Tuesday, November 23, 2010

North Korean Artillery Attack on a Southern Island

North Korea and South Korea have reportedly traded artillery fire Nov. 23 across the disputed Northern Limit Line (NLL) in the Yellow Sea to the west of the peninsula. Though details are still sketchy, South Korean news reports indicate that around 2:30 p.m. local time, North Korean artillery shells began landing in the waters around Yeonpyeongdo, one of the South Korean-controlled islands just south of the NLL. North Korea has reportedly fired as many as 200 rounds, some of which struck the island, injuring at least 10 South Korean soldiers, damaging buildings and setting fire to a mountainside. South Korea responded by firing some 80 shells of its own toward North Korea, dispatching F-16 fighter jets to the area and raising the military alert to its highest level.
South Korean President Lee Myung Bak has convened an emergency Cabinet meeting, and Seoul is determining whether to evacuate South Koreans working at inter-Korean facilities in North Korea. The barrage from North Korea was continuing at 4 p.m. Military activity appears to be ongoing at this point, and the South Korean Joint Chiefs of Staff are meeting on the issue. No doubt North Korea’s leadership is also convening.
The North Korean attack comes as South Korea’s annual Hoguk military exercises are under way. The exercises — set to last nine days and including as many as 70,000 personnel from all branches of the South Korean military — span from sites in the Yellow Sea including Yeonpyeongdo to Seoul and other areas on the peninsula itself. The drills have focused in particular on cross-service coordination and cooperation in recent years.


North Korean Artillery Attack on a Southern Island
Low-level border skirmishes across the demilitarized zone and particularly the NLL are not uncommon even at the scale of artillery fire. In March, the South Korean naval corvette ChonAn was sunk in the area by what is broadly suspected to have been a North Korean torpedo, taking tensions to a peak in recent years. Nov. 22 also saw South Korean rhetoric about accepting the return of U.S. tactical nuclear weapons to the peninsula, though the United States said it has no plans at present to support such a redeployment.
While the South Korean reprisals — both artillery fire in response by self-propelled K-9 artillery and the scrambling of aircraft — thus far appear perfectly consistent with South Korean standard operating procedures, the sustained shelling of a populated island by North Korea would mark a deliberate and noteworthy escalation.

The incident comes amid renewed talk of North Korea’s nuclear program, including revelations of an active uranium-enrichment program, and amid rumors of North Korean preparations for another nuclear test. But North Korea also on Nov. 22 sent a list of delegates to Seoul for Red Cross talks with South Korea, a move reciprocated by the South, ahead of planned talks in South Korea set for Thursday. The timing of the North’s firing at Yeonpyeongdo, then, seems to contradict the other actions currently under way in inter-Korean relations. With the ongoing leadership transition in North Korea, there have been rumors of discontent within the military, and the current actions may reflect miscommunications or worse within the North’s command-and-control structure, or disagreements within the North Korean leadership.

Thursday, November 11, 2010

On Facebook military espionage and data theft.


BERNA - According to the Swiss institutions, in the first half of 2010 has been a significant increase in worldwide cases of espionage and theft of computer data.
MELANI Semi-annual report 2010/1:
http://www.melani.admin.ch/dokumentation/00123/00124/01119/index.html?lang=en&download=NHzLpZeg7t,lnp6I0NTU042l2Z6ln1ad1IZn4Z2qZpnO2Yuq2Z6gpJCDdIF7gGym162epYbg2c_JjKbNoKSn6A--

Targeted attacks.
In the semi-annual report published today, Reporting and Analysis Centre for Information Assurance MELANI, lets go to statements of concern, "the largest firms in the ICT sector such as Google and Adobe have been the target of targeted cyber-attacks, assuming they leave clues In these cases, a common infrastructure is used, [...] it is very likely that these attacks have been hiding behind the same hand. " A detailed report explaining the reasons.

For the Central, behind the unauthorized acquisition of data "lie purely financial reasons or criminal interests but also the intelligence of the state", something that the press does not hesitate to describe as "a threat mainly to businesses and public services."
It is unclear, however, that virtually all so-called cyber attacks that come to fruition, can cause the lack of competence of the operators websites - including the corporate or government - or little attention to the users.
Even a rough culture of cybersecurity, as well as a less naive or hasty technologies by users, nipped in the bud a huge number of violations.

Facebook.
In this regard, MELANI cites the frequent cases of military intelligence that passes without any forcing through Facebook: unsuspecting military mission publish confidential information about positions, locations, and so on, often not even take care to set the minimum countermeasures for the protection of privacy the site provides. Transmitting highly confidential data that, at best, or when not fall into the hands of criminals, they become the property of a private company: Facebook.

But on the popular social networks are also many other confidential data available from industry data, economic, to those on their personal relationships. Data, as mentioned, when intercepted by non-indicated, however, end up legally in the hands of American society and its smoky management policies.

Countermeasures. In addition to a culture of personal security, the best way to avoid risks, to counter the increase in data theft via Internet and email from 2010 where there is suspicion that a Swiss internet address (. Ch) is used to steal private data or to spread malicious software, can and should be blocked.
From June 15, 2010, in fact, the Central MELANI is authorized by the Federal Communications to request the block at the registry of domains (SWITCH).
According to the data in June and August 2010 of 237,000 Swiss examined 145 web pages were infected.

Source: Reporting and Analysis Centre for Information Assurance MELANI