Monday, September 3, 2012

U.S. Launching Cyber Warfare: Towards an Era of “Computer Virus Wars”?

cybercommand1

The US is launching a new stage of the arms race – a race of offensive computer weapons. Namely, the US is going to arm itself with computer viruses in order to destroy the enemy’s computer networks. Besides, the US Defense Department is developing a computer program which would deduce the level of information security of the enemy’s strategic facilities.

Until now, the US has been denying that it had any plans of developing “computer weapons”.

A website devoted to US state procurements recently announced two tenders. The first one, announced by the US Air Force, is a tender for creating computer programs which would be able to destroy the enemy’s computer networks and put computer-operated devices out of order. The Air Force is planning to spend $ 10 mln on that.

The second tender was announced by the US Defense Advanced Research Projects Agency. The agency is ready to spend $110 mln on creating a program which has already received the name “Plan X” – a digital map which would reflect the enemy’s military infrastructure.

“Most probably, this map will show, first of all, military bases, transport systems and electricity systems,” expert in the work of intelligence services Evgeny Yuschuk said in an interview with the Voice of Russia.

“In the case of a war, it would be quite expectable for the warring sides to try to put each other’s transport and electricity systems out of order. If these systems are operated by computers, they would try to use computer viruses.”

“Paradoxical as it may sound, with the appearance of computers and the Web, many kinds of equipment, including military equipment, became, in some points, more vulnerable,” Mr. Yuschuk continues. “Earlier, to put out of order, say, an enemy’s radar, an anti-missile device or a power plant, one had to throw a bomb at it or to send a group of diversionists. At present, they may be put out of order with the help of a computer virus program.”

Analysts say that wars of computer programs, in fact, have already started. For example, in May, Iran’s top officials discovered regular disappearances of secret information from their computers. Later, Iranian computer experts discovered that this information was stolen by a new virus spy program called “Flame”.

The abilities of this new spy program shocked computer experts. Specialists from the Kaspersky Laboratory (a Russian company which develops anti-virus programs, probably the most popular ones in Russia) say that “Flame” is currently the world’s most advanced hacker program.

“Strategically important facilities in Russia have also come under US virus programs’ attacks,” another Russian expert in the work of intelligent services, Andrey Masalovich, says.

“Attacks of virus programs have already become permanent – mainly, on nuclear power plants and on objects that have to do with the trade of weapons,” Mr. Masalovich says. “There have even been attacks on computer search engines, like the Russian Yandex.”

Sometimes, after an attack of a virus on a computer-operated facility or a computer network, it is hard to say who was behind this attack – amateur hackers or a secret intelligence service of a certain country.

Russia is now insisting that the UN should introduce a ban on creating and producing computer viruses and hacker programs.

Source: Global Research

Apple Granted Patent To Disable Cameras According To Location

Apple Granted Patent To Disable Cameras According To Location nophoto mini

Apple was granted a patent last week that will enable it to wirelessly disable the camera on iphones in certain locations, sparking fears that such techniques could be used to prevent citizens from communicating with each other or taking video during protests or events such as political conventions and gatherings.

The camera phone has revolutionized the flow of information in the digital age. Any time a major event takes place, news networks and video websites are immediately inundated with footage and photographs from the scene.

That could all change in the future however, with a flick of a switch, according to U.S. Patent No. 8,254,902, published on Tuesday, titled, “Apparatus and methods for enforcement of policies upon a wireless device.”

It states:

Apparatus and methods for changing one or more functional or operational aspects of a wireless device, such as upon the occurrence of a certain event. In one embodiment, the event comprises detecting that the wireless device is within range of one or more other devices. In another variant, the event comprises the wireless device associating with a certain access point. In this manner, various aspects of device functionality may be enabled or restricted (device “policies”). This policy enforcement capability is useful for a variety of reasons, including for example to disable noise and/or light emanating from wireless devices (such as at a movie theater), for preventing wireless devices from communicating with other wireless devices (such as in academic settings), and for forcing certain electronic devices to enter “sleep mode” when entering a sensitive area.

Apple Granted Patent To Disable Cameras According To Location

In other words, an encoded signal could be transmitted to all wireless devices, commanding them to disable recording functions.

Obviously, the way this will be applied will depend on what is determined to be a “sensitive area” by the relevant authorities.

To put it bluntly, the powers that be could control what you can and cannot document on your wireless devices according to their own whims.

Given that the major technology companies are set to make wireless connectivity a major feature of the latest cameras, this development does not bode well for photographers and citizen journalists who are already experiencing a major crackdown on their first and fourth amendment rights.

Michael Zhang at Tech site Peta Pixel notes:

“If this type of technology became widely adopted and baked into cameras, photography could be prevented by simply setting a “geofence” around a particular location, whether it’s a movie theater, celebrity hangout spot, protest site, or the top secret rooms at 1 Infinite Loop, Cupertino, California.”

Source: Prison Planet