Advertisement
Guest User

Military Declares Cyber War

a guest
Mar 15th, 2013
1,148
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.95 KB | None | 0 0
  1.  
  2. http://paste.cullt.org/index.php?6q
  3.  
  4. ¤ Military Units to Wage Offensive Cyber War ::
  5.  
  6. In testimony before US Senate committees,
  7. top US intelligence officials announced
  8. Tuesday that Washington is setting up
  9. military units to wage offensive cyber
  10. war, to write malicious computer code
  11. to disable or destroy computers and
  12. computer-controlled infrastructure.
  13.  
  14. http://wsws.org/en/articles/2013/03/14/cybe-m14.html
  15.  
  16. http://www.nytimes.com/2013/03/13/us/intelligence-official-warns-congress-that-cyberattacks-pose-threat-to-us.html
  17.  
  18. ¤ Phrack Warned About Cyber War Threat ::
  19.  
  20. http://phrack.org/issues.html?issue=68&id=16#article
  21.  
  22. US military officials, eager to talk
  23. about how the Pentagon has boosted its
  24. computer defenses, often remain quiet when
  25. asked about its offensive Internet capabilities.
  26. A list of cyber capabilities - available only
  27. to policymakers - is described as ranging
  28. from planting a computer virus to bringing
  29. down electric grids. This would not be possible
  30. if it were not for the assistance of computer
  31. hackers working directly or indirectly for the
  32. Department of Defense, as well as the tendency
  33. in our communities to support or tolerate those
  34. who choose to do so. Unfortunately, this
  35. mentality is frequently espoused by figureheads
  36. commonly quoted in mainstream news articles,
  37. where they claim to speak on behalf of the
  38. hacker community. ... ...
  39.  
  40. With the passage of the 2012 Defense
  41. Authorization bill, the DoD has “express
  42. authority to conduct clandestine military
  43. activities in cyberspace in support of
  44. military operations.” Reuters reports that
  45. “the Pentagon has put together a classified
  46. list of its offensive cyber capabilities so
  47. policymakers know their option.” To what
  48. extent the US has already engaged in
  49. offensive electronic attacks is for the
  50. most part speculative. ... ...
  51.  
  52. As attacks intensify, no doubt governments
  53. will try to put more money into defending
  54. their infrastructure, holding more internal
  55. security trainings, and passing more laws
  56. increasing penalties for computer hacking
  57. as well as censoring and invading our privacy.
  58. The government propaganda machine will no
  59. doubt blame hackers as some sort of cyber-
  60. Al Queda to demonstrate the need for
  61. heightened security. Don’t get it twisted:
  62. they have always wanted to pass these laws
  63. in the first place and would have done so
  64. with or without using the hacker threat as
  65. scapegoat, just as they wanted to go invade
  66. Afghanistan and Iraq and pass the PATRIOT Act
  67. before 9/11 ever happened.
  68.  
  69. ¤ Best Civil Defense During Cyber Warfare ::
  70.  
  71. (1) Store everything on hardcopy discs.
  72.  
  73. (2) Unplug internet connection while NOT
  74. in use / only connect to modem when needed.
  75.  
  76. (3) Data forensics of all system processes.
  77. Probe suspicious TID stacks and SID.
  78.  
  79. (4) Limit wireless interfaces and hotspots
  80. around the home.
  81.  
  82. (5) Jam phone line while connected online.
  83.  
  84. (6) Always bleach caches, logs, cookies, etc.
  85.  
  86. Learn about deep hidden paths within systems
  87. that clone caches, logs, cookies, etc.
  88.  
  89. Bleach those paths too.
  90.  
  91. (7) Be fail-safe. Expect damage and prepare
  92. to recover ahead of time. Have a backup PC
  93. and/or laptop too.
  94.  
  95. (8) NEVER pirate (P2P or torrent) shit
  96. on the same computer you use to communicate
  97. to others. EVER. That is a red flag.
  98.  
  99. (9) Use an 100% OFFLINE computer to store
  100. files that you prefer to be on a system.
  101.  
  102. (10) Use UTF-8 texts to store information
  103. rather than rely on network storage. An
  104. example would be lists of websites you
  105. often visit - rather than bookmark cache.
  106.  
  107. This very message is from UTF-8 text.
  108. ______________________________________
  109. WEB.URL.BACKUP.GOLD.v001 Mirrors »
  110.  
  111. http://ponypaste.co/pa/9yn6m
  112. http://paste.mikulla.org/view/fa94dbad
  113. http://paste.lisp.org/display/135755
  114. http://pastebin.falz.net/258
  115. http://pastebin.com/0qmiVLBE
  116. http://dumpz.org/458465/
  117.  
  118. HUGE Security Resource version 6000 »
  119.  
  120. http://cryptome.org/2012/08/huge-sec-v6000.txt
  121. http://www.megapastebin.com/MZBYgO69
  122. http://pastebin.furver.se/6upr1i01m/
  123. ◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►
  124. ◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►
  125. ◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►◄►
  126. • Pentagon Boosts Cybersecurity Force »
  127.  
  128. http://www.washingtonpost.com/world/national-security/pentagon-to-boost-cybersecurity-force/2013/01/19/d87d9dc2-5fec-11e2-b05a-605528f6b712_story.html
  129.  
  130. http://www.nytimes.com/2011/06/01/us/politics/01cyber.html
  131.  
  132. • Current Dictator Obama Imposes Radical
  133. Authority Over Cyber Warfare »
  134.  
  135. http://www.rawstory.com/rs/2013/02/04/obama-gets-power-to-wage-pre-emptive-cyber-warfare/
  136.  
  137. http://news.cnet.com/8301-13506_3-20073314-17/president-lays-out-cyberwar-guidelines-report-says/
  138.  
  139. • Obama Regime Details New Use for Cyber
  140. Electronic Weapons »
  141.  
  142. http://mobile.nytimes.com/2013/02/04/us/broad-powers-seen-for-obama-in-cyberstrikes.html
  143.  
  144. http://www.techdirt.com/articles/20130203/21581921871/white-house-declares-it-has-broad-powers-when-it-comes-to-cyberattacks.shtml
  145.  
  146. • Another Executive Order From Current
  147. Dictator-in-Office Allows Military to
  148. Snoop Through All Internet Content »
  149.  
  150. http://www.scmagazine.com.au/News/323105,secret-powers-help-us-military-fight-cyber-threats.aspx
  151. http://www.washingtonpost.com/world/national-security/obama-signs-secret-cybersecurity-directive-allowing-more-aggressive-military-role/2012/11/14/7bf51512-2cde-11e2-9ac2-1c61452669c3_story.html
  152. http://www.rawstory.com/rs/2012/11/15/attorneys-obamas-secret-cyber-security-law-may-allow-military-deployment-within-the-u-s/
  153. {[☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼]}
  154. {[☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼☼]}
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement