Author Archives: cyberkrieger

Wiki Leaks hacked?

The online website WikiLeaks on Sunday blamed the temporary outage of its site on a denial-of-service attack by unknown hackers trying to prevent its release of hundreds of thousands of classified U.S. State Department documents.

U.S. Shuts Down Web Sites in Piracy Crackdown

In what appears to be the latest phase of a far-reaching federal crackdown on online piracy of music and movies, the Web addresses of a number of sites that facilitate illegal file-sharing were seized this week by Immigration and Customs Enforcement, a division of the Department of Homeland Security.

What If Nuclear Terrorism Were Just a Mouse Click Away?

Is hacking into a nuclear weapons system more daunting a challenge than acquiring or developing a nuclear weapons program? Wait, isn’t the computer component of nuclear command and control a closed network? Yes, but…

The militarization of the Internet

Someone needs to take a good hard look at the Internet surveillance stories being strategically placed on the front page of the New York Times.

DHS: Cyber defenders will respect civil rights

A high-ranking Homeland Security official says the agency will protect Americans’ civil liberties and privacy while it partners with the military to protect the nation’s computer networks.

China Trumps U.S., Creates World’s FASTEST Computer

China is solidifying its tech superpower status. China’s Tianhe-1A supercomputer has bumped the U.S.’s Jaguar from its top spot as the world’s fastest supercomputer.

LimeWire File Sharing Halted By Injunction

Lime Group, whose LimeWire software has allowed people to share songs and other files over the Internet, received a federal injunction Tuesday to disable key parts of its service.

Cyberwarfare: US Seeks To Shut Down Enemy Power Grids

When an extremist group shuts down US infrastructure, it’s labeled a terrorist attack, but when the US does it to another country, it’s merely cybersecurity.

Cyber Crime and Information Warfare: A 30-Year History

What follows are some highlights in the 30-year history of hacking and information warfare.