ISIS use of Cyber Presentation

Very interesting presentation coming up at The George Washington University on the terror group ISIS’ use of social media and cyber attacks:

ISIS Cyber

For more information visit the college’s website.

Advertisements

China Demos Hacker obtained Stealth Tech during Obama Visit

During the Asia-Pacific Economic Cooperation meeting in Beijing, President Obama took China to task about its cyber espionage campaign against Western technology creators and innovators. And China responded by showing off the fruit of their hacker’s labor by test flying the J-31 Stealth Fighter prototype.

The J-31 (seen above) and China’s other stealth fighter, the J-20, both allegedly contain stealth technology stolen from US military contractors. Adding insult to injury, China plans on exporting the stealth fighter to nations that can not afford the American F-35.

Electronic espionage has allowed China to make very rapid advances in military & research fields and they show no sign of slowing down amidst political pressure. If anything they are expanding their attempts at an alarming rate.

As we haven’t had a lot of luck keeping Chinese hackers out of US systems, maybe it is time to create fake honeypot systems for them to attack that contain purposely flawed military designs…