#Cyber Warfare
Explore tagged Tumblr posts
blorbocedes · 4 months ago
Text
if 3000+ devices exploded simultaneously and thousands got injured, 37+ ppl died in usa or london or france anywhere in the imperial core this website would be talking about it nonstop. my coworkers' relatives are lebanese and he hasn't been able to contact them because everyone's nervous of using anything with a lithium battery. the kids from diaspora are teaching their parents how to turn off find my phone and airdrop and other geolocating options. it's absurd to me people are carrying on like its normal, or just don't care cause c'mon ppl blow up in the middle east all the time, right?
28K notes · View notes
disk28 · 7 months ago
Text
Tumblr media
615 notes · View notes
sprites4ever · 4 months ago
Text
So, the Mossad somehow managed to hack Lebanese Hezbollah pagers so thoroughly that they caused them to explode (most likely by overdrawing the battery).
https://www.reuters.com/world/middle-east/dozens-hezbollah-members-wounded-lebanon-when-pagers-exploded-sources-witnesses-2024-09-17/
I can hear Elon Musk screaming at the implications this has for NeuraLink all the way here in Germany.
7 notes · View notes
actualadvocacybruh · 4 months ago
Text
People being shocked that a big American conservative media network was actively being funded by Russia shows how little attention they actually pay to such thing
Many experts in cyber, hybrid and intelligence warfare have said for DECADES now that Russia does fund groups in other nations to produce propaganda for them shining a good light on Russia while attacking progressive values and anything even remotely anti authoritarian
If you actually watched the content they put out it was clear from the start they had an agenda and that someone was footing the bill with interests in Russia or for the Russian oligarchs
And it’s pretty sad that I have to point at the FBI and CIA and tell leftists “they told this YEARS AGO”
Also the “we didn’t know who funded us” is already being shoved as a narrative and it’s BS
3 notes · View notes
odinsblog · 1 year ago
Text
Tumblr media
(source)
In June 2019, three Israeli computer engineers arrived at a New Jersey building used by the F.B.I. They unpacked dozens of computer servers, arranging them on tall racks in an isolated room. As they set up the equipment, the engineers made a series of calls to their bosses in Herzliya, a Tel Aviv suburb, at the headquarters for NSO Group, the world’s most notorious maker of spyware. Then, with their equipment in place, they began testing.
The F.B.I. had bought a version of Pegasus, NSO’s premier spying tool. For nearly a decade, the Israeli firm had been selling its surveillance software on a subscription basis to law-enforcement and intelligence agencies around the world, promising that it could do what no one else — not a private company, not even a state intelligence service — could do: consistently and reliably crack the encrypted communications of any iPhone or Android smartphone.
Since NSO had introduced Pegasus to the global market in 2011, it had helped Mexican authorities capture Joaquín Guzmán Loera, the drug lord known as El Chapo. European investigators have quietly used Pegasus to thwart terrorist plots, fight organized crime and, in one case, take down a global child-abuse ring, identifying dozens of suspects in more than 40 countries. In a broader sense, NSO’s products seemed to solve one of the biggest problems facing law-enforcement and intelligence agencies in the 21st century: that criminals and terrorists had better technology for encrypting their communications than investigators had to decrypt them. The criminal world had gone dark even as it was increasingly going global.
But by the time the company’s engineers walked through the door of the New Jersey facility in 2019, the many abuses of Pegasus had also been well documented. Mexico deployed the software not just against gangsters but also against journalists and political dissidents. The United Arab Emirates used the software to hack the phone of a civil rights activist whom the government threw in jail. Saudi Arabia used it against women’s rights activists and, according to a lawsuit filed by a Saudi dissident, to spy on communications with Jamal Khashoggi, a columnist for The Washington Post, whom Saudi operatives killed and dismembered in Istanbul in 2018.
(continue reading)
15 notes · View notes
weareatwar · 2 years ago
Text
The Hacker's War's
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
6 notes · View notes
archtroop · 1 year ago
Text
I'll Google Translate this one became this one is incredibly interesting and fascinating, especially for people who spend a lot of time online.
"An Israeli cyber group announced that it had taken down a Hamas news website: "We will continue to act with a heavy hand"
WeRedEvils is a group of Israeli cyber warriors that was established after the start of the war and operates in the cyber arena against Hamas and its affiliates, and yesterday announced that it had taken down a major news site affiliated with Hamas, Gaza Now. In a conversation with mako, one of the group's managers tells about its activities: "We hacked into the phones and WhatsApp accounts of journalists, terrorists and Hamas officials and published databases of 40 million Iranians"
The group of cyber warriors @WeRedEvils yesterday attacked the GazaNow site, the main news site of the terrorist organization Hamas, which publishes anti-Israeli content, and information about IDF and intelligence operations. The site went down for 18 hours, came back up for a short time and is now working again, but according to the group's servers are expected to collapse within hours again.
WeRedEvils are a group of about 80 Israeli cyber warriors, who have been working since the beginning of the war on a voluntary basis, and take part in the war aid effort. These are former intelligence unit 8200, owners of major cyber companies in Israel, private investigators and Red Hat hackers. The group is closed, and everyone who enters it has undergone a full scan, according to P. G., one of the group's managers, who served as the IDF spokesman and deals with cyber, and asked to remain anonymous. According to him, the group is divided into several teams - intelligence and information gathering, attack, marketing and advertising and social media.
"We hacked and took down Hamas's largest news site, we hacked into the phones and WhatsApp accounts of Hamas journalists, terrorists and senior Hamas officials and published databases of 40 million Iranians," says G. to Mako. "We blocked crypto accounts and websites for receiving funds that Hamas established, we closed a website for them that raised half a million dollars. We took down the website of the Hamas Employment Ministry and we will continue to act with a tough hand."
According to him, "We will continue to attack. We have a list of 200 very important sites for Hamas that we will not release until we disable them."
Does the government help you or do you work alone?
G: "The government doesn't help, because no one has a way to contact us. Right now I'm talking to you from a servant who sits on another country, purely because one of the managers asked, and we have enough money and tools to use it."
Did you give messages to Hamas?
"We gave a message to one of the journalists to stop publishing, otherwise we hack into his phone and WhatsApp, he did not respond to our requests and we attacked and stopped his activity. We are not giving a message to anyone anymore, we attack and stop activities that the SHABACH is unable to do."
This is not the only initiative by cyber experts to attack Hamas government websites, and there are different groups, isolated from each other, that operate in the field. "All the websites of Hamas and their supporters have fallen in recent days, and will fall again if the sites are brought back online," says one of the Israelis active on the issue.
And what about cyber attacks on Israel? At the beginning of the war, rumors were spread through the WhatsApp groups about a cyber attack on Israel, but the national cyber system emphasized that no such attack existed. Since then there have been attempts to break into Israeli websites, but no significant achievement has been recorded for Hamas on this level.
[On a personal note I cannot in any way verify or deny this, apart from it being on a large popular mass media outlet. BUT, the 8200 unit are the cyber intelligence of IDF and are highly regarded. A group of them formed a resistance to the current government and have been acting on that front for months. So it may be them or their colleagues]
3 notes · View notes
gwydionmisha · 1 year ago
Text
China’s cyber army is invading critical U.S. services
2 notes · View notes
thingsfromthehead · 3 months ago
Text
Tumblr media
0 notes
egirl4rent · 3 months ago
Text
eGirl4Rent PMC: Official Press Release – Call of Duty Mobile Recruitment
eGirl4Rent PMC: Official Press Release – Call of Duty Mobile Recruitment For Immediate Release California HQ, eGirl4Rent PMC – We are thrilled to announce that Paladin Jade and the eGirl4Rent Paladinarinas are actively recruiting for Call of Duty Mobile, where we merge our elite skills as a private military corporation with the competitive, adrenaline-pumping action of eSports. Yes, you heard…
0 notes
blorbocedes · 4 months ago
Note
okay I’m really sorry if this comes across as tone deaf or ignorant or anything but I know what’s happening to Gaza but you’re the first person I’ve seen mention Lebanon. What’s happening?
tldr: israel exploded 4000+ pagers and walkie talkies all at once in lebanon, most likely contaminating a shipment and rigging it. thousands injured, 37+ dead. western media is praising the act as coordinated, targeted attack on hezbollah. doctors (who primarily use pagers), civilians, 10 year old children playing with their father's pager lost an eye, finger, died. millions in lebanon currently afraid to use their devices in case it might explode, the definition of a terrorist attack on a civilian population
189 notes · View notes
disk28 · 5 months ago
Text
Tumblr media
162 notes · View notes
code-of-conflict · 4 months ago
Text
AI, Cybersecurity, and National Sovereignty
Introduction: The Role of AI in Cybersecurity
As artificial intelligence (AI) becomes integral to national security, cyber threats increasingly exploit AI-driven vulnerabilities. Both India and China face the challenge of securing their cyber infrastructure while mitigating espionage and offensive cyber operations. The risks include large-scale data breaches, intellectual property theft, and attacks on critical infrastructure. With AI enhancing the scope and speed of cyberattacks, national sovereignty is increasingly threatened by cyber vulnerabilities that transcend borders.
AI-Driven Cyber Threats and Espionage
China has heavily integrated AI into its cyber capabilities, using it to enhance espionage, cyber warfare, and information manipulation. AI-enabled cyber operations allow China to gather vast amounts of intelligence data through advanced hacking techniques. These tools are often deployed through state-sponsored groups, exploiting zero-day vulnerabilities and penetrating government and corporate networks worldwide​.
For example, in 2021, China was accused of orchestrating a large-scale cyber-attack targeting Microsoft Exchange servers, affecting over 30,000 organizations globally. This attack was designed to facilitate espionage, capturing sensitive information ranging from corporate intellectual property to government data​. China's cyber operations underscore the increasing use of AI in orchestrating sophisticated, large-scale intrusions that threaten national sovereignty.
India, while lagging behind China in offensive cyber capabilities, faces persistent cyber espionage threats from Chinese state-sponsored actors. The most notable incidents occurred during the 2020 India-China border standoff, where Chinese hackers targeted India's critical infrastructure, including power grids and government networks​. These attacks highlight the vulnerabilities in India's cybersecurity architecture and its need to enhance AI-driven defenses.
Vulnerabilities and National Sovereignty
AI-driven cyber threats pose significant risks to national sovereignty. For India, the challenges are magnified by the relatively underdeveloped nature of its cybersecurity infrastructure. Although the establishment of the Defence Cyber Agency in 2018 marked a step forward, India still lacks the offensive cyber capabilities and AI sophistication of China​. India's defensive posture primarily focuses on securing critical infrastructure and mitigating cyber intrusions, but it remains vulnerable to cyber espionage and attacks on its digital economy.
China's integration of AI into both military and civilian cyber systems, through its Military-Civil Fusion policy, has bolstered its ability to conduct large-scale cyber operations with deniability. This fusion allows China to leverage private sector innovations for military purposes, making it a formidable cyber power in the Indo-Pacific region​.
Case Studies: Cyber Confrontations
In 2019, a significant cyberattack targeted India's Kudankulam Nuclear Power Plant, which was traced back to North Korea, but was believed to be part of a broader effort involving Chinese actors. This incident highlighted the potential for AI-enhanced malware to target critical infrastructure, posing severe risks to national security.
Similarly, the 2020 Mumbai blackout, reportedly linked to Chinese hackers, emphasized how AI-driven cyberattacks can disrupt essential services, creating chaos in times of geopolitical tension​. These incidents illustrate how AI-driven cyber capabilities are increasingly weaponized, posing severe risks to India's sovereignty and its ability to protect critical infrastructure.
Implications for Future Conflicts
As AI continues to evolve, the cyber domain will become a primary battleground in future conflicts between India and China. AI-enhanced cyber operations provide both nations with the ability to conduct espionage, sabotage, and information warfare remotely, without direct military engagement. For China, these tools are integral to its broader geopolitical strategy, while India must develop its AI and cybersecurity capabilities to protect its national sovereignty and counteract cyber threats​.
Conclusion
The integration of AI into cybersecurity poses both opportunities and challenges for India and China. While China has aggressively developed AI-driven cyber capabilities, India faces an urgent need to enhance its defenses and develop its offensive cyber tools. As cyberattacks become more sophisticated, driven by AI, both nations will continue to grapple with the implications of these developments on national sovereignty and global security.
0 notes
newspatron · 5 months ago
Text
5th Generation Warfare Tactics: 7 Mind-Blowing Ways It's Changing the World
hat are your thoughts on 5th generation warfare? Share your insights and questions in the comments below! Let's spark a conversation!
Hey there, fellow netizens and curious cats! 👋 Kumar here, your trusty guide through the digital wilderness. Today, we’re diving headfirst into the mind-bending world of 5th generation warfare tactics. Forget the old-school images of tanks and trenches; this battlefield is all about memes, manipulation, and mind games. 🤯[Facebook – Twitter – Insta] We’re about to embark on a journey through the…
0 notes
davidaugust · 5 months ago
Text
Iran is trying to influence the U.S. presidential election. Recently, groups linked to the Iranian government have been more active.
They’re spreading messages on election topics to create arguments or sway voters, especially in key states.
They’re also gathering information on political campaigns, which Microsoft believes is to influence future elections as well.
0 notes
defensenow · 5 months ago
Text
youtube
0 notes