eBomb.US - Unconventional Cyber-terrorism Cyberwarfare -- invisible means and invisible enemies
(parts of this domain are in a password protected directory)

eBomb.US

Visit or subscribe to my eBombUS.blogspot blog for some raw research material that's finding it's way into this tome...

Mike Baird mike [at} mikebaird d o t com


Cyber Terrorism or Cyberwarfare is the new paradigm for "weapons of mass destruction."

Enemy nations and terrorists are gearing up to attack the United States and other countries using electronic means, delivered over the Internet, to induce devastation, calamity and financial destruction at a level that may make 9/11 look insignificant in comparison.



As data breaches and hacking schemes accumulate, U.S. companies are bombarded with Armageddon scenarios.

Iran Confirms Attack by New Data Virus 29 May 2012 "...potentially more harmful than the 2010 Stuxnet virus, which destroyed several centrifuges used for Iran's nuclear enrichment program. In contrast to Stuxnet, the newly identified virus is designed not to do damage but to collect information secretly from a wide variety of sources."

Talk on China Cyber Army pulled after pressure

15 July 2010 Continuing evidence that cyber warfare is the new paradigm for weapons of mass destruction.

 

GAO slams White House for failing to lead on cybersecurity - Computerworld:

The U.S risks falling behind other countries on cybersecurity matters

Wed. 30 June 2010 - Another Summer Surprise—Cyber Attack? The Homeland Security committee approved a bill that would give the President the power over an internet kill switch, allowing Obama to power off the Web to stop a cyber attack... it would give the president "emergency authority to shut down private sector or government networks in the event of a cyber attack capable of causing massive damage or loss of life."

Thursday, May 6, 2010... stock exchanges "flash" crash... momentarily ... why?
1) For reasons stated (ha ha)
2) Goldman Sachs algorithms exploiting extra-network worldwide market inconsistencies (i.e., just a better trade session than the other market players got)
3) Military experiment for cyber-econo-warfare in preparation for suspending civilian government and taking control of USA

April 21, 2009  Military Command to Focus on Cybersecurity The White House plans to create a new military command to coordinate defense of Pentagon computers

April 08, 2009  Fake antivirus software, or worse, penetration by the black hats of a name brand antivirus product or other popular frequently downloaded or automatically updated utility, has the potential to control a large percentage of the world's PCs - resulting of possible total economic collapse worldwide or within selected countries.   Related reference.

April 07, 2009 Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials. "Intelligence officials worry about cyber attackers taking control of electrical facilities, a nuclear power plant or financial networks via the Internet."   US officials know of what they talk about, since US military and intelligence agencies have long been planning similar attacks on enemies of the US during times of war.

March 28, 2009 Vast Spy System Loots Computers in 103 Countries - The GhostNet Cyber Espionage Network electronic spying operation has infiltrated computers and has stolen documents from hundreds of government and private offices around the world, has infiltrated at least 1,295 computers in 103 countries, including many belonging to embassies, foreign ministries and other government offices, as well as the Dalai Lama’s Tibetan exile centers in India, Brussels, London and New York., and can even turn on the camera and audio-recording functions of an infected computer, enabling monitors to see and hear what goes on in a room.

March 18, 2009 Defense Firms Pursue Cyber-Security Work - now a multi-billion per year industry, protecting the US against cyber attacks is becoming a serious business.

Feb. 15, 2009 Do We Need a New Internet? The Conficker malicious software program remains a ticking time bomb. The Stanford Clean Slate project offers some hope of safety.

Jan. 23, 2009  Worm Infects Millions of Computers Worldwide - "One intriguing clue left by the malware authors is that the first version of the program checked to see if the computer had a Ukrainian keyboard layout. If it found it had such a keyboard, it would not infect the machine.."   This article is useful in that it clearly illustrates how it is entirely possible that almost every computer connected to the Internet could be taken command of by black hats.  The extent of possible economic damage caused by such successfully executed cyber terrorism could make 9-11 seem like child's play.  Likely one of the first such attacks will be launched by white hat USA or other Western military forces in a preemptive or retaliatory attack.

Dec. 19. 2008 - The U.S. is not ready for cyber attack. WASHINGTON (Reuters) -
The United States is unprepared for a major hostile attack against vital computer networks, government and industry officials said on Thursday after participating in a two-day "cyberwar" simulation.

Bush Order Expands Network Monitoring
"Agencies designed to gather intelligence on foreign entities should not be in charge of monitoring our computer systems here at home," said Rep. Bennie Thompson (D-Miss.), chairman of the House Homeland Security Committee. Lawmakers with oversight of homeland security and intelligence matters say they have pressed the administration for months for details.

Fighting without fighting.  The next major terrorist attack on the United States of America will likely consist of a major disabling and defacement of critical elements of the Internet which have become the most essential elements of modern society.  The Estonia 2007 story.   Cyber-warfare has resulted in several famous attacks which should expose this dangerous trend:  The United States has been attacked from China and Russia. See Titan Rain and Moonlight Maze.  On May 17, 2007, Estonia came under cyber attack from Russia. The Estonian parliament, ministries, banks, and media were targeted.  In September 2007, the Pentagon and various French, German and British government computers were attacked by hackers of Chinese origin. The Chinese government denies involvement.

19 Jan 2008: In a rare public warning to the power and utility industry, a CIA analyst this week said cyber attackers have hacked into the computer systems of utility companies outside the United States and made demands, in at least one case causing a power outage that affected multiple cities. http://www.washingtonpost.com/wp-dyn/content/article/2008/01/18/AR2008011803277.html?wpisrc=newsletter

Web crash 2007 coverage:  (satire today; reality tomorrow)

U.S. Reports Unconfirmed Cyber Threat
Friday, December 1, 2006; 1:53 AM  http://www.washingtonpost.com/wp-dyn/content/article/2006/11/30/AR2006113001115.html
U.S. Reports Unconfirmed Cyber Threat, The Associated Press.  WASHINGTON -- The government warned on Thursday of a possible Internet attack on U.S. stock market and banking Web sites from a radical Muslim group, but officials said the threat was unconfirmed and seemed to pose no immediate danger.

Live Free or Die Hard illustrates one possible form of this upcoming attack.
John McClane (Bruce Willis) is back and badder than ever, and this time he's up against a ring of Internet terrorists. Now working for Homeland Security, the decidedly low-tech McClane calls on the services of a young hacker (Justin Long) in his bid to stop a shadowy group intent on taking control of America's computer infrastructure. Fear not, the information age plot still boasts plenty of good old-fashioned gunfights, smashups and explosions.

go to password protected content
01/26/2008 05:15:29 PM  More related sites at http://baird.ws