Google Warning Users against State-sponsored Cyber attacks

This move by the technology giant shouldn’t be understood as an attempt to keep user information safe. Google, a government-sponsored data mining operation is perhaps the largest violator of privacy on the Internet.

By JOHN ROGIN | FOREIGN POLICY | JUNE 6, 2012

A senior Senate aide confirmed that this evening he received a warning on his Gmail account that Google suspected he had been the target of a state-sponsored cyber attack.

Web giant Google is about to announce a new warning informing Gmail users when a specific type of attacker is trying to hijack their accounts — governments and their proxies.

Later today, the company will announce a new warning system that will alert Gmail users when Google believes their accounts are being targeted by state-sponsored attacks. The new system isn’t a response to a specific event or directed at any one country, but is part and parcel of Google’s recent set of policy changes meant to allow users to protect themselves from malicious activity brought on by state actors. It also has the effect of making it more difficult for authoritarian regimes to target political and social activists by hacking their private communications.

“We are constantly on the lookout for malicious activity on our systems, in particular attempts by third parties to log into users’ accounts unauthorized. When we have specific intelligence-either directly from users or from our own monitoring efforts-we show clear warning signs and put in place extra roadblocks to thwart these bad actors,” reads a note to users by Eric Grosse, Google’s vice president for security engineering, to be posted later today on Google’s Online Security blog, obtained in advance by The Cable. “Today, we’re taking that a step further for a subset of our users, who we believe may be the target of state-sponsored attacks.”

When Google’s internal systems monitoring suspicious internet activity, such as suspicious log-in attempts, conclude that such activities include the involvement of states or state-backed initiatives, the user will now receive the specialized, more prominent warning pictured above. The warning doesn’t necessarily mean that a user’s account has been hijacked, but is meant to alert users that Google believes a state sponsored attack has been attempted so they can increase their security vigilance.

Google wants to be clear they are not singling out any one government for criticism and that the effort is about giving users transparency about what is going on with their accounts, not about highlighting the malicious actions of foreign states.

“If you see this warning it does not necessarily mean that your account has been hijacked. It just means that we believe you may be a target, of phishing or malware for example, and that you should take immediate steps to secure your account,” Grosse writes. “You might ask how we know this activity is state-sponsored. We can’t go into the details without giving away information that would be helpful to these bad actors, but our detailed analysis-as well as victim reports-strongly suggest the involvement of states or groups that are state-sponsored.”

Google insiders told The Cable that Google will not be giving out information on which governments it sees as the most egregious violators of web privacy.  For Google, the new initiative is not an effort against governments but a way to help its users help defend and protect themselves.

Users who click through the new warning message will be directed to a page that outlines commonly seen security threats and suggests ways users can immediately raise their level of security on Gmail.

“We’re constantly working to prevent harmful activity on our services, especially attempts to compromise our users’ information,” the insider said. “The primary message is: we believe that you’re a target so you should take immediate steps to protect your account.”

The new announcement comes only days after the company said they would alert users in mainland China when they use search terms that are likely to be censored by the Chinese government. According to another of Google’s official blogs, that move was meant to improve the search experience for Chinese users by allowing them to avoid terms that would result in stalls or breaks in their search experience due to government filters.

For example, Google said that Chinese users searching the character for “river,” which is “jiang” in Chinese, causes technical problems. The same character is also used in the search for former Chinese President Jiang Zemin.

Google didn’t specifically mention Chinese censorship in its notice about Chinese search terms, apparently in an effort not to antagonize the Chinese government any more than necessary. Google and Beijing have been at odds since 2010, when the company announced it would no longer censor search terms on the Google.cn and moved the bulk of its Chinese operations to Hong Kong.

That move followed a series of Gmail attacks in 2010, directed at Chinese human rights activists, which were widely suspected to be linked to the Chinese government. Following those attacks, the government-controlled People’s Daily publicly accused Google of being an agent for U.S. intelligence agencies.

While last week’s announcement and this week’s announcement are both being presented by Google as user based initiatives not directed at foreign governments, Google CEO Eric Schmidt has been speaking out publicly and forcefully in recent months about the potential negative role governments can play in circumventing internet freedom.

“While threats come from individuals and even groups of people, the biggest problem will be activities stemming from nations that seek to do harm,” he said in London last month.

Obama Pressed for Cyber attacks against Iran with Stuxnet and Flame

Main Stream Media carefully justifies attacks under the excuse that Iran might be producing a nuclear bomb or that Al-Qaeda — a USA creation — is using computers somewhere.

By DAVID E. SANGER | NY TIMES | JUNE 1, 2012

From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran’s main nuclear enrichment facilities, significantly expanding America’s first sustained use of cyberweapons, according to participants in the program.

Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games — even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran’s Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet.

At a tense meeting in the White House Situation Room within days of the worm’s “escape,” Mr. Obama, Vice President Joseph R. Biden Jr. and the director of the Central Intelligence Agency at the time, Leon E. Panetta, considered whether America’s most ambitious attempt to slow the progress of Iran’s nuclear efforts had been fatally compromised.

“Should we shut this thing down?” Mr. Obama asked, according to members of the president’s national security team who were in the room.

Told it was unclear how much the Iranians knew about the code, and offered evidence that it was still causing havoc, Mr. Obama decided that the cyberattacks should proceed. In the following weeks, the Natanz plant was hit by a newer version of the computer worm, and then another after that. The last of that series of attacks, a few weeks after Stuxnet was detected around the world, temporarily took out nearly 1,000 of the 5,000 centrifuges Iran had spinning at the time to purify uranium.

This account of the American and Israeli effort to undermine the Iranian nuclear program is based on interviews over the past 18 months with current and former American, European and Israeli officials involved in the program, as well as a range of outside experts. None would allow their names to be used because the effort remains highly classified, and parts of it continue to this day.

These officials gave differing assessments of how successful the sabotage program was in slowing Iran’s progress toward developing the ability to build nuclear weapons. Internal Obama administration estimates say the effort was set back by 18 months to two years, but some experts inside and outside the government are more skeptical, noting that Iran’s enrichment levels have steadily recovered, giving the country enough fuel today for five or more weapons, with additional enrichment.

Whether Iran is still trying to design and build a weapon is in dispute. The most recent United States intelligence estimate concludes that Iran suspended major parts of its weaponization effort after 2003, though there is evidence that some remnants of it continue.

Iran initially denied that its enrichment facilities had been hit by Stuxnet, then said it had found the worm and contained it. Last year, the nation announced that it had begun its own military cyberunit, and Brig. Gen. Gholamreza Jalali, the head of Iran’s Passive Defense Organization, said that the Iranian military was prepared “to fight our enemies” in “cyberspace and Internet warfare.” But there has been scant evidence that it has begun to strike back.

Read Full Article →

Iran unplugs oil terminal from Internet

ASSOCIATED PRESS | APRIL 23, 2012

Iran has disconnected its oil ministry and its main crude export terminal from the Internet to avoid being attacked by computer malware, a semiofficial news agency reported on Monday.

Mehr said an export terminal in Kharg Island and other oil facilities came under attack from malware and hackers but continued their work as usual.

Some 80 percent of Iran’s daily 2.2 million barrels of crude export goes through the Kharg facility, located off its southern coast.

Iran says that it is involved in a long-running technological war with the United States and Israel. In recent years, Tehran has repeatedly announced it has defused malware in its industrial sector including the highly specialized Stuxnet in 2010, which it said had targeted the country’s nuclear facilities.

This round of cyberattack began Sunday, Mehr quoted Hamdollah Mohammadnejad, deputy oil minister in charge of civil defense, as saying. He said the ministry and some provincial officers were taken offline, and a special headquarters was set up to confront the attacks.

Earlier this year, head of Iran’s civil defense agency Gholam Reza Jalali said the energy sector of the country has been a main target of cyberattacks over the past two years.

Iran has recently announced a series of cyberdefense measures spearheaded by the Revolutionary Guards _ a unit which already runs every key military program in Iran and many industries.

In March, the Guard set up what it claims is a hack-proof communications network for its high-level commanders.

Ultimately, Iran says it wants to set up a completely indigenous Internet that is also aimed at checking a “cultural invasion” by enemies aimed at promoting dissent and undermining the ruling system.

The Stuxnet virus was reported to have disrupted controls of some nuclear centrifuges. Tehran says its scientists neutralized the malware and it only damaged the laptops of some personnel at a nuclear power plant.

Iran is at odds with Israel and the West over its controversial nuclear program. The U.S. and its allies accuse Tehran of wanting to develop weapons technology. Iran denies the claims, saying its program is for peaceful purposes.

Iran has reported other cyberattacks since, including an infection in April 2011 dubbed “Stars” and a spy virus about which little is known but its name, “Doku.”

Washington’s Black Ops against Iran

Extensive range of covert operations envisaged by US Congress

by Ismail Salami
Global Research
October 31, 2011

The US secret agenda for tightening its vice-like grip on the Islamic Republic of Iran has taken on an apparently new form after the anti-Iran alleged assassination plot against the Saudi ambassador to the United States, Adel al-Jubeir, raised many eyebrows among experts and analysts around the world.

With a strong penchant for pushing for tougher action on Iran, the Obama administration has already imposed a series of sanctions against the Islamic Republic. However, a Republican-controlled congressional committee has recently heard testimony demanding an extensive range of covert operations against the country.

The operations, which range from cyber attacks to political assassinations, are speculated to be conducted under the feeble excuse that Iran was the alleged architect of an assassination plot against the Saudi envoy to the United States. By political assassination, the US congressmen unconsciously mean the liquidation of the Iranian nuclear scientists, an act they actually started long ago.

Retired Army Gen. John Keane told a hearing of two key subcommittees of the House Committee on Homeland Security on Wednesday, “We’ve got to put our hand around their throat now. Why don’t we kill them? We kill other people who kill others.”

Also, Rep. Jackie Speier (D-Calif.) poured some pearls of wisdom over others and called for “sober, reasoned discussion.”

“Iran’s leaders must be held accountable for their action,” she said, “but we cannot take any reckless actions which may lead to opening another front in the ‘War on Terror,’ which the American people do not want and cannot afford.”

Naturally, the US government, in essence, cannot afford to wage another war at least in view of the economic woes it has wrought upon the American citizens, regardless of other influencing factors.

The stone that started rolling fell into the hands of New York Congressman Peter King who made an extremely bizarre comment. He suggested that the US should kick out Iranian officials at the UN in New York and in Washington and accused them of being spies, ignorant of the fact that the UN is considered an independent international body and that the US has no authority to ‘kick out’ diplomats accredited there en masse.

Overwhelmed with a sense of false eagerness, he renewed the anti-Iran alleged assassination ploy and said excitedly, “So you have the assassination of a foreign ambassador, you have the willingness to kill hundreds of Americans — this is an act of war,” King said, “I don’t think we can just do business as usual or even carry out sanctions as usual.”

The volley of vitriolic words against Iran which issued from Mr. King reeks of blind enmity long egged on by other hawks in Washington.

In point of fact, the anti-Iran moves practically started in 2007 when US Congress agreed to George W. Bush, the then US president, to fund a major increase in covert operations against Iran. According to the intelligence officials who spoke to the Blotter on ABCNews.com, the CIA was then given a presidential approval to commence its covert ‘black’ operations inside Iran. To that effect, over four hundred million dollars were allocated in a Presidential Finding signed by George W. Bush. The ultimate goal of the finding was to cripple Iran’s religious government and the operations involved throwing support behind minority Ahwazi Arab and Baluchis and other opposition groups as well as amassing intelligence about Iran’s nuclear sites.

Speaking on the condition of anonymity because of the sensitive nature of the subject, the intelligence officials confirmed that Bush had signed a “nonlethal presidential finding”, giving the CIA carte blanche to engage in any sabotaging activities including a coordinated campaign of propaganda, disinformation and manipulation of Iran’s currency and international financial transactions in order to destabilize and eventually achieve regime change in Iran.

“I can’t confirm or deny whether such a program exists or whether the president signed it, but it would be consistent with an overall American approach trying to find ways to put pressure on the regime,” said Bruce Riedel, a retired CIA senior official, an expert on Iran and the Middle East (ABCNEWS.com May 22, 2007).

In June 2007, The New Yorker magazine also ran a similar story by Seymour Hersh, confirming that the finding had been signed by Bush and intended to destabilize the Islamic government.

“The Finding was focused on undermining Iran’s nuclear ambitions and trying to undermine the government through regime change,” the article cited a person familiar with its contents as saying, and involved “working with opposition groups and passing money.”

From an intelligence point of view, the fact that the US government is resorting to covert black operations against Iran rules out the possibility of a military strike against the country.

According to reports, US ambassadors in Islamabad have repeatedly asked for opening a consulate in the province of Baluchistan, a suspicious demand from the US. In 2011, the call was renewed by US ambassador Cameron Munter to Islamabad. Persistence in this demand is to be taken seriously. Baluchistan is strategically important as it is a harbor for the anti-Iran terrorist group, Jundullah, in the first place and a separatist Pakistani province in the second place.

In fact, Washington greatly favors the establishment of a ‘Greater Baluchistan’ which would integrate the Baluch areas of Pakistan with those of Iran. Military expert Lieutenant Colonel Ralph Peters suggests that Pakistan should be broken up, leading to the formation of a separate country: ‘Greater Baluchistan’ or ‘Free Baluchistan’ (June 2006, The Armed Forces Journal). As a result, this would incorporate the Baluch provinces of Pakistan and Iran into a single political entity which can be tailored to suit the interests of Washington.

So it seems that the US harbors two main ulterior motives if this demand is answered. First, it can fulfill its dream of establishing the Greater Baluchistan, consolidate firm presence in this separatist part of Pakistan and secondly, it will be in a position to avail itself of this influence to carry out its sabotaging activities within Iran.

Earlier in 2007, the Blotter on ABCNews.com revealed the role of the US government in backing the terrorist Iranian group , which is responsible for a number of gruesome assassinations of the Iranian civilians on the Iran-Pakistan-Afghanistan border. The terrorist group spares no efforts in sowing the seed of terror in the southern Iranian province of Sistan-Baluchistan and their lust for murder and cruelty knows no remission. The victims the group has so far claimed include many women and children who have become the direct target of their killing. In July 2010, the group mounted a pair of suicide attacks on a major Shi’ite mosque in the city of Zahedan, the capital of Iran’s Sistan-Balochistan Province, killing dozens of worshippers and wounding over 100 people.

Although US officials deny any ‘direct funding’ of the terrorist group, they acknowledge that they are in contact with the leader of the group on a regular basis. A similar terroristic attack was launched by the same group on a mosque in Zahedan in May 2009, which led to the martyrdom of many worshippers.

Sadly enough, Pakistan’s Inter-Service Intelligence (ISI) implicitly supports the group and reportedly shelters some of its high-profile members in coordination with the CIA.

Isn’t it paradoxical that Jundullah, a terrorist group and an offshoot of al-Qaeda, is directly funded by the US government which keeps bandying about its so-called ‘war on terror’ in the world?

This is enough to cause the US to hang its head low in shame and humility.

Dr. Ismail Salami is an Iranian author and political analyst. A prolific writer, he has written numerous books and articles on the Middle East. His articles have been translated into a number of languages.

From Physical Fear mongering to Cyber Fear mongering

United States Cyber Command “warns” about cyber Armageddon.

Ask yourself, who has the power to carry out vast cyber attacks? Right, those who control cyber space.

by Bill Gertz
Washington Times
September 14, 2011

The general in charge of U.S. cyber warfare forces said Tuesday that future computer-based combat likely will involve electronic strikes that cause widespread power outages and even physical destruction of thousand-ton machines.

Army Gen. Keith Alexander, commander of the new U.S. Cyber Command, also said that massive losses of private and public data in recent years to computer criminals and spies represent the largest theft in history.

Threats posed by cyber-attacks on computer networks and the Internet are escalating from large-scale theft of data and strikes designed to disrupt computer operations to more lethal attacks that destroy entire systems and physical equipment.

“That’s our concern about what’s coming in cyberspace — a destructive element,” Gen. Alexander, who is also the director of the National Security Agency, the electronic spying agency, said in a speech at a conference on cyber warfare.

Gen. Alexander said two cases illustrate what could happen in an attack.

The first was the August 2003 electrical power outage in the Northeast U.S. that was caused by a tree damaging two high-voltage power lines. Electrical power-grid software that controlled the distribution of electricity to millions of people improperly entered “pause” mode and shut down all power through several states.

The example highlighted the threat of sophisticated cyber warfare attackers breaking into electrical grid networks and using the access to shut down power.

“You can quickly see that there are ways now to get in and mess with [electrical] power if you have access to it,” he said.

The second example was the catastrophic destruction of a water-driven electrical generator at Russia’s Sayano-Shushenskaya dam, near the far eastern city of Cheremushki, in August 2009.

Gen. Alexander said one of the dam’s 10 650-megawatt hydroturbine generators, weighing more than 1,000 tons, was being serviced and, by mistake, was remotely restarted by a computer operator 500 miles away. The generator began spinning and rose 50 feet into the air before exploding. The flood caused by the accident killed 75 people and destroyed eight of the remaining nine turbines.

A similar deliberate attack remains a huge problem, Gen. Alexander said, saying that destruction by cyber-attacks was outranked only by nuclear bombs or other weapons of mass destruction.

In developing cyber warfare strategies, Gen. Alexander said, the U.S. will respond to computer-based attacks as it will to other attacks. The government is adopting what he termed an “active defense” strategy aimed at bolstering the readiness of computer networks to respond.

The Pentagon’s cyberstrategy announced last summer calls for treating the cyberdomain as equal to the air, land, sea and space domains and leveraging U.S. technology to improve cyberdefenses for government and the private sector.

On information theft, Gen. Alexander said the problem is so pervasive that there are two categories for major companies: firms that are aware they have been hacked and the rest who remain unaware of the problem.

“What’s been going on over the last few years in the networks … is the greatest theft that we’ve seen in history,” he said. “What we’re losing in intellectual property is astounding.”

The four-star general said estimates of the value of lost corporate and government information range as high as $1 trillion. In one recent case, a U.S. corporation that he did not identify by name lost $1 billion worth of proprietary technology that was “stolen by the adversaries.” The technology took the company more than 20 years to develop.

The problem is “on a massive scale that affects every industry and every sector of the economy and government, and it’s one that we have to get out in front of,” he said.

Recent attacks on corporate computer networks include Sony’s system that affected 7.7 million video users in April and a second incident affecting 2.5 million users in May. Google, defense contractor Booz Allen Hamilton and the security company RSA also were targets of sophisticated computer attacks.

In May 2007, computer networks in Estonia were disabled by computer operatives from neighboring Russia.

“They had to disconnect their international connections to stop these attacks after several days. It was huge and greatly impacted Estonia,” Gen. Alexander said.

Asked about conducting offensive operations, Gen. Alexander said that current cyberdefenses are “far from adequate” and that more needs to be done before adopting more offensive tools.

“In cyber, we have not solved the defensive portion,” he said. “From my perspective, there is a lot that we can do to fix that before we take offensive actions.”

Response actions to cyber-attacks need to be carefully measured to avoid escalating from a conflict in the cyber-arena to full-scale conventional warfare, he said.

One example would be to “take down ‘botnets’” — malicious computer software packages — from the Internet.

Gen. Alexander defended the U.S. government practice of not identifying major cyber threats such as those emanating from China and Russia.

Confronting foreign government complicates efforts to track cyber-activity, he said.

“Candidly, if every time we say, ‘We know you’re doing A,’ they say, ‘Oh, you can see that?’ We don’t see it anymore. We don’t see them for a while.”

The foreign governments also seek to learn information about U.S. tracking capability and, when confronted, “all they do is deny it,” he said.

Gen. Alexander warned that cyber warfare is expected to continue and that defenses need to be improved. “Whether or not we do that, it’s coming,” he said. “It’s a question of time. People say, ‘Aw that’s five years out, it’s two years out.’

“What we don’t know is how far out it is, an attack in cyberspace, and what that will be? Will it be against commercial infrastructure, government networks? Will it be against platforms? We don’t know.”

Related Links:

Togel178

Pedetogel

Sabatoto

Togel279

Togel158

Colok178

Novaslot88

Lain-Lain

Partner Links