supporters say would improve cyber threat information sharing between the government and industry but that critics say would undermine Americans’ electronic privacy. The measure passed the Senate on Tuesday with a 74-21 vote. 
  The Cyber Security Information Sharing Act, produced by the Senate Intelligence Committee, was debated Thursday prior to a vote on cloture. The Senate took up numerous amendments offered by proponents and opponents. 
  A careful reading of the legislation reveals provisions that are…

Chinese companies linked to cyber theft of U.S. trade secrets identified as state-run enterprises

Chinese companies linked to cyber theft of U.S. trade secrets identified as state-run enterprises

By Bill Gertz
New details emerged last week highlighting the threat posed to U.S. companies by Chinese cyber espionage.
U.S. authorities identified three Chinese state-owned enterprises linked to the May 2014 indictment of five People’s Liberation Army hackers who broke into U.S. company networks and stole trade secrets related to aluminum, steel and nuclear power manufacturing.
The companies were identified in news reports as Chinalco, Beijing’s largest aluminum manufacturer, Baosteel, a steel manufacturers and State Nuclear Power Technology Corp. (NPTC), a nuclear power company. Chinalco is headed by Ge Honglin,…