Titan Rain
Titan Rain was a series of coordinated attacks on computer systems in the United States since 2003; they were known to have been ongoing for at least three years. The attacks originated in Guangdong, China. The activity is believed to be associated with a state-sponsored advanced persistent threat. It was given the designation ''Titan Rain'' by the federal government of the United States. Titan Rain hackers gained access to many United States defense contractor computer networks, which were targeted for their sensitive information, including those at Lockheed Martin, Sandia National Laboratories, Redstone Arsenal, and NASA. Attackers The attacks are reported to be the result of actions by People's Liberation Army Unit 61398. These hackers attacked both the US government (Defense Intelligence Agency) and the UK government (Ministry of Defence). In 2006, an "organised Chinese hacking group" shut down a part of the UK House of Commons computer system. The Chinese government has ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Lockheed Martin Aeronautics Discussion
Lockheed (originally spelled Loughead) may refer to: Brands and enterprises * Lockheed Corporation, a former American aircraft manufacturer * Lockheed Martin, formed in 1995 by the merger of Lockheed Corporation and Martin Marietta ** Lockheed Martin Aeronautics ** Lockheed Martin Space Systems * Lockheed Shipbuilding and Construction Company People * Flora Haines Loughead (1855-1943), American writer, farmer, miner * The brothers who founded the original Lockheed Corporation: ** Allan Loughead (1889–1969), American aviation pioneer ** Malcolm Loughead, American aviation pioneer Other uses * Lockheed (comics), a Marvel Comics character * Lockheed Martin Transit Center, in Sunnyvale, California See also * Lochhead Lochhead is a surname shared by several notable people, among them being: * Alex Lochhead (born 1866), Scottish footballer * Andy Lochhead (born 1941), Scottish footballer * Archie Lochhead (1892–1971), Scottish-American banker * Arthur Lochh ..., a surname * ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
SANS Institute
The SANS Institute (officially the Escal Institute of Advanced Technologies) is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security. Programs The SANS Institute sponsors the Internet Storm Center, an internet monitoring system staffed by a community of security practitioners, ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Data Security
Data security or data protection means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach. Technologies Disk encryption Disk encryption refers to encryption technology that encrypts data on a hard disk drive. Disk encryption typically takes form in either software (see disk encryption software) or hardware (see disk encryption hardware). Disk encryption is often referred to as on-the-fly encryption (OTFE) or transparent encryption. Software versus hardware-based mechanisms for protecting data Software-based security solutions encrypt the data to protect it from theft. However, a malicious program or a hacker could corrupt the data to make it unrecoverable, making the system unusable. Hardware-based security solutions prevent read and write access to data, which provides very strong protection against tampering and unauthorized access. Hardware- ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Information Sensitivity
Information sensitivity is the control of access to information or knowledge that might result in loss of an advantage or level of security if disclosed to others. Loss, misuse, modification, or Access control, unauthorized access to sensitive information can adversely affect the privacy or welfare of an individual, trade secrets of a business or even the national security, security and international relations of a nation depending on the level of sensitivity and nature of the information. Non-sensitive information Public information This refers to information that is already a matter of public record or knowledge. With regard to government and private organizations, access to or release of such information may be requested by any member of the public, and there are often formal processes laid out for how to do so. The accessibility of government-held public records is an important part of government transparency, accountability to its citizens, and the values of democracy. Publ ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
National Security
National security, or national defence (national defense in American English), is the security and Defence (military), defence of a sovereign state, including its Citizenship, citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against Offensive (military), military attack, national security is widely understood to include also non-military dimensions, such as the security from terrorism, minimization of crime, economic security, energy security, environmental security, food security, and Computer security, cyber-security. Similarly, national security risks include, in addition to the actions of other State (polity), states, action by violent non-state actors, by narcotic cartels, organized crime, by multinational corporations, and also the effects of natural disasters. Governments rely on a range of measures, including Political power, political, Economic power, economic, and military power, as well as diplomacy, to ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Military Intelligence
Military intelligence is a military discipline that uses information collection and analysis List of intelligence gathering disciplines, approaches to provide guidance and direction to assist Commanding officer, commanders in decision making process, their decisions. This aim is achieved by providing an intelligence analysis, assessment of data from a range of sources, directed towards the commanders' mission requirements or responding to questions as part of operational or campaign planning. To provide an analysis, the commander's information requirements are first identified, which are then incorporated into intelligence collection, analysis, and dissemination. Areas of study may include the operational environment, hostile, friendly and neutral forces, the civilian population in an area of combat operations, and other broader areas of interest. Intelligence activities are conducted at all levels, from tactical to strategic, in peacetime, the period of transition to war, and d ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Espionage Scandals And Incidents
Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information (intelligence). A person who commits espionage on a mission-specific contract is called an ''espionage agent'' or ''spy''. A person who commits espionage as a fully employed officer of a government is called an intelligence officer. Any individual or spy ring (a cooperating group of spies), in the service of a government, company, criminal organization, or independent operation, can commit espionage. The practice is clandestine, as it is by definition unwelcome. In some circumstances, it may be a legal tool of law enforcement and in others, it may be illegal and punishable by law. Espionage is often part of an institutional effort by a government or commercial concern. However, the term tends to be associated with state spying on potential or actual enemies for military purposes. Spying involving corporations is known as corporat ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Hacker Groups
Hacker groups are informal communities that began to flourish in the early 1980s, with the advent of the home computer. Overview Prior to that time, the term ''hacker'' was simply a referral to any computer hobbyist. The hacker groups were out to make names for themselves, and were often spurred on by their own press. This was a heyday of hacking, at a time before there was much law against computer crime. Hacker groups provided access to information and resources, and a place to learn from other members. Hackers could also gain credibility by being affiliated with an elite group. The names of hacker groups often parody large corporations, governments, police and criminals; and often used specialized orthography An orthography is a set of convention (norm), conventions for writing a language, including norms of spelling, punctuation, Word#Word boundaries, word boundaries, capitalization, hyphenation, and Emphasis (typography), emphasis. Most national .... See also * List o ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Stakkato
Philip Gabriel Pettersson, known by the alias Stakkato, is a Swedish hacker and the alleged perpetrator of a worldwide cyber attack known to have occurred from at least December 2003 until May 2005, targeting many sites on the Internet including the US Military, White Sands Missile Range, NASA, a number of US academic institutions (known to include Caltech, Stanford University, San Diego Supercomputer Center, and UIUC), and a number of non-US academic institutions (known to include Uppsala University in Sweden and University College Cork in Ireland) and several other Internet locations. By using locally based kernel exploits (a sophisticated technique that requires a high knowledge level and advanced development skills), Stakkato managed to elevate its user privileges and gain control of various systems within numerous government agencies and private sector enterprises. Via stolen login credentials Stakkato was able to gain access to these systems for well over two years. Final ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Shawn Carpenter
Shawn R. Carpenter is a cyber security analyst and whistleblower (previously employed by Sandia National Laboratories) who tracked down a Chinese cyberespionage ring that is code-named Titan Rain by the FBI. He came to national attention when his story was reported on in the September 5, 2005 issue of ''Time'' magazine. Early life Carpenter served in the United States Navy for six years. It was also reported that he was a retired Army major. https://content.time.com/time/press_releases/article/0,8599,1098911,00.html Titan Rain Initial discovery Carpenter was an employee of Sandia National Laboratories, investigating security breaches in its networks. However, upon tracking several breaches of Sandia, Lockheed Martin Corporation, Redstone Arsenal, and even NASA, dating back to 2003, Carpenter noticed patterns that began to appear to link the attacks to a single group. He was impressed by the meticulous, voracious, and swift manner (sometimes completed in less than 30 minutes) in ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Operation Aurora
Operation Aurora was a series of cyber attacks performed by advanced persistent threats such as the Elderwood Group based in Beijing, China, with associations with the People's Liberation Army. First disclosed publicly by Google (one of the victims) on January 12, 2010, by a weblog post, the attacks began in mid-2009 and continued through December 2009. The attack was directed at dozens of other organizations, of which Adobe Systems, Akamai Technologies, Juniper Networks, and Rackspace have confirmed publicly that they were targeted. According to media reports, Yahoo, Symantec, Northrop Grumman, Morgan Stanley, and Dow Chemical were also among the targets. As a result of the attack, Google stated in its weblog that it plans to operate a completely uncensored version of its search engine in China "within the law, if at all," and acknowledged that if this is not possible, it may quit China and close its Chinese offices. Official Chinese sources claimed this was part of a strate ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Moonlight Maze
Moonlight Maze was a data breach of classified U.S. government information lasting from 1996 to 1998. It represents one of the first widely known cyber espionage campaigns in world history. It was even classified as an Advanced Persistent Threat after two years of constant assault. The investigators claimed that if all the information stolen was printed out and stacked, it would be three times the height of the Washington Monument, which is tall. History It started in 1996 and affected NASA, the Pentagon, military contractors, civilian academics, the DOE, and numerous other American government agencies. By the end of 1999, the Moonlight Maze task force was composed of forty specialists from law enforcement, military, and government. Information recovered in the hack may have included classified naval codes and data on missile-guidance systems, as well as other highly valued military data. The attackers also stole tens of thousands of files containing technical research, mili ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |