Information Warfare – In Attack on Vatican Web Site, a Glimpse of Hackers’ Tactics

New York Times – The elusive hacker movement known as Anonymous has carried out Internet attacks on well-known organizations like Sony and PBS. In August, the group went after its most prominent target yet: the Vatican. A nice look at how they do it…

Information Warfare – Hackers 'hit' US water treatment systems

BBC – Hackers are alleged to have destroyed a pump used to pipe water to thousands of homes in a US city in Illinois.

Information Warfare – From Russia With Jam

Defense Technology International – Moscow-based Aviaconversiya Ltd., makes and sells GPS jammers…to anyone who wants to buy them, no questions asked.

Information Warfare – Electromagnetic weapons: Frying tonight

Economist – Warfare is changing as weapons that destroy electronics, not people, are deployed on the field of battle.

Information Warfare – Malware myopia

Los Angeles Times – Mark Bowden writes that as modern society leans more heavily on the Internet, its fragility becomes an ever greater concern.

Information Warfare – A Declaration of Cyber-War

Vanity Fair – Last summer, the world’s top software-security experts were panicked by the discovery of a drone-like computer virus, radically different from and far more sophisticated than any they’d seen. The race was on to figure out its payload, its purpose, and who was behind it. As the world now knows, the Stuxnet worm appears to have attacked Iran’s nuclear program. And, as Michael Joseph Gross reports, while its source remains something of a mystery, Stuxnet is the new face of 21st-century warfare: invisible, anonymous, and devastating.

Information Warfare – Israel Tests on Worm Called Crucial in Iran Nuclear Delay

New York Times – The Dimona complex in the Negev desert is famous as the heavily guarded heart of Israel’s never-acknowledged nuclear arms program, where neat rows of factories make atomic fuel for the arsenal. Over the past two years, according to intelligence and military experts familiar with its operations, Dimona has taken on a new, equally secret role — as a critical testing ground in a joint American and Israeli effort to undermine Iran’s efforts to make a bomb of its own. Behind Dimona’s barbed wire, the experts say, Israel has spun nuclear centrifuges virtually identical to Iran’s at Natanz, where Iranian scientists are struggling to enrich uranium. They say Dimona tested the effectiveness of the Stuxnet computer worm, a destructive program that appears to have wiped out roughly a fifth of Iran’s nuclear centrifuges and helped delay, though not destroy, Tehran’s ability to make its first nuclear arms.

Information Warfare – The Toppling

The New Yorker – Peter Maas describes how the media inflated a minor moment in a long war.

Information Warfare – War in the fifth domain

The EconomistWar in the fifth domain

Are the mouse and keyboard the new weapons of conflict?

Information Warfare – The Enemy Within

The AtlanticThe Enemy Within

Mark Bowden writes that when the Conficker computer “worm” was unleashed on the world in November 2008, cyber-security experts didn’t know what to make of it. It infiltrated millions of computers around the globe. It constantly checks in with its unknown creators. It uses an encryption code so sophisticated that only a very few people could have deployed it. For the first time ever, the cyber-security elites of the world have joined forces in a high-tech game of cops and robbers, trying to find Conficker’s creators and defeat them. The cops are failing. And now the worm lies there, waiting …

Information Warfare – Cyber Warriors

The AtlanticCyber Warriors

When will China emerge as a military threat to the U.S.? In most respects the answer is: not anytime soon—China doesn’t even contemplate a time it might challenge America directly. But one significant threat already exists: cyberwar. Attacks—not just from China but from Russia and elsewhere—on America’s electronic networks cost millions of dollars and could in the extreme cause the collapse of financial life, the halt of most manufacturing systems, and the evaporation of all the data and knowledge stored on the Internet.

Information Warfare – In Digital Combat, U.S. Finds No Easy Deterrent

New York TimesIn Digital Combat, U.S. Finds No Easy Deterrent

On a Monday morning earlier this month, top Pentagon leaders gathered to simulate how they would respond to a sophisticated cyberattack aimed at paralyzing the nation’s power grids, its communications systems or its financial networks. The results were dispiriting. The enemy had all the advantages: stealth, anonymity and unpredictability. No one could pinpoint the country from which the attack came, so there was no effective way to deter further damage by threatening retaliation. What’s more, the military commanders noted that they even lacked the legal authority to respond — especially because it was never clear if the attack was an act of vandalism, an attempt at commercial theft or a state-sponsored effort to cripple the United States, perhaps as a prelude to a conventional war.

Information Warfare – Why I Love Al Jazeera

The AtlanticWhy I Love Al Jazeera

Robert D. Kaplan writes that the Arab TV channel is visually stunning, exudes hustle, and covers the globe like no one else. Just beware of its insidious despotism.

Information Warfare – Insurgents Hack U.S. Drones

Wall Street JournalInsurgents Hack U.S. Drones

Militants in Iraq have used $26 off-the-shelf software to intercept live video feeds from U.S. Predator drones, potentially providing them with information they need to evade or monitor U.S. military operations.

Wall Street JournalOfficers Warned of Flaw in U.S. Drones in 2004

Information Warfare – Click, click … counting down to Cyber 9/11

San Francisco ChronicleClick, click … counting down to Cyber 9/11

John Arquilla writes that when it comes to national security, our leaders are overly focused on nuclear weapons of mass destruction; more thought should be given to the looming threat of cyber “mass disruption.”

Information Warfare – Halted ’03 Iraq Plan Illustrates U.S. Fear of Cyberwar Risk

New York TimesHalted ’03 Iraq Plan Illustrates U.S. Fear of Cyberwar Risk

It would have been the most far-reaching case of computer sabotage in history. In 2003, the Pentagon and American intelligence agencies made plans for a cyberattack to freeze billions of dollars in the bank accounts of Saddam Hussein and cripple his government’s financial system before the United States invaded Iraq. He would have no money for war supplies. No money to pay troops. “We knew we could pull it off – we had the tools,” said one senior official who worked at the Pentagon when the highly classified plan was developed. But the attack never got the green light. Bush administration officials worried that the effects would not be limited to Iraq but would instead create worldwide financial havoc, spreading across the Middle East to Europe and perhaps to the United States.

Information Warfare – The Navy Can Handle the Truth: Creative Friction without Conflict

US Naval Institute ProceedingsThe Navy Can Handle the Truth: Creative Friction without Conflict

The hit PBS documentary Carrier gave Americans an up-close look at today’s Sailors. Navy-centric blogs offer another way to reach the public.

Information Warfare – Contractors Vie for Plum Work, Hacking for U.S.

New York TimesContractors Vie for Plum Work, Hacking for U.S.

The government’s urgent push into cyberwarfare has set off a rush among the biggest military companies for billions of dollars in new defense contracts. The exotic nature of the work, coupled with the deep recession, is enabling the companies to attract top young talent that once would have gone to Silicon Valley. And the race to develop weapons that defend against, or initiate, computer attacks has given rise to thousands of “hacker soldiers” within the Pentagon who can blend the new capabilities into the nation’s war planning.

Information Warfare – Pentagon Plans New Arm to Wage Cyberspace Wars

New York TimesPentagon Plans New Arm to Wage Cyberspace Wars

The Pentagon plans to create a new military command for cyberspace, administration officials said Thursday, stepping up preparations by the armed forces to conduct both offensive and defensive computer warfare.

Information Warfare – Blinders

Defense and the National InterestBlinders

William Lind describes the importance of open source intelligence asks why is the Pentagon censoring the US military’s access to it?

Information Warfare – U.S. Steps Up Effort on Digital Defenses

New York TimesU.S. Steps Up Effort on Digital Defenses

Computers, indispensable in peace, are becoming ever more important in political conflicts and open warfare. This is the first article in a series on the growing use of computing power as a weapon.

Information Warfare – Electricity Grid in U.S. Penetrated By Spies

Wall Street JournalElectricity Grid in U.S. Penetrated By Spies

Cyberspies have penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system, according to current and former national-security officials. The spies came from China, Russia and other countries, these officials said, and were believed to be on a mission to navigate the U.S. electrical system and its controls. The intruders haven’t sought to damage the power grid or other key infrastructure, but officials warned they could try during a crisis or war.

Information Warfare – Marching off to cyberwar

The EconomistMarching off to cyberwar

Attacks launched over the internet on Estonia and Georgia highlight the difficulty of defining and dealing with “cyberwar”

Information Warfare – Internet Traffic Begins to Bypass the U.S.

New York Times – The era of the American Internet is ending.

Invented by American computer scientists during the 1970s, the Internet has been embraced around the globe. During the networkís first three decades, most Internet traffic flowed through the United States. In many cases, data sent between two locations within a given country also passed through the United States.

Engineers who help run the Internet said that it would have been impossible for the United States to maintain its hegemony over the long run because of the very nature of the Internet; it has no central point of control.

And now, the balance of power is shifting. Data is increasingly flowing around the United States, which may have intelligence ó and conceivably military ó consequences.
more…