-
Tracking Cyberspies Through the Web Wilderness
An article about the use of Palantir for cyber forensics work.
-
Gloomy prospects for domestic Linux industry – Annotated
Looks like that super hardened OS that has supposedly locked the U.S. out of cyber warfare, that was supposedly developed by the Chinese, that is supposedly better because it’s not open source, was actually plagiarized from an open source project. Paging Dr. Coleman of Technolytics: you have some ‘splaining’ to do!
-
the Kylin operating system – which is funded by the National 863 High-Tech Program – was found to have plagiarized from the FreeBSD5.3. An anonymous internet user, who goes by the handle name “Dancefire”, pointed out similarities between the two systems reached 99.45 percent.
-
The Kylin event revealed a problem in China’s open source software investment. Many Chinese now begin to suspect the legitimacy of domestic open source products.
- Luckily the U.S. cybersecurity community sitll has faith in them. So much so that Kylin has them crapping their pants about supposedly being locked out of cyber warfare! – post by TransTracker
-
-
China blocks U.S. from cyber warfare – Annotated
-
China has developed more secure operating software for its tens of millions of computers and is already installing it on government and military systems, hoping to make Beijing’s networks impenetrable to U.S. military and intelligence agencies.
The secure operating system, known as Kylin, was disclosed to Congress during recent hearings that provided new details on how China’s government is preparing to wage cyberwarfare with the United States.
“We are in the early stages of a cyber arms race and need to respond accordingly,” said Kevin G. Coleman, a private security specialist who advises the government on cybersecurity. He discussed Kylin during a hearing of the U.S. China Economic and Security Review Commission on April 30.
The deployment of Kylin is significant, Mr. Coleman said, because the system has “hardened” key Chinese servers. U.S. offensive cyberwar capabilities have been focused on getting into Chinese government and military computers outfitted with less secure operating systems like those made by Microsoft Corp.
“This action also made our offensive cybercapabilities ineffective against them, given the cyberweapons were designed to be used against Linux, UNIX and Windows,” he said.
- So wait…suddenly, a foreign country developing something more secure than Windows (is it really that hard to do?) constitutes a major security threat? – post by TransTracker
-
Mr. Coleman, a computer security specialist at Technolytics and a consultant to the director of national intelligence and U.S. Strategic Command, said Chinese state or state-affiliated entities are on a wartime footing in seeking electronic information from the U.S. government, contractors and industrial computer networks.
Mr. Coleman said in an interview that China’s Kylin system was under development since 2001 and the first computers to use it are government and military servers that were converted beginning in 2007.
-
U.S. operating system software, including Microsoft, used open-source and offshore code that makes it less secure and vulnerable to software “trap doors” that could allow access in wartime, he explained.
- Open-source is implied to be part of the problem, as inherently less secure. – post by TransTracker
-
China, based on state-approved writings, thinks the United States is “already is carrying out offensive cyberespionage and exploitation against China,” Mr. Coleman said.
In response, China is taking steps to protect its own computer and information networks so that it can “go on the offensive,” he said.
- This is the classic “mirroring the target set” move–i.e. because they are doing it, we should do it. This is the same pattern of reasoning used to justify the development and adoption of maneuver warfare during the 1980s. Because we feared the Soviets had already done it, we thought we needed to do it too. We respond to asymmetries not with counter-asymmetries, but by assuming that the adversary is correct and then trying to play catch-up. – post by TransTracker
-
Posted from Diigo. The rest of my favorite links are here.