Grey hat hackers are using open-source data to manipulate the stock price of successful companies.
In February this year, a previously unknown research body named Zatarra published a report on one of Europe’s fastest-growing fintech companies, Wirecard. That report claimed Wirecard, or individual senior staff, were guilty of money laundering, defrauding Visa and Mastercard, hosting porn on company websites and more.
Good idea in osint realm: “For those of who you don’t know the work of the OSC, they have in my opinion single-handedly elevated the profession of Open Source Intelligence (OSINT) collection and analysis from getting no respect inside the Intelligence Community (IC) to one that every agency is designating as a must-have.
The conference was only open to current members of the IC plus invited speakers, and the speakers came from very diverse backgrounds. In fact, I was the only speaker who focused on the Russian Internet from a cyber warfare perspective (i.e., the Internet as an attack platform and Social Networks as target-rich environments). Others were academics, journalists, and a few security and intelligence professionals, and everyone focused on a different area. It was very stimulating with lots of audience interaction both during the sessions (lots of time provided for Q&A), during the breaks, and afterwards.
Fortunately, Sensa Solutions who handled the logistics for the OSC has posted some of the presentations on their Website. I particularly enjoyed Persephone Miel (Which came first, Russian Media or Russian Reality) andMikhail Alexseev (Internet Search Traffic and Ethnic Relations in Russia), but they are all worth reading.” via IntelFusion
From IntelliBriefs: The recent discovery of Chinese cyber warfare attacks on foreign computers, on communication computers of visiting dignitaries, and espionage activities to assist a friendly country is building weapons of mass destruction (WMDI) has refocused international attention on the developing spectrum of China’s military doctrine. Continue reading →
“A colleague alerted me a couple of days ago to a massive DDOS attack against Kyrgyzstan ISPs http://www.ns.kg andwww.domain.kg which essentially shut them down on January 18, 2009. There are only 4 ISP providers for the entire country so this attack was clearly sending a message. Since the attacking IPs were Russian, and since the Russian government supports the current Kyrgyzstan President, I’m thinking that its a message to the opposition party.” … Continue reading →
“5GW is what happens when the world’s disaffected direct their desperation at the most obvious symbol of everything they lack, taking advantage of the tactics and battlefields pioneered by more highly organized fourth-gen warriors. The symbol is the United States, the world’s sole super-power. And the fifth-gen fighters’ weapon of choice is political “stalemate,” contends Marine Lt. Col. Stanton Coer, in a new piece inMarine Corps Gazette. “5GW fighters will win by … point[ing] out the impotence of secular military might. … These fighters win by not losing, while we lose by not winning.”
The battlefield will be something strange — cyberspace, or the Cleveland water supply, or Wall Street’s banking systems, or YouTube. The mission will be instilling fear, and it will succeed.
5GW is anchored in the global Islamic jihad espoused by Al Qaeda, Coer writes. But that doesn’t mean that fifth-gen warriors necessarily are clearly ideological, with aspirations of setting up alternative political systems. They’re opportunists, intent only on destruction. But even seemingly pointless violence can have a perverse logic, for the sudden, irrational destruction undermines the idea that nations — and especially the most powerful nation, the U.S. — are viable in the modern world.
So how do you beat a fifth-gen enemy? By not fighting, first of all. Beebe says ending the vortex of violence in Africa means alleviating “the conditions of human beings that create these insecurities across state borders.” In other words, focus on economic development, humanitarian assistance and communication, with nary an M-16 or Abrams tank in sight.
In Coer’s words, “success will vary inversely to exported violence.””
Source: Danger Room
And, because some part of this war is about cyberspace…
INPUT’s Information Security Market Forecast 2008 – 2013 illustrates that demand for vendor-furnished information security products and services by the U.S. federal government will increase from $7.4 billion in 2008 to $10.7 billion in 2013 at a compound annual growth rate (CAGR) of 7.7%.