CYBERCOM to Go Operational This Month

CYBERCOM to Go Operational This Month
Published on 10-15-2010 Email To Friend Print Version
Share |http://www.blacklistednews.com/index.php?news_id=11043

Source: Global Intelligence Report

The new US Cyber Command (CYBERCOM) is reportedly ready to go fully operational this month, in coordination with NATO, to create a global cyber warfare system that will involve all major branches of the US armed forces, according to ISAIntel. In September, the Defense Department dismantled its Joint Task Force Global Network Operations command, which is now part of CYBERCOM, which is being sponsored by US Strategic Command (STRATCOM). CYBERCOM has a “dual mission to conduct offensive and defensive cyber operations,” according to the Pentagon. In May, four-star General Keith Alexander was appointed as CYBERCOM’s first commander. The center will be staffed by around 1,100 personnel to "ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries". In related news, on 7 October Hun Technology Inc. announced the launch of “C2”, a new weapon reportedly designed for CYBERCOM. “Through [C2] we will be able to offer a permanent solution and nuke the problems related to cyber-attacks once and for all," media quoted Ferenc Ledniczky, co-founder and President of the company, as saying. C2 claims to be a technological breakthrough that changes the inherently hackable design of software architecture. Quoted by US media, Ledniczky said: “In developing [C2], we broke away from the traditional approach to computerize the enterprise information management process. Instead we developed an entirely new system which will be un-hackable by virtue of design and without relying on encryption or other protective measures.”

Analytical Note: Apparent CIA malware infecting the operating system of a trans-Siberian gas pipeline led to a massive explosion in the Soviet Union in 1982. Jumping ahead to 2007, Estonia’s national infrastructure came under cyber attacks, shutting down government institutions, banks and media after servers were overloaded. This happened during a political dispute with Russia. In 2008, Georgia experienced a similar cyber attack during a short war with Russia over the separatist region of South Ossetia. In August, the Pentagon revealed information about a cyber attack against the US military’s Central Command in 2008. According to the Pentagon’s account, USB memory sticks were randomly placed in a washroom at a US military base in the Middle East providing support for the war in Iraq. The memory sticks, infected with a computer worm by an undisclosed foreign intelligence agency, were picked up by soldiers who ignored protocol and plugged them into military laptops. The worm took 14 months to kill. In a very similar attack earlier this year, Iran experienced a computer worm (the Stuxnet virus) that infected around 30,000 IP addresses, as well as the computers at the Bushehr nuclear plant. The malware, according to international experts, was custom-made to target and manipulate industrial automation software from remote locations. This worm was also apparently spread by a USB memory stick. Some specialists have referred to the malware as an espionage worm, or a malware sleeper cell, because of its ability to immediately infect but remain latent until activated at a later date. It is not impossible that the malware was a US or Israeli (the latter perhaps more probable) cyberwar offensive. Although US President Barack Obama has said that the administration would not monitor private sector networks or internet traffic in the name of cyber security, this clearly cannot be the case with the launch of CYBERCOM, which was undertaken without public debate largely because of the public’s inability to grasp the issue.

.

Views: 57

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted blog posts
5 hours ago
Sandy posted a video

EPSTEIN MAXWELL HIDDEN DOCUMENTARY

Real Time Intel Exclusively On Telegram t.me/brainwashed444
9 hours ago
Less Prone favorited Sandy's video
12 hours ago
Less Prone favorited tjdavis's video
12 hours ago
Less Prone posted a video

Sydney Sweeney Has Great Jeans - Outrage AI Parody Song

AI Parody Music Video poking fun at the online hysteria surrounding Sydney Sweeney's American Eagle jeans campaign.✅ Blue jeans✅ Blonde panic✅ DEI gone wild✅...
13 hours ago
tjdavis posted a video

How "Free" P*rn Sites Really Work (and Who Runs Them)

Excerpt from This Past Weekend w/ Theo Von #559 Laila MickelwaitFull Episode: https://youtu.be/9J7187j4PO4?si=2GUNymssKJpe6nEvFind Theo Von:Website: https://...
23 hours ago
tjdavis posted a blog post
23 hours ago
Doc Vega posted blog posts
yesterday
Doc Vega commented on Ragnarok's video
Thumbnail

Charles Manson Talks About The Global Elite

"I've had my account with YouTube terminated before over bullshit excuses because they…"
yesterday
Doc Vega commented on Ragnarok's video
Thumbnail

Charles Manson Talks About The Global Elite

"Remember, though he makes his points, this man used the Beatles White Album as his own manifesto of…"
yesterday
Sandy posted videos
Monday
Sandy posted a photo
Monday
Sandy commented on Sandy's video
Sunday
Sandy posted a video
Sunday
cheeki kea posted a photo
Jul 30
Burbia posted a video

Strange Videos That Expose Something Massive

#disturbing #video #strange #scary #scaryvideos #strangevideos This is a compilation of the most disturbing videos on the internet, not only...
Jul 30
Doc Vega posted blog posts
Jul 29
Burbia commented on Burbia's video
Jul 29
Burbia posted a video

SUPEROLA & THE LOST BURGERS

This Game is RUBBISH !
Jul 29
pohonemas33 team commented on tjdavis's photo
Thumbnail

DejaVu

"nice very goodjob, i wish you can visit official situs pohonemas33"
Jul 26

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted