Tuesday, 9 April 2013

Israel vs Ananonamous; The cyber-war begins, Israeli hackers hit back Israeli ‘strike force’ responds with pro-Israel content








                       Israel vs Anonymous


Anonymous emblem (photo credit: Wikimedia Commons)
credit Anonymous emblem (photo credit: Wikimedia Commons)


Israel vs Anonymous The cyber-war begins, Israeli hackers hit back Israeli ‘strike force’ responds with pro-Israel content.

The Anonymous and other International hackers stepped up attempts to pull down Israeli sites over the weekend, with numerous attempted denial of service (DDoS) attacks against Israeli government sites.

Hacker sites listed numerous websites they claimed to have disabled, and several sites reported slowdowns on Saturday night, but nearly all the sites the hackers claimed to have taken down were operating normally.
But the cyber wars between Israeli and pro-Palestinian hackers heated up April 27th with government websites and stock market networks coming under fire in the most recent volley of online attacks.Several members of the group if they are part of the anonymous have said that the assault was being done in “solidarity” with Palestinians.
The Hackers, posting under the name of the international Anonymous group , announced that they would launch a massive attack on Israeli sites in a strike they called “#OpIsrael”.

Israeli hackers, under the name Israeli Elite Strike Force (@IsraeliElite) has declared WAR - a cyberwar against Anonymous' anti-Israel hack campaign, #OpIsrael. This is In response to Anonymous' escalation of attacks on April 7, Israeli Elite disabled dozens of sites within Pakistan, Iran, Syria and several north African states.

Despite reports of successful hacking, Israeli government officials appeared to be underwhelmed by the results of #OpIsrael's escalation. 



Yitzhak Ben Yisrael of Israel's National Cyber Bureau stated in an interview with the Associated Press (AP): 

"So far it is as was expected, there is hardly any real damage," Ben Yisrael said. "Anonymous doesn't have the skills to damage the country's vital infrastructure. And if that was its intention, then it wouldn't have announced the attack ahead of time. It wants to create noise in the media about issues that are close to its heart," he said.


Dr. Yitzchak Ben-Yisrael of the National Cyber Directorate at a recent conference (photo credit: Courtesy Yuval Ne'eman Workshop for Science, Technology, and Security of Tel Aviv University)
Dr. Yitzchak Ben-Yisrael of the National Cyber Directorate at a recent conference (photo credit: Courtesy Yuval Ne'eman Workshop for Science, Technology, and Security of Tel Aviv University)






(11h37) : Hackers failing to cause major cyber-disruption, officials say -
Some government websites taken down temporarily, but most efforts by Anonymous to erase
Israel from the Internet repelled. :). Tous nos sites israéliens favoris fonctionnent à merveille
malgré les menaces de mega-attaques proférées par les hackers... Ce fiasco va ridiculiser ces
anti-israéliens et les rendre fous de rage...






EVENTS April 7th 2013

Israeli Elite ‏@IsraeliElite
7 Apr
TANGO DOWN http://www.sana.sy . Another Hit by our very own amenefus! BOW DOWN ENEMIES! @ynet @nana10 @maarivnrg #OpIsrael
Expand


Israeli Elite ‏@IsraeliElite

7 Apr
TANGO DOWN http://indogenerations.com . This is one of hacker team trying to hit israel. Thank all our guys on efnet! @nana10 @ynet @maarivnrg
Expand

Israeli Elite ‏@IsraeliElite

7 Apr
Iranian leaked email accounts courtesy of our very own Md5c http://pastebin.com/ey4Qj0qs  BOW DOWN! @nana10 @ynet @maarivnrg #opIsrael
Expand

Israeli Elite ‏@IsraeliElite

7 Apr
Hello friends. @amenefus says, http://reefnet.gov.sy  TANGO DOWN. Long Live Israel! BOW DOWN! @ynet @nana10 @maarignrg #OpIsrael
Expand

Israeli Elite ‏@IsraeliElite

7 Apr
Turkey is getting some, too! http://pastebin.com/QUBNW9S3  More leaks from our friend 6a9$on. BOW DOWN! @nana10 @ynet @maarivnrg #OpIsrael
Expand

Israeli Elite ‏@IsraeliElite

7 Apr
Pakistani bank accounts TAKEN!!!! http://pastebin.com/dWGFp9T0  Have fun and thank our member 6a9$on. BOW DOWN! @ynet @nana10 @maarivnrg #OpIsrael
Expand

Israeli Elite ‏@IsraeliElite

7 Apr
SyrianGov NameServer DOWN! http://ns1.scs-net.org  affected syriaonline.sy, http://www.syreen.gov.sy  and more! @ynet @maarivnrg @nana10
Expand

 
Israeli Elite ‏@IsraeliElite7 Apr
Hizbollah website DOWN!  http://www.moqawama.org  Kudos to the new iEF recruits. Attack brought to you by amenefus @ynet @nana10 @maarivnrg
Expand






                     http://samuelezerzercyberspacethenewfrontier.blogspot.ca/2013_03_01_archive.html










Anonymous
A graffiti of Guy Fawkes mask, symbol of Anonymous, is pictured on April 6, 2013 in Florence. (Gabriel Bouys / AFP)




Results for #OpIsrael

Top news

Hacktivists to Israel: 'Be ready for new larger surprises’

Hacktivists to Israel: 'Be ready for new larger surprises’

More than 100,000 Israeli websites have come under attack from Anonymous hacktivists around the world.

Tweets 

Thursday, 28 March 2013

Cyber Threat at Top of Transnational Threat List; James R. Clapper, the director of national intelligence,




Clapper Places Cyber at Top of Transnational Threat List




By Jim Garamone
American Forces Press Service
WASHINGTON, March 12, 2013 

Ten years ago, the idea that cyber posed a leading threat against the United States would be laughed at. But no one is laughing any more. James R. Clapper, the director of national intelligence, testified before the Senate Select Committee on Intelligence today, and cyber led off his presentation of transnational threats.
Threats are more diverse, interconnected and viral than at any time in American history, the director said.



“Attacks, which might involve cyber and financial weapons, can be deniable and unattributable,” he said in his prepared testimony. “Destruction can be invisible, latent and progressive.”

In such a world, the role of intelligence grows, and finding ways to increase the efficiency of the intelligence community becomes paramount, Clapper said. “In this threat environment, the importance and urgency of intelligence integration cannot be overstated,” he added. “Our progress cannot stop. The intelligence community must continue to promote collaboration among experts in every field, from the political and social sciences to natural sciences, medicine, military issues and space.”



Clapper explained that cyber threats are broken into two terms: cyberattacks and cyberespionage. Cyberattacks aim at creating physical effects or to manipulate, disrupt or delete data. “It might range from a denial-of-service operation that temporarily prevents access to a website to an attack on a power turbine that causes physical damage and an outage lasting for days,” he said. Cyber espionage refers to stealing data from a variety of sources.
The threat is growing, Clapper said, but is not here just yet. “We judge that there is a remote chance of a major cyberattack against U.S. critical infrastructure systems during the next two years that would result in long-term, wide-scale disruption of services, such as a regional power outage,” Clapper said.




State actors with the skills to do this, such as Russia and China, are unlikely to launch such an attack, he said, and other states or organizations do not have these skills.
“However, isolated state or nonstate actors might deploy less sophisticated cyberattacks as a form of retaliation or provocation,” he added. “These less advanced but highly motivated actors could access some poorly protected U.S. networks that control core functions, such as power generation, during the next two years, although their ability to leverage that access to cause high-impact, systemic disruptions will probably be limited.”
A number of attacks already have taken place, including numerous denial-of-service attacks against U.S. banks. In August, someone attacked the Saudi oil company Aramco, rendering 30,000 computers unusable.

Belgium NATO Afghanis Balt Cyber attacks, new frontier for Iran   U.S. relations?
United States Secretary of Defense Leon Panetta during a media conference after a meeting of NATO Defense Ministers Wednesday, Oct. 10, 2012. A former U.S. government official says American authorities firmly believe that Iranian hackers, likely supported by the Tehran government, were responsible for recent cyber attacks against oil and gas companies.  (AP Photo/Virginia Mayo)

A more insidious cyber threat comes from foreign intelligence and security services that have penetrated numerous computer networks of U.S. government, business, academic and private-sector entities, Clapper said. “Most detected activity has targeted unclassified networks connected to the Internet, but foreign cyber actors are also targeting classified networks,” he said. “Importantly, much of the nation’s critical proprietary data are on sensitive, but unclassified, networks -- and the same is true for most of our closest allies.”
Cyber thieves and spies are targeting and collecting sensitive U.S. national security and economic data, almost certainly allowing adversaries to close the military technological gap, Clapper said.
“It is very difficult to quantify the value of proprietary technologies and sensitive business information and, therefore, the impact of economic cyber espionage activities,” he acknowledged. “However, we assess that economic cyber espionage will probably allow the actors who take this information to reap unfair gains in some industries.”

U.S, intelligence agencies track cyber developments among terrorist groups, activist hackers and cyber criminals, the intelligence director said. “We have seen indications that some terrorist organizations have heightened interest in developing offensive cyber capabilities,” he added, “but they will probably be constrained by inherent resource and organizational limitations and competing priorities.”

Activist hackers -- known as “hacktivists,” -- target a wide range of companies and organizations in denial-of-service attacks, but intelligence professionals have not observed a significant change in their capabilities or intentions during the last year, Clapper said.
“Most hacktivists use short-term denial-of-service operations or expose personally identifiable information held by target companies, as forms of political protest,” he said, adding that this could change.
Cyber criminals also threaten U.S. economic interests. “They are selling tools, via a growing black market, that might enable access to critical infrastructure systems or get into the hands of state and non-state actors,” the director said. Some companies abet these groups, he told the panel, selling computer intrusion kits to all comers.

Biographies:
James R. Clapper
http://www.defense.gov/news/newsarticle.aspx?id=119500
_________________________________




History of Cyber Wars 
http://samuelezerzercyberspacethenewfrontier.blogspot.ca/2013/03/history-of-cyber-terrorism-its-global.html

Internet Scam Alert and Phishing Alert From Cyber Center Department of Defense And DoD Cyber Crime Center





Alert From Cyber  Center Department of Defense And DoD Cyber Crime Center
The Department of Defense Cyber Crime Center (DC3) sets standards for digital evidence processing, analysis, and diagnostics for any DoD investigation that requires computer forensic support to detect, enhance, or recover digital media, including audio and video. 





The center assists in criminal, counterintelligence, counterterrorism, and fraud investigations of the Defense Criminal Investigative Organizations (DCIOs) and DoD counterintelligence activities. It also supports safety investigations and Inspector General and commander-directed inquiries. DC3 aids in meeting intelligence community document exploitation objectives from a criminal law enforcement forensics and counterintelligence perspective. 




DC3 provides computer investigation training to forensic examiners, investigators, system administrators, and any other DoD members who must ensure Defense information systems are secure from unauthorized use, criminal and fraudulent activities, and foreign intelligence service exploitation. DC3 remains on the leading edge of computer technologies and techniques through research, development, testing, and evaluation applied to digital evidence processing and computer forensic analysis; and by partnering with governmental, academic, and private industry computer security officials.


Internet Scam Alert and Phishing Alert From Department of Defense


Internet Scam Alert

The Defense Department is aware of an internet scam that improperly uses official DoD seals, to include those of U.S. Cyber Command and the Defense Cyber Crime Center, to scam innocent persons into paying a 'fine' to unlock a personal device. DoD is in no way affiliated with this internet scam. If you are affected by this scam, please visit the FBI to learn more or file a complaint: http://www.fbi.gov/scams-safety/e-scams

Spear Phishing Alert

DC3 advises caution in responding to any email describing a promotional offer indicating the recipient has been selected to receive a $1,000 Visa gift card from either the "United States Air Force" or the "Defense Cyber Crimes Center." The body of the email attempts to lure the recipient to a malicious website to claim a Visa gift card.

Sunday, 24 March 2013

Cyber Threat at Top of Transnational Threat List; James R. Clapper, the director of national intelligence,






Clapper Places Cyber at Top of Transnational Threat List




By Jim Garamone
American Forces Press Service
WASHINGTON, March 12, 2013 







Ten years ago, the idea that cyber posed a leading threat against the United States would be laughed at. But no one is laughing any more. James R. Clapper, the director of national intelligence, testified before the Senate Select Committee on Intelligence today, and cyber led off his presentation of transnational threats.
Threats are more diverse, interconnected and viral than at any time in American history, the director said.

“Attacks, which might involve cyber and financial weapons, can be deniable and unattributable,” he said in his prepared testimony. “Destruction can be invisible, latent and progressive.”

In such a world, the role of intelligence grows, and finding ways to increase the efficiency of the intelligence community becomes paramount, Clapper said. “In this threat environment, the importance and urgency of intelligence integration cannot be overstated,” he added. “Our progress cannot stop. The intelligence community must continue to promote collaboration among experts in every field, from the political and social sciences to natural sciences, medicine, military issues and space.”



Clapper explained that cyber threats are broken into two terms: cyberattacks and cyberespionage. Cyberattacks aim at creating physical effects or to manipulate, disrupt or delete data. “It might range from a denial-of-service operation that temporarily prevents access to a website to an attack on a power turbine that causes physical damage and an outage lasting for days,” he said. Cyber espionage refers to stealing data from a variety of sources.
The threat is growing, Clapper said, but is not here just yet. “We judge that there is a remote chance of a major cyberattack against U.S. critical infrastructure systems during the next two years that would result in long-term, wide-scale disruption of services, such as a regional power outage,” Clapper said.




State actors with the skills to do this, such as Russia and China, are unlikely to launch such an attack, he said, and other states or organizations do not have these skills.
“However, isolated state or nonstate actors might deploy less sophisticated cyberattacks as a form of retaliation or provocation,” he added. “These less advanced but highly motivated actors could access some poorly protected U.S. networks that control core functions, such as power generation, during the next two years, although their ability to leverage that access to cause high-impact, systemic disruptions will probably be limited.”
A number of attacks already have taken place, including numerous denial-of-service attacks against U.S. banks. In August, someone attacked the Saudi oil company Aramco, rendering 30,000 computers unusable.

Belgium NATO Afghanis Balt Cyber attacks, new frontier for Iran   U.S. relations?
United States Secretary of Defense Leon Panetta during a media conference after a meeting of NATO Defense Ministers Wednesday, Oct. 10, 2012. A former U.S. government official says American authorities firmly believe that Iranian hackers, likely supported by the Tehran government, were responsible for recent cyber attacks against oil and gas companies.  (AP Photo/Virginia Mayo)

A more insidious cyber threat comes from foreign intelligence and security services that have penetrated numerous computer networks of U.S. government, business, academic and private-sector entities, Clapper said. “Most detected activity has targeted unclassified networks connected to the Internet, but foreign cyber actors are also targeting classified networks,” he said. “Importantly, much of the nation’s critical proprietary data are on sensitive, but unclassified, networks -- and the same is true for most of our closest allies.”
Cyber thieves and spies are targeting and collecting sensitive U.S. national security and economic data, almost certainly allowing adversaries to close the military technological gap, Clapper said.
“It is very difficult to quantify the value of proprietary technologies and sensitive business information and, therefore, the impact of economic cyber espionage activities,” he acknowledged. “However, we assess that economic cyber espionage will probably allow the actors who take this information to reap unfair gains in some industries.”

U.S, intelligence agencies track cyber developments among terrorist groups, activist hackers and cyber criminals, the intelligence director said. “We have seen indications that some terrorist organizations have heightened interest in developing offensive cyber capabilities,” he added, “but they will probably be constrained by inherent resource and organizational limitations and competing priorities.”

Activist hackers -- known as “hacktivists,” -- target a wide range of companies and organizations in denial-of-service attacks, but intelligence professionals have not observed a significant change in their capabilities or intentions during the last year, Clapper said.
“Most hacktivists use short-term denial-of-service operations or expose personally identifiable information held by target companies, as forms of political protest,” he said, adding that this could change.
Cyber criminals also threaten U.S. economic interests. “They are selling tools, via a growing black market, that might enable access to critical infrastructure systems or get into the hands of state and non-state actors,” the director said. Some companies abet these groups, he told the panel, selling computer intrusion kits to all comers.

Biographies:
James R. Clapper
http://www.defense.gov/news/newsarticle.aspx?id=119500
_________________________________




History of Cyber Wars 
http://samuelezerzercyberspacethenewfrontier.blogspot.ca/2013/03/history-of-cyber-terrorism-its-global.html


HISTORY OF CYBER-TERRORISM ;ITS A GLOBAL CYBER WAR OUT THERE



ITS A WAR PERIOD !







David Irvine,“cold cyberwar”
"Irvine, the director-general of ASIO, knows Australian business and the government are engaged in a new, and irreversible, “cold cyberwar”, which the Americans have designated as the fifth and most uncertain defence domain."




President Obama cyberattacks should proceed
“Should we shut this thing down?” Mr. Obama asked, according to members of the president’s national security team who were in the room.
President Said  it was unclear how much the Iranians knew about the code, and offered evidence that it was still causing havoc, Mr. Obama decided that the cyberattacks should proceed. In the following weeks, the Natanz plant was hit by a newer version of the computer worm, and then another after that. The last of that series of attacks, a few weeks after Stuxnet was detected around the world, temporarily took out nearly 1,000 of the 5,000 centrifuges Iran had spinning at the time to purify uranium.




Kaspersky Lab "Red October"
Employees of anti-virus program developer Kaspersky Lab work at their company's offices in Moscow on March 10, 2011. Kaspersky Lab said Monday it had identified a new computer virus it dubbed "Red October" targeting eastern European countries that appeared to be collecting classified files using NATO and EU encryption. Kaspersky Lab said Monday it had identified a new computer virus it dubbed "Red October" targeting eastern European countries that appeared to be collecting classified files using NATO and EU encryption.





Leon Panetta "cyber-Pearl Harbor" 
Former U.S. Defense Secretary Leon Panetta  sounded the alarm. Panetta asserts that critical civilian infrastructure is vulnerable to cyber-attack by foreign or non-state actors.
Panetta pushed the issue forcefully, invoking a "cyber-Pearl Harbor" to illuminate the threat. While name dropping China, Russia and Iran, Panetta is quoted as saying "They could derail passenger trains… They could contaminate the water supply in major cities, or shut down the power grid across large parts of the country."