gAtO wAs mOnItOrInG – bad ToR-Relays and found that during this unrest in Iran and Syria. We have 17 bad ToR-Relays 95% in Iran and Syria. This is how the shut down the network to suppress information communication securely to the outside world. Time stamp is 05-31-2012 00:52:05 MET.
Tor Network Status – http://torstatus.blutmagie.de/index.php you can find all kinds of information about the .onion relays that make up the networks.
The United States would use cyber weapons against an adversary's computer networks only after officials at the highest levels of government approved of the operation because of the risks of collateral damage, a senior U.S. military official said Tuesday.
Russian computer programmers have created an industry supplying criminals with easy-to-use automated hacking software which can take control of a home PC in seconds.
This type of software, called an exploit pack, takes advantage of known flaws in commonly used programs, such as Adobe Reader and Internet Explorer, to hack computers without the need for human intervention.
Criminals are then able to install viruses or steal online banking details without the need for any technical expertise.
Remarks on the Department of Defense Cyber Strategy
As Delivered by Deputy Secretary of Defense William J. Lynn, III, National Defense University, Washington, D.C., Thursday, July 14, 2011
Thank you Hans.
Returning to NDU is especially meaningful for me. I was a fellow here at an evocative time. Reagan was President. Nuclear conflict with the Soviet Union dominated defense scenarios. And the Berlin Wall appeared to forever separate two mutually-antagonistic world-systems.