CYBERCOM to Go Operational This Month

CYBERCOM to Go Operational This Month
Published on 10-15-2010 Email To Friend Print Version
Share |http://www.blacklistednews.com/index.php?news_id=11043

Source: Global Intelligence Report

The new US Cyber Command (CYBERCOM) is reportedly ready to go fully operational this month, in coordination with NATO, to create a global cyber warfare system that will involve all major branches of the US armed forces, according to ISAIntel. In September, the Defense Department dismantled its Joint Task Force Global Network Operations command, which is now part of CYBERCOM, which is being sponsored by US Strategic Command (STRATCOM). CYBERCOM has a “dual mission to conduct offensive and defensive cyber operations,” according to the Pentagon. In May, four-star General Keith Alexander was appointed as CYBERCOM’s first commander. The center will be staffed by around 1,100 personnel to "ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries". In related news, on 7 October Hun Technology Inc. announced the launch of “C2”, a new weapon reportedly designed for CYBERCOM. “Through [C2] we will be able to offer a permanent solution and nuke the problems related to cyber-attacks once and for all," media quoted Ferenc Ledniczky, co-founder and President of the company, as saying. C2 claims to be a technological breakthrough that changes the inherently hackable design of software architecture. Quoted by US media, Ledniczky said: “In developing [C2], we broke away from the traditional approach to computerize the enterprise information management process. Instead we developed an entirely new system which will be un-hackable by virtue of design and without relying on encryption or other protective measures.”

Analytical Note: Apparent CIA malware infecting the operating system of a trans-Siberian gas pipeline led to a massive explosion in the Soviet Union in 1982. Jumping ahead to 2007, Estonia’s national infrastructure came under cyber attacks, shutting down government institutions, banks and media after servers were overloaded. This happened during a political dispute with Russia. In 2008, Georgia experienced a similar cyber attack during a short war with Russia over the separatist region of South Ossetia. In August, the Pentagon revealed information about a cyber attack against the US military’s Central Command in 2008. According to the Pentagon’s account, USB memory sticks were randomly placed in a washroom at a US military base in the Middle East providing support for the war in Iraq. The memory sticks, infected with a computer worm by an undisclosed foreign intelligence agency, were picked up by soldiers who ignored protocol and plugged them into military laptops. The worm took 14 months to kill. In a very similar attack earlier this year, Iran experienced a computer worm (the Stuxnet virus) that infected around 30,000 IP addresses, as well as the computers at the Bushehr nuclear plant. The malware, according to international experts, was custom-made to target and manipulate industrial automation software from remote locations. This worm was also apparently spread by a USB memory stick. Some specialists have referred to the malware as an espionage worm, or a malware sleeper cell, because of its ability to immediately infect but remain latent until activated at a later date. It is not impossible that the malware was a US or Israeli (the latter perhaps more probable) cyberwar offensive. Although US President Barack Obama has said that the administration would not monitor private sector networks or internet traffic in the name of cyber security, this clearly cannot be the case with the launch of CYBERCOM, which was undertaken without public debate largely because of the public’s inability to grasp the issue.

.

Views: 57

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Burbia posted a blog post

James Comey appears to call for the assassination of President Trump

I'm sure these are the kind of shells Comey is implying here. …See More
11 hours ago
Doc Vega posted blog posts
yesterday
rlionhearted_3 commented on Doc Vega's blog post If History is Ever Portrayed as It Really Happened
"The “white dude in the center” is Bill Gates. People been planning shit for generations."
yesterday
rlionhearted_3 favorited Doc Vega's blog post If History is Ever Portrayed as It Really Happened
yesterday
Burbia posted videos
yesterday
Doc Vega commented on tjdavis's blog post The Dems Love Their Demons
"Gruesome AI romance photography! "
yesterday
Doc Vega favorited tjdavis's blog post The Dems Love Their Demons
yesterday
rlionhearted_3 posted a photo
yesterday
Doc Vega posted blog posts
Wednesday
cheeki kea commented on tjdavis's photo
Wednesday
cheeki kea favorited tjdavis's photo
Wednesday
cheeki kea favorited tjdavis's blog post The Dems Love Their Demons
Wednesday
cheeki kea posted a blog post
Wednesday
tjdavis posted a blog post
Wednesday
Doc Vega posted a blog post

And Another Wilderness Expert Disappears

Thomas Siebold was considered to be a well-trained survivalist. He had hiked and lived in the…See More
Tuesday
Doc Vega commented on Doc Vega's blog post In Disarray
"cheeki kea Thanks for your support! "
Tuesday
Burbia commented on Burbia's photo
Tuesday
Burbia commented on Burbia's video
Thumbnail

IT’S OVER! Trump OBLITERATES IRS as Social Security Just Changed FOREVER!

"The IRS has lost almost one-third of its tax auditors after 2 months of DOGE cuts, report…"
Tuesday
Burbia posted videos
Tuesday
cheeki kea favorited Doc Vega's blog post In Disarray
Monday

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted