CYBERCOM to Go Operational This Month

CYBERCOM to Go Operational This Month
Published on 10-15-2010 Email To Friend Print Version
Share |http://www.blacklistednews.com/index.php?news_id=11043

Source: Global Intelligence Report

The new US Cyber Command (CYBERCOM) is reportedly ready to go fully operational this month, in coordination with NATO, to create a global cyber warfare system that will involve all major branches of the US armed forces, according to ISAIntel. In September, the Defense Department dismantled its Joint Task Force Global Network Operations command, which is now part of CYBERCOM, which is being sponsored by US Strategic Command (STRATCOM). CYBERCOM has a “dual mission to conduct offensive and defensive cyber operations,” according to the Pentagon. In May, four-star General Keith Alexander was appointed as CYBERCOM’s first commander. The center will be staffed by around 1,100 personnel to "ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries". In related news, on 7 October Hun Technology Inc. announced the launch of “C2”, a new weapon reportedly designed for CYBERCOM. “Through [C2] we will be able to offer a permanent solution and nuke the problems related to cyber-attacks once and for all," media quoted Ferenc Ledniczky, co-founder and President of the company, as saying. C2 claims to be a technological breakthrough that changes the inherently hackable design of software architecture. Quoted by US media, Ledniczky said: “In developing [C2], we broke away from the traditional approach to computerize the enterprise information management process. Instead we developed an entirely new system which will be un-hackable by virtue of design and without relying on encryption or other protective measures.”

Analytical Note: Apparent CIA malware infecting the operating system of a trans-Siberian gas pipeline led to a massive explosion in the Soviet Union in 1982. Jumping ahead to 2007, Estonia’s national infrastructure came under cyber attacks, shutting down government institutions, banks and media after servers were overloaded. This happened during a political dispute with Russia. In 2008, Georgia experienced a similar cyber attack during a short war with Russia over the separatist region of South Ossetia. In August, the Pentagon revealed information about a cyber attack against the US military’s Central Command in 2008. According to the Pentagon’s account, USB memory sticks were randomly placed in a washroom at a US military base in the Middle East providing support for the war in Iraq. The memory sticks, infected with a computer worm by an undisclosed foreign intelligence agency, were picked up by soldiers who ignored protocol and plugged them into military laptops. The worm took 14 months to kill. In a very similar attack earlier this year, Iran experienced a computer worm (the Stuxnet virus) that infected around 30,000 IP addresses, as well as the computers at the Bushehr nuclear plant. The malware, according to international experts, was custom-made to target and manipulate industrial automation software from remote locations. This worm was also apparently spread by a USB memory stick. Some specialists have referred to the malware as an espionage worm, or a malware sleeper cell, because of its ability to immediately infect but remain latent until activated at a later date. It is not impossible that the malware was a US or Israeli (the latter perhaps more probable) cyberwar offensive. Although US President Barack Obama has said that the administration would not monitor private sector networks or internet traffic in the name of cyber security, this clearly cannot be the case with the launch of CYBERCOM, which was undertaken without public debate largely because of the public’s inability to grasp the issue.

.

Views: 57

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Tori Kovach posted a discussion

Pumpkin Face

Is he dead yet?See More
8 hours ago
cheeki kea posted a blog post
14 hours ago
cheeki kea commented on Sandy's photo
Thumbnail

FB_IMG_1770501160448

"Thumbs up find. So what ever do we have here then? Revolving doors of corruption and deceit that…"
16 hours ago
cheeki kea left a comment for Роман
"Greetings and well wishes to you POMaH, great that you've joined us all here at the site. May…"
16 hours ago
Sandy posted photos
21 hours ago
Doc Vega posted a blog post

Something is Making Fishermen Disappear It’s not Alligators or Sharks

 The setting is a section of the Ohio River where many locals enjoy fishing, swimming, and boating.…See More
yesterday
Роман is now a member of 12160 Social Network
yesterday
Doc Vega posted a blog post

Always Wondering

The face of reality pressed against your window paneIs it engineered or is it real rain?So, you…See More
Friday
tjdavis favorited Burbia's video
Friday
tjdavis posted a photo
Friday
cheeki kea commented on cheeki kea's photo
Thursday
cheeki kea posted a photo
Thursday
rlionhearted_3 posted a photo
Thursday
Sandy posted photos
Thursday
james will posted a blog post

how to doanload mp3 online?

An MP3 downloader is a useful online tool that allows users to convert and download their favorite…See More
Wednesday
Doc Vega commented on rlionhearted_3's photo
Thumbnail

Another incredibly Stupid!! What, no mirrors?

"Personally , I go for the more classic forms of cosmetic surgery! "
Tuesday
Doc Vega posted blog posts
Tuesday
Less Prone favorited tjdavis's video
Tuesday
Less Prone commented on rlionhearted_3's photo
Thumbnail

Another incredibly Stupid!! What, no mirrors?

"When the problem is inside, it causes transformations like this. I like the original better. Maybe…"
Tuesday
Less Prone favorited james will's blog post YouTube Downloader Tools You Never Knew Existed
Tuesday

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted