Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 29 May 2013

U.S. IT Security - Schizophrenia, Bipolar Disorder or Godfather logic?

Posted on 09:32 by Unknown
The Chinese government has been conducting a broad, sustained, and disciplined campaign of cyberattacks against U.S. government agencies, critical infrastructure, private companies, and news organizations.

The public version of a study prepared for the Pentagon by the Defense Science Board now says that Chinese government hackers have also been able to penetrate the computer networks of all the major U.S. defense contractors, stealing the designs and specifications of the most advanced weapon system in the U.S. arsenal, and gaining insights into broad technologies on which U.S. military advances are based. (more)

and then we have...
 
White House National Security Adviser Thomas Donilon called Tuesday for strengthening U.S. military ties with China, despite growing tensions between the two over Beijing’s state-sponsored hacking and maritime territorial claims.

Donilon pushed for increased military cooperation in peacekeeping, fighting piracy and disaster relief.

“An essential part of building a new model for relations between great powers is ensuring we have a healthy, stable and reliable military-to-military relationship,” Mr. Donilon said in brief comments to reporters, Reuters reported. (more)
 

...keep your friends close, but your enemies closer?
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in espionage, FutureWatch, government, Hack | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • When Paranoids Collide they Blow the Whistle on Tea Kettles
    Customs agents in Russia found tea kettles and irons bugged with tiny Spyware chips that exploit WiFi connections , reports a local news out...
  • "1984" Gets a New Look
    via creativity-online.com ... You can't judge a book by its cover, but there's no denying that a thoughtful, bold packaging can mak...
  • Watergate's Next Watergate
    A history professor hopes that a federal court's recent order to release long-sealed Watergate documents will shed light on the motivati...
  • Laser Beam Eavesdropping - In the News Again
    Since the 1970's, stories about laser listeners have periodically popped up in the news. The common thread is their magical ability to e...
  • From BULLRUN to NOCON and LACONIC
    On September 5, The Guardian , The New York Times and ProPublica jointly revealed that NSA has a top secret program to break encryption sy...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ▼  2013 (455)
    • ►  November (47)
    • ►  October (53)
    • ►  September (31)
    • ►  August (50)
    • ►  July (50)
    • ►  June (47)
    • ▼  May (35)
      • On Paranoia...
      • Australia IT Security - More Godfather logic?
      • How to Stop The China IT Leach Syndrome – Two Ideas
      • U.S. IT Security - Schizophrenia, Bipolar Disorder...
      • The Other Train Spotters and the Drones Who Will C...
      • Australia - Report on Smartphone Spyware & Hacking
      • Where Spy Shops Shop - Know What You Are Up Against
      • Laser Beam Eavesdropping - The Trinidad and Tobago...
      • NYC Detective Dials "H" for Hacker... or, The Miss...
      • StopAStalker App ($5.00) - FREE for next 24 Hours
      • General Dynamics secures commercial smartphones fo...
      • Every Wonder How Spyware Gets on Phones? Watch the...
      • Big Data - The End of Privacy. The End of Chance.
      • Federal 1st Circuit Court of Appeals - Police can'...
      • Fight Back Against Stalkers - New iPhone App
      • Your Smartphone - The Quickest Route to Your Bank ...
      • Bug Eyed Drone Used 368 iPhone 4S Cameras
      • Cautionary Tale - Employees Bug Boss for Promotions
      • Retailers sniffing cell phone Wi-Fi signals at the...
      • Spybuster Tip # 845 - Don't Plug Your iPhone/Pad i...
      • Big Week for Spy News - Seems Everyone is Being Ca...
      • Private Investigators Convene in Atlantic City Nex...
      • CONTEST (ENDED) - Who Is This Man?
      • Privacy Journal Book - Compilation of State and Fe...
      • The NSA Spy's Guide to Searching the Internet - DE...
      • Government Surveillance Ratchets Up
      • Emergency Wristwatch for Spies... and Maybe Your CEO
      • FutureWatch - The Latest in TSCM-ware
      • New York Times - Quote of the Day - Tapped Out On ...
      • Secrets of The Dead - Uncensored recordings of Naz...
      • Jam Da Cam - Stick it to Da Hacker Man
      • Today: Hackers 2, FBI 0
      • Google Glass Hacked - Everything You See and Hear ...
      • Computer Expert Hacked Neighbors’ Wi-Fi - Spied on...
      • "When spycam hits your eye, like a big pizza pie, ...
    • ►  April (40)
    • ►  March (29)
    • ►  February (33)
    • ►  January (40)
  • ►  2012 (84)
    • ►  December (33)
    • ►  November (33)
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile