13 Items

Researcher Dillon Beresford said it took him two months and $20,000 in equipment to find vulnerabilities in electronic controllers used in Iran. The vulnerabilities allowed him to take remote control of the devices and reprogram them (Aug. 31, 2011)

AP Photo/Eric Gay

Analysis & Opinions - ABC

Yes, It's Possible to Hack the Election

| Friday, August 19, 2016

After reports of alleged Russian hacking into Democratic Party computer networks, some commentators have suggested that the Russians could hack the results of the U.S. elections. Other analysts have, well before this year’s campaign, suggested that election results in the U.S. could be electronically manipulated, including by our fellow Americans. So could an American election’s outcome be altered by a malicious actor on a computer keyboard?

I have had three jobs that, together, taught me at least one thing: If it’s a computer, it can be hacked.

Running Out of Time on Iran, and All Out of Options

Wikimedia Commons CC

Newspaper Article - The Times of Israel

Running Out of Time on Iran, and All Out of Options

    Author:
  • David Horovitz
| June 19, 2013

"...[Y]es, I think Stuxnet had a few down sides. One of those down sides was that the actual attack code became publicly available. As far as I can tell the attack code was supposed to die and not get out onto the Internet, but apparently the same way it got into Natanz [Iranian nuclear enrichment facility], it got out...."

Analysis & Opinions - The Washington Post

A Global Cyber-crisis in Waiting

| February 7, 2013

"Like-minded nations should also agree that governments should not steal data from private corporations and then give that information to competing companies, as the government of China has been doing on a massive scale. The victims of Chinese economic espionage should seek to establish clear guidelines and penalties within the World Trade Organization system or, if China blocks that, victim states should seek to develop countermeasures and sanctions outside of that structure."

A computer forensic examiner looks for evidence on hard drives at the Dept. of Defense Cyber Crime Center in Linthicum, Md., Aug. 11, 2011. Hackers and hostile states are launching increasingly sophisticated cyberattacks against U.S. defense contractors.

AP Photo

Analysis & Opinions - The New York Times

How China Steals Our Secrets

| April 2, 2012

"Under Customs authority, the Department of Homeland Security could inspect what enters and exits the United States in cyberspace. Customs already looks online for child pornography crossing our virtual borders. And under the Intelligence Act, the president could issue a finding that would authorize agencies to scan Internet traffic outside the United States and seize sensitive files stolen from within our borders."

A security guard, right, stands at the entrance of El Al sales offices in Tel Aviv, Israel, Jan. 16, 2012. Hackers disrupted the websites of Israel's stock exchange and El Al in a deepening cyber war launched by a group claiming to be Saudis.

AP Photo

Analysis & Opinions - The Wall Street Journal

Cyber Attacks Can Spark Real Wars

| February 16, 2012

"The recent hacker exchange should also remind us that just as hacking could escalate to the use of conventional force in the Middle East, the reverse is also true. Bombing Iran, for example, could unleash an Iranian government cyber attack. Israelis say they could handle that, despite the recent evidence to the contrary. Unfortunately, much of the critical infrastructure in the U.S. is still not ready for a sophisticated nation-state cyber attack either."

Army Gen. Keith B. Alexander, commander of the U.S. Cyber Command, center, arrives on Capitol Hill in Washington, Sept. 23, 2010, to testify before the House Armed Services Committee hearing on cyberspace operations.

AP Photo

Analysis & Opinions - The Boston Globe

The Coming Cyber Wars

| July 31, 2011

"The so-called Stuxnet cyber weapon, which attacked and destroyed nuclear centrifuges in Iran, escaped into cyberspace. This sophisticated cyber weapon was then captured by many computer experts around the world and is now freely available for anyone to download. It raises the specter of whether non-state actors will soon be able to engage in cyber war."

Analysis & Opinions - The Washington Post

When the Car Bomb Goes Off

| May 9, 2010

"Imagine if, after a fatal attack, President Obama responded by proposing greater outreach to Muslim communities domestically and around the world, in an effort to undercut radicalization. That is precisely what we and other nations should be doing, but it would undoubtedly be decried as a weak, starry-eyed reaction by our commander in chief, especially after an attack that revealed deficiencies in our counterterrorism system."

Richard Clarke, formerly the White House's senior cybersecurity adviser, speaks at the unveils the administration cyberspace security policy in Stanford, Calif., Wednesday, Sept. 18, 2002.

AP Photo

Analysis & Opinions - The National Interest

War From Cyberspace

| Oct. 27, 2009

The United States thinks that its cyber warriors are the best at offense, with the capability of shutting down enemy air defenses, electric-power grids, rail systems and telephony. Such offensive prowess does nothing to defend our own networks from similar attacks, however, and the current U.S. defense systems protect only parts of the federal government, and not civilian or private-sector infrastructure. No nation is as dependent on cyber systems and networks for the operation of its infrastructure, economy and military as the United States. Yet, few national governments have less control over what goes on in its cyberspace than Washington.