Subscribe free to our newsletters via your
. Solar Energy News .




CYBER WARS
Commentary: Tracking cyberterrorists
by Arnaud De Borchgrave
Washington (UPI) May 29, 2013


Taiwan to open new cyberwar unit: report
Taipei (AFP) May 29, 2013 - Taiwan is preparing to launch a fourth cyberwar unit, a local newspaper reported Wednesday, in response to what it claims is a growing security threat from Chinese hackers.

The new unit is scheduled to open on July 1 and will work to counter cyber attacks on government websites, said the Taipei-based newspaper United Evening News.

It will bring to four the number of Taiwanese military units assigned to cyberwar and information-related tasks, added the paper.

The defence ministry declined to comment on the report.

Taiwanese government websites have frequently come under cyber attack from China, usually during disputes between the two sides, military authorities say.

In the six months to June last year, hackers launched more than one million attacks on the website of Taiwan's National Security Bureau (NSB), the Liberty Times reported.

The NSB did not reveal how many of the attacks came from China while saying all hacking attempts were blocked.

But the bureau described the perceived cyber threat from the mainland as "very severe" when asked to evaluate it in parliament two months ago.

"China's cyberwar capabilities were organised by the military and government units, using Internet viruses to attack Taiwan's government, economic and military websites," it said in a report cited by the Liberty Times.

However ties between Taipei and Beijing have improved markedly since Ma Ying-jeou of the China-friendly Kuomintang party came to power in 2008 on a platform of ramping up trade and tourism links with the mainland.

Ma was reelected in January 2012 for a second and final four-year term.

Yet China still considers Taiwan part of its territory awaiting reunification, by force if necessary, even though the island has ruled itself for more than 60 years after their split in 1949 at the end of a civil war.

Tracking, finding and killing Osama bin Laden required unusual skill, intelligence and courage. Tracking al-Qaida's financial conduits through cyberspace is infinitely more difficult.

Network forensics is one of the world's most challenging assignments -- explained in vivid, dramatic detail by Juan C. Zarate, a former super sleuth in the U.S. government's long campaign to find and disrupt al-Qaida's terrorist funding in the Worldwide Web.

A former assistant secretary of the Treasury and deputy assistant to the president and deputy national security adviser, Zarate's "Treasury's War" is a griping electronic whodunit in a constantly changing environment where inequalities are widening and where technology is destroying more jobs than it creates.

Terrorists and organized criminals use cyberspace speed, secrecy and anonymity in a borderless electronic universe where everything moves at the speed of light -- from self-radicalization and fraud to cyber weapons training and illicit financing.

Al-Qaida and its Associated Movements around the world raise money online where cyberfraud is a global criminal enterprise.

They manage criminal syndicates that acquire thousands of credit cards, withdraw small amounts from each one, ranging from $10-$50, then return them as if they had never been stolen.

The victims invariably keep quiet, only too happy to get their electronic credit cards back on line. Millions of customers don't even notice the loss.

A recent demonstration moved 100 terabits per second through ether-space. Detecting who's doing what to whom at such speeds and then redirecting traffic to foil cyberterrorists is the challenge that cyber sleuths face round the clock, 365 days a year.

Zarate, a senior adviser at the Center for Strategic and International Studies, is a chief architect of modern financial warfare for the U.S. government.

His "Treasury's War" takes the reader into the shadowy world where banks and U.S. Treasury tools come together to foil terrorists and to influence geopolitical outcomes.

From his Treasury and White House offices, Zarate, with a dedicated group of Treasury officials, designed and then led a secret financial war against America's enemies.

This is the first book that lifts the veil of secrecy on the financial power they marshaled against America's enemies.

The financial and cyber warriors, says Zarate, "created an international financial environment in which the private sector's bottom line dovetailed directly with U.S. national security interests -- with the goal of isolating rogues from the legitimate financial system."

The global terrorist funding and illicit financial networks range from the slaughter of elephants (tusks go for $50,000 and up) and rhinoceros (a single horn fetches up to $30,000) in Africa to the heroin trade in Afghanistan.

The United States and its closest allies are also engaged in a new kind of electronic warfare against the financial networks of rogue regimes -- everything from nuclear proliferators to criminal syndicates and their links with transnational terrorist networks.

Zarate takes the reader behind the scenes to explain how the group he led redefined the U.S. Treasury's role, "and used its unique powers, relationships and reputation to apply financial pressure against America's enemies."

The goal was -- and is now 24/7 -- to isolate rogues from the legitimate international financial system. And in so doing, created "a new brand of financial power (that) leveraged the private sector and created an international financial environment in which the private sector's bottom line dovetailed directly with U.S. national security interests."

Treasury and its new tools, Zarate explains in "Treasury's War," soon became critical in all the "central geopolitical challenges facing the United States, including terrorism, nuclear proliferation, and regimes in North Korea, Iran, Syria, Lebanon, Iraq and Cuba."

In addition to CSIS, Zarate is senior national security analyst for CBS News and is a visiting lecturer of law at the Harvard Law School. He was the first assistant secretary of the Treasury for terrorist financing and financial crimes.

Zarate then moved to the White House (under George W. Bush) where he served as deputy assistant to the president and deputy national security adviser for combating terrorism and contraband finance.

He is one of very few speakers who can address immensely complex issues of high-level strategic concern coupled with the intricacies of the financial methods of fighting terrorism.

Zarate is still using the skills he took to the White House -- for the private sector as a consultant.

There is still one critically important part of the electronic puzzle that eludes the combined forces of the electronic Kojak/Columbo/Poirot/Scarpetta/Holmes network. It's the informal, handshake ways of moving money, including Hawala. And Hawala's origins are found in texts of Islamic law that date to the eighth century.

In more recent times, Hawala is a round-the-clock system from scores of pay phones or mobiles in Pakistan, Yemen or any Persian Gulf country at predetermined times to say, for example, "Uncle Jack will airfreight your new suit Friday." Translation: The man who introduces himself as Uncle Jack is good to go with $10,000"

Similar amounts will be conveyed anonymously from these same countries to U.S. numbers. By the end of the year, the amounts usually balance out. If not, the discrepancy is carried over to the next year.

It's money transfer without money movement by word of mouth from one cellphone to another thousands of miles away. Mutual trust is the key ingredient.

After more than a decade of counter-terrorist and anti-money laundering efforts, it is clear that the Hawala code of secrecy survives countless attempts to dismantle it.

The U.S. government tried to regulate and infiltrate Hawala through hawaladars, the bearded ones who sit cross legged on a small rug behind a wooden stand in a dusty unpaved street.

In Quetta, the capital of Baluchistan in Pakistan, friends escorted this reporter to a long line of Hawala stalls. In one of them, different currencies, including dollars, stood in neat stacks next to the hawaladar's baggy pants. Armed guards stood on either side.

Hawala honor system transactions move a lot faster than cashing a check in a Pakistani bank. The old and new methods of moving money may be converging, making the challenge of countering terrorist and illicit finance all the more challenging in the 21st century.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
All governments hack secret data: Huawei
Sydney (AFP) May 29, 2013
Using the Internet to spy and steal sensitive data is standard practice by all countries, according to the security chief of controversial Chinese telecoms giant Huawei. The comments published Wednesday follow allegations that Chinese hackers gained access to secret designs for a slew of sophisticated US weapons programmes, and stole the blueprints for Australia's new intelligence agency hea ... read more


CYBER WARS
Colorado's new alga may be a source of biofuel production

European and US Cellulase Patents granted to Direvo Industrial Biotechnology

Shanghai sees biofuel gold in recycled cooking oil

Georgia Power adds biomass capacity

CYBER WARS
Principles of locomotion in confined spaces could help robot teams work underground

Robots learn to take a proper handoff by following digitized human examples

Wayne State University researcher's technique helps robotic vehicles find their way, help humans

MakerBot and Robohand

CYBER WARS
Britain to back EU emissions quotas, oppose renewables targets

SC Electric Awarded to Upgrade 585 MW Wind Farm in Texas

Solar Wind Energy Tower Receives Patent For Atmospheric Energy Extraction Device

Raytheon using Wind Farm Mitigation kits across Dutch air bases

CYBER WARS
Monitoring system can detect dangerous fatigue in mine truck driver

Electric cars slow to gain traction in Germany

Space drives e-mobility

Better Place electric car firm to be dissolved

CYBER WARS
Saudi Arabia, Iran contest OPEC leadership

$100 billion in LNG investment at risk in Australia

Saudi king promotes son in defense shuffle

The World's First Full Color 3D Desktop Printer

CYBER WARS
S. Korea halts two more reactors over faulty parts

UAE begins construction of second nuclear reactor

Areva vows to stay in Niger despite uranium mine attack

S. Korea halts two more reactors over faulty parts

CYBER WARS
EU emitted 3.3% less greenhouse gas in 2011: report

Energy - Balancing the Bonanza: Interview with Mark Thoma

Most Energy Execs Indicate Potential For US Energy Independence By 2030

Renewables the light at the end of the power price tunnel

CYBER WARS
Study explores 100 year increase in forestry diseases

Drought makes Borneo's trees flower at the same time

Reforestation study shows trade-offs between water, carbon and timber

Amazon River exhales virtually all carbon taken up by rain forest




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement