DEBKAfile Special Report October 22, 2016
The large-scale cyberattack on October 21 used millions of internet-connected devices to flood the infrastructure of one of the biggest internet routing companies in the US with malicious traffic until it crashed. .
DEBKAfile Exclusive Report August 11, 2016
It is also possible that engineers fixing a small local malfunction set off a domino series of hitches.
DEBKAfile Exclusive Analysis July 26, 2016
debkafile's intelligence and cyber defense sources:The hacking and leak of 20,000 DNC emails were almost certainly not carried out by Russian intelligence, more likely by party opponents of Hillary Clinton.
DEBKAfile Exclusive Report May 19, 2016
In the center of Iranian cyber warfare system is the motivation to cause damage.
DEBKAfile Exclusive Report February 11, 2016
Because offensive and defense efforts have many similarities, they are pooling their forces, resources and abilities for their mutual benefit. Hence the merger of signal intelligence divisions responsible for foreign espionage, and the information security divisions responsible for protecting the computer infrastructure,
DEBKAfile Exclusive Report January 26, 2016
A cyber defense war room was integrated for the first time in one of Israel’s large-scale national military exercises which took place last week. To meet the perils of cyber warfare, IDF Chief of Staff Lt. Gen. Gady Eisenkot, has established a new Cyber Defense Brigade, assigning it to two branches: Military Intelligence and the Signals Corps. debkafile’s cyber experts say that a single IDF cyber arm would better serve to pull together the countless bodies facing the very real threat to the country.
DEBKAfile Exclusive Report December 31, 2015
Carter has undertaken the mission impossible of revamping the US intelligence community for the new priority of cyber war on ISIS. He must write new rules of intra-agency engagement.
DEBKAfile Exclusive Report October 22, 2015
The elusiveness of an identifiable terrorist leader is further splintering Palestinian communities:
DEBKAfile Exclusive Report October 8, 2015
The Russians have planted a brand-new electronic system atop a Syrian mountain to block all US aerial, naval and ground activity in the country. It also impairs IDF defensive operations and communications on the Golan and northern Israel.
DEBKAfile Exclusive Report August 6, 2015
Washington is hamstrung from retaliating for Chinese cyber aggression against US computer systems by a) not having a smoking gun, and b) lack of viable options.
DEBKAfile Special Report June 14, 2015
If the breach of the Office of Personnel Management (OPM) was conducted by hackers linked to China, as suspected, the secrets of an estimated 41 million US federal employees were laid bare in what may have been the biggest data base theft in cyber history. debkafile: That breach is still ongoing. More malware is buried in the OPM’s infrastructure, ready for a remote signal from the hackers’ command and control centers working for China.
DEBKAfile Exclusive Report April 2, 2015
Iran displayed exceptional cyber war skills by blacking out most of Turkey’s cities for twelve hours to punish Turkey for his policy shift towards the Saudi-led Sunni coalition.
DEBKAfile Exclusive Report March 15, 2015
This report inaugurates debkafile’s new column which, under the heading The Cyber Dimension, will appear regularly and keep our readers abreast of novel events in this fast-developing field. The least appreciated potential cyber threat comes from toy drones in terrorist hands. No counter-measures have been developed against such UAV intrusions as those seen over the White House and Elysée.
DEBKAfile Exclusive Report March 12, 2015
Brennan has launched a major reform program for the CIA with a radical restructuring of separate units for more integration, less wasteful overlaps, and the focusing on resources on the rising menaces of the digital age and cyber warfare.
DEBKAfile Exclusive Analysis January 16, 2015
In the last two days, 25 jihadi suspects were rounded up and secret cells broken down in Belgium, France and Germany. But these counter-terror operations lifted only corners of the Islamist terrorist network of active cells spread across Europe by dedicated killers, armed to the teeth and expertly trained in Syria, Iraq or Afghanistan in the skills of mass murder. debkafile: notes that operational cooperation among Europe’s intelligence and security services is far too rare and a central continental anti-terror mechanism for shared strategy and intelligence sorely missing.
DEBKAfile Exclusive Report December 23, 2014
The hacking attack on Sony most likely had a Sony insider accomplice, says debkafile - a staff member with high security cover and direct access to the company’s computers. Finding this culprit and establishing his (or her) ties to North Korea would give President Obama evidence of Pyongyang’s culpability. But the US is rightly walking on eggs, lest a frontal collision cause more damage.
DEBKAfile Exclusive Report June 13, 2014
NSA capability to infiltrate German cellphone and online networks is implanted in devices before they reach users.
DEBKAfile DEBKA Weekly June 12, 2014
Maj. Gen. (res.) Professor Yitzhak Ben-Yisrael, a retired senior developer of combat measures for the Israeli defense establishment, was the first military official to name the exact targets chosen for the Stuxnet attack, which ravaged Iran’s nuclear program in the years 2009-2010. He also broke through the US and Israeli wall of silence, to reveal the routes available for reaching those targets, and how the virus was planted, with great success.