Subscribe free to our newsletters via your
. Solar Energy News .




CYBER WARS
Backgrounder: The peeping eyes of the United States
by Staff Writers
Beijing (XNA) Feb 11, 2015


The U.S. government is apt to maximize its dominating technological advantages and has launched many cyber-hacking operations targeting strategic facilities of other countries.

The United States, the birthplace of the Internet, has now also turned into the most aggressive country in cyber surveillance, espionage and hacking, despite its repeated complaints about cyber attacks against U.S. facilities.

While labeling itself as the biggest victim in the "cyber-warfare," the United States is demonstrably the origin of the world's most cyber attacks. According to the estimates of Symantec, a leading cyber security company, 25 percent of the Internet attacks were launched inside the U.S. territory.

With the help of thousands of well-trained hackers and some of the world's fastest computers, the U.S. government and its intelligence agencies have been spying practically every corner of the cyber world.

Wedging Cyber-Warfare
The U.S. government is apt to maximize its dominating technological advantages and has launched many cyber-hacking operations targeting strategic facilities of other countries.

The New York Times reported in June 2012 that U.S. President Barack Obama had, in secret, upgraded a cyber attack scheme against Iran which was initiated by his predecessor, George W. Bush.

In May 2012, the U.S. intelligence agencies, working with Israel, released a computer virus called "Flame," which partly paralyzed the Internet in Iran and other countries in the region.

According to U.S. media, "Flame" was a weapon for Washington to gather key intelligence that would pave the way for further cyber attacks on the Iranian nuclear facilities.

Some of U.S. officials confessed in private that in the 2003 Iraq War, which overturned Saddam Hussein's regime, hackers with the U.S. military invaded the telecommunication system of the Middle East country, resulting in temporary malfunctions of mobile services and satellite phones in several of Iraq's neighboring countries.

The attack on the telecommunication system of the former Yugoslavia in the Kosovo War from February 1998 to June 1999 also brought "collateral damage" upon the satellites of the International Telecommunications Satellite Organization, severing communication for several days.

Moreover, the United States, with the assistance of South Korea and other allies, invaded the Internet in the Democratic People's Republic of Korea (DPRK) in 2010 and managed to acquire complete access to the country's servers, from which the United States could filter and watch every bit of information on the Internet of the DPRK.

Spying On Allies And US Citizens
Besides hacking into the countries that are in antagonistic relations with the United States, the U.S. "invisible sword" of cyber-hacking has also fallen onto its allies.

According to the files released by whistleblower Edward Snowden, the U.S. National Security Agency (NSA) has been spying on the email and cell phone communications of as many as 35 world leaders, including German Chancellor Angela Merkel.

U.S. spooks also intercepted the satellite signals of Britain, Japan and Norway.

The notorious PRISM program, under which the NSA acquires digital communications from Facebook, Google, Microsoft, Apple and other U.S. Internet companies, was allegedly targeting foreigners, but the communications of Americans could be conveniently collected and stored in NSA databases.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Symantec
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





CYBER WARS
China says Anthem hacking accusations 'groundless'
Beijing (AFP) Feb 6, 2015
China on Friday rejected accusations it was behind a hacking attack that saw data on up to 80 million customers stolen from US health insurance giant Anthem as "groundless". The Bloomberg News agency cited three people with knowledge of Anthem's investigation as saying cybersleuths believed the breach bore the hallmarks of previous attacks blamed on Chinese hackers. "The US side should n ... read more


CYBER WARS
Electricity from biomass could make western US carbon-negative

Second Generation Biofuels Market is Expected to Reach $23.9 Billion

Understanding air pollution from biomass burners used for heating

Biologists partner bacterium with nitrogen gas to make cleaner bioethanol

CYBER WARS
HAPTIX Starts Work to Provide Prosthetic Hands with Sense of Touch

Human insights inspire solutions for household robots

Octopus robot makes waves with ultra-fast propulsion

Tiny robotic 'hands' could improve cancer diagnostics, drug delivery

CYBER WARS
More wind power coming to Polish grid

Massachusetts set for offshore wind energy

150-MW Briscoe wind project fully funded

New wind farm study a load of hot air

CYBER WARS
Hackers can get into most 'connected cars': study

Uber to launch 'panic button' for users in India

Volvo cuts 1,000 jobs as China sales dip

Programming safety into self-driving cars

CYBER WARS
A smart grid self-organized simply

Masdar, Masdar Institute And ABB Announce New Facility

Generating Mobius strips of light

Infrared imaging technique operates at high temperatures

CYBER WARS
Second Reactor of Finnish NPP Disconnected From National Grid

Half of All NPPs Abroad to Be Constructed by China in 10 Years

Restart of First Nuclear Power Plant Since Fukushima Delayed in Japan

Inspectors Find 4,000 Errors at Japanese Nuclear Plant Near Fukushima

CYBER WARS
Climate summit hosts press India on emissions

Russia and DPRK May Develop $20-30 Billion Power Grid Project

Patents provide insight on Wall Street 'technology arms race'

Towards a scientific process freed from systemic bias

CYBER WARS
Tree species influence boreal forest fire behavior and subsequent effects on climate

Researchers unlock new way to clone hemlock trees

Orangutans take the logging road

Brazil's Soy Moratorium still needed to preserve Amazon




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.