February 2010

New israeli drones role in iran attack

Working from high altitudes, the Eitan will likely be used to provide prestrike information on targets, to eavesdrop on electronic communications and to send battle damage assessments back after an attack.

 

It will also undoubtably be used to monitor any retaliation for the airstrike—seeking rocket launches and eavesdropping on Iran.

The onboard power required to electronically jam radar and communications equipment is not in the Eitan, Israeli defense industry officials told the trade journal Defense News. But the ability to carry so much weight opens up questions about the drones' ability to conduct long-range, high-risk bombing missions on their own.

Tags: 

Senate Bill Allows Obama to Declare “Cybersecurity Emergency”

 Cybersecurity bill to give president new emergency powers

By Tony Romm 02/26/10 02:30 PM ET

The president would have the power to safeguard essential federal and private Web resources under draft Senate cybersecurity legislation.

According to an aide familiar with the proposal, the bill includes a mandate for federal agencies to prepare emergency response plans in the event of a massive, nationwide cyberattack.

The president would then have the ability to initiate those network contingency plans to ensure key federal or private services did not go offline during a cyberattack of unprecedented scope, the aide said. 

Ultimately, the legislation is chiefly the brainchild of Sens. Jay Rockefeller (D-W.Va.) and Olympia Snowe (R-Maine), the chairman and ranking member of the Senate Commerce Committee, respectively. Both lawmakers have long clamored for a federal cybersecurity bill, charging that current measures — including the legislation passed by the House last year — are too piecemeal to protect the country's Web infrastructure.

 

American army networking online

US troops are to be allowed to use social networking websites such as Twitter and Facebook following a review of internet use and security.

 

"Defence department officials say the benefits of using social media now outweigh the risks to security.."

 

US Defence Secretary Robert Gates has said that social networking can help the Pentagon interact with US military employees, many of whom are in their early 20s and regular users of online services.

 

FBI goes social networking on Youtube, twitter and facebook

 Over the past few years we’ve rolled out a number of new web initiatives—including an e-mail alert service, syndicated news feeds, and a series of podcasts and widgets—that make it easier for you to help us track down wanted fugitives and missing kids, to submit tips on terrorism and crime, and to get our latest news and information. 

Today, we’re announcing the launch of our latest suite of tools. We’ve recently set up shop in several social media websites, including:

 

Two arrests in Mytob and Zotob computer investigation

 Washington, D.C. - Working with law enforcement authorities in Morocco and Turkey, the FBI today announced the arrests of two individuals believed to be responsible for the creation and distribution of the "Mytob" and "Zotob" computer worms that were unleashed less than two weeks ago and disrupted services on computer networks of a variety of companies including major U.S. news organizations.

Contact us

Cyber warzone - Cybercrime revealed

 

Phishing & CCF Credit card fraud

The act of sending an e-mail :mail: to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.

Cyber Stalking

Cyber Stalking can be defined as the repeated acts harassment or threatening behavior of the cyber criminal towards the victim by using internet services. Stalking in General terms can be referred to as the repeated acts of harassment targeting the victim such as following the victim, making harassing phone calls, killing the victims pet, vandalizing victims property, leaving written messages or objects.

Stalking may be followed by serious violent acts such as physical harm to the victim and the same has to be treated and viewed seriously. It all depends on the course of conduct of the stalker.

Child Pornography

The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. The internet is very fast becoming a household commodity in the world. Its explosion has made the children a viable victim to the cyber crime. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles.

The easy access to the pornographic contents readily and freely available over the internet lower the inhibitions of the children. Pedophiles lure the children by distributing pornographic material, then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions.

Broad New Cyber Attack Detected

Hackers in Europe and China successfully broke into computers at nearly 2,500 companies and government agencies over the last 18 months in a coordinated global attack that exposed vast amounts of personal and corporate secrets to theft, according to a computer-security company that discovered the breach. A global hacking offensive has broken into U.S. companies and government agencies. Cyber attacks could soon be seen as a national security threat, WSJ executive editor Jerry Seib tells the News Hub. The damage from the latest cyberattack is still being assessed, and affected companies are still being notified. But data compiled by NetWitness, the closely held firm that discovered the breaches, showed that hackers gained access to a wide array of data at 2,411 companies, from credit-card transactions to intellectual property.

Pages