. Medical and Hospital News .




CYBER WARS
Commentary: Tracking cyberterrorists
by Arnaud De Borchgrave
Washington (UPI) May 29, 2013


Taiwan to open new cyberwar unit: report
Taipei (AFP) May 29, 2013 - Taiwan is preparing to launch a fourth cyberwar unit, a local newspaper reported Wednesday, in response to what it claims is a growing security threat from Chinese hackers.

The new unit is scheduled to open on July 1 and will work to counter cyber attacks on government websites, said the Taipei-based newspaper United Evening News.

It will bring to four the number of Taiwanese military units assigned to cyberwar and information-related tasks, added the paper.

The defence ministry declined to comment on the report.

Taiwanese government websites have frequently come under cyber attack from China, usually during disputes between the two sides, military authorities say.

In the six months to June last year, hackers launched more than one million attacks on the website of Taiwan's National Security Bureau (NSB), the Liberty Times reported.

The NSB did not reveal how many of the attacks came from China while saying all hacking attempts were blocked.

But the bureau described the perceived cyber threat from the mainland as "very severe" when asked to evaluate it in parliament two months ago.

"China's cyberwar capabilities were organised by the military and government units, using Internet viruses to attack Taiwan's government, economic and military websites," it said in a report cited by the Liberty Times.

However ties between Taipei and Beijing have improved markedly since Ma Ying-jeou of the China-friendly Kuomintang party came to power in 2008 on a platform of ramping up trade and tourism links with the mainland.

Ma was reelected in January 2012 for a second and final four-year term.

Yet China still considers Taiwan part of its territory awaiting reunification, by force if necessary, even though the island has ruled itself for more than 60 years after their split in 1949 at the end of a civil war.

Tracking, finding and killing Osama bin Laden required unusual skill, intelligence and courage. Tracking al-Qaida's financial conduits through cyberspace is infinitely more difficult.

Network forensics is one of the world's most challenging assignments -- explained in vivid, dramatic detail by Juan C. Zarate, a former super sleuth in the U.S. government's long campaign to find and disrupt al-Qaida's terrorist funding in the Worldwide Web.

A former assistant secretary of the Treasury and deputy assistant to the president and deputy national security adviser, Zarate's "Treasury's War" is a griping electronic whodunit in a constantly changing environment where inequalities are widening and where technology is destroying more jobs than it creates.

Terrorists and organized criminals use cyberspace speed, secrecy and anonymity in a borderless electronic universe where everything moves at the speed of light -- from self-radicalization and fraud to cyber weapons training and illicit financing.

Al-Qaida and its Associated Movements around the world raise money online where cyberfraud is a global criminal enterprise.

They manage criminal syndicates that acquire thousands of credit cards, withdraw small amounts from each one, ranging from $10-$50, then return them as if they had never been stolen.

The victims invariably keep quiet, only too happy to get their electronic credit cards back on line. Millions of customers don't even notice the loss.

A recent demonstration moved 100 terabits per second through ether-space. Detecting who's doing what to whom at such speeds and then redirecting traffic to foil cyberterrorists is the challenge that cyber sleuths face round the clock, 365 days a year.

Zarate, a senior adviser at the Center for Strategic and International Studies, is a chief architect of modern financial warfare for the U.S. government.

His "Treasury's War" takes the reader into the shadowy world where banks and U.S. Treasury tools come together to foil terrorists and to influence geopolitical outcomes.

From his Treasury and White House offices, Zarate, with a dedicated group of Treasury officials, designed and then led a secret financial war against America's enemies.

This is the first book that lifts the veil of secrecy on the financial power they marshaled against America's enemies.

The financial and cyber warriors, says Zarate, "created an international financial environment in which the private sector's bottom line dovetailed directly with U.S. national security interests -- with the goal of isolating rogues from the legitimate financial system."

The global terrorist funding and illicit financial networks range from the slaughter of elephants (tusks go for $50,000 and up) and rhinoceros (a single horn fetches up to $30,000) in Africa to the heroin trade in Afghanistan.

The United States and its closest allies are also engaged in a new kind of electronic warfare against the financial networks of rogue regimes -- everything from nuclear proliferators to criminal syndicates and their links with transnational terrorist networks.

Zarate takes the reader behind the scenes to explain how the group he led redefined the U.S. Treasury's role, "and used its unique powers, relationships and reputation to apply financial pressure against America's enemies."

The goal was -- and is now 24/7 -- to isolate rogues from the legitimate international financial system. And in so doing, created "a new brand of financial power (that) leveraged the private sector and created an international financial environment in which the private sector's bottom line dovetailed directly with U.S. national security interests."

Treasury and its new tools, Zarate explains in "Treasury's War," soon became critical in all the "central geopolitical challenges facing the United States, including terrorism, nuclear proliferation, and regimes in North Korea, Iran, Syria, Lebanon, Iraq and Cuba."

In addition to CSIS, Zarate is senior national security analyst for CBS News and is a visiting lecturer of law at the Harvard Law School. He was the first assistant secretary of the Treasury for terrorist financing and financial crimes.

Zarate then moved to the White House (under George W. Bush) where he served as deputy assistant to the president and deputy national security adviser for combating terrorism and contraband finance.

He is one of very few speakers who can address immensely complex issues of high-level strategic concern coupled with the intricacies of the financial methods of fighting terrorism.

Zarate is still using the skills he took to the White House -- for the private sector as a consultant.

There is still one critically important part of the electronic puzzle that eludes the combined forces of the electronic Kojak/Columbo/Poirot/Scarpetta/Holmes network. It's the informal, handshake ways of moving money, including Hawala. And Hawala's origins are found in texts of Islamic law that date to the eighth century.

In more recent times, Hawala is a round-the-clock system from scores of pay phones or mobiles in Pakistan, Yemen or any Persian Gulf country at predetermined times to say, for example, "Uncle Jack will airfreight your new suit Friday." Translation: The man who introduces himself as Uncle Jack is good to go with $10,000"

Similar amounts will be conveyed anonymously from these same countries to U.S. numbers. By the end of the year, the amounts usually balance out. If not, the discrepancy is carried over to the next year.

It's money transfer without money movement by word of mouth from one cellphone to another thousands of miles away. Mutual trust is the key ingredient.

After more than a decade of counter-terrorist and anti-money laundering efforts, it is clear that the Hawala code of secrecy survives countless attempts to dismantle it.

The U.S. government tried to regulate and infiltrate Hawala through hawaladars, the bearded ones who sit cross legged on a small rug behind a wooden stand in a dusty unpaved street.

In Quetta, the capital of Baluchistan in Pakistan, friends escorted this reporter to a long line of Hawala stalls. In one of them, different currencies, including dollars, stood in neat stacks next to the hawaladar's baggy pants. Armed guards stood on either side.

Hawala honor system transactions move a lot faster than cashing a check in a Pakistani bank. The old and new methods of moving money may be converging, making the challenge of countering terrorist and illicit finance all the more challenging in the 21st century.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review

Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News

Get Our Free Newsletters
Space - Defense - Environment - Energy - Solar - Nuclear

...





CYBER WARS
China steals new Australia spy agency blueprints: report
Sydney (AFP) May 28, 2013
Chinese hackers have stolen top-secret blueprints to Australia's new intelligence agency headquarters, a report said Tuesday, but Foreign Minister Bob Carr insisted ties with Beijing would not be hurt. The Australian Broadcasting Corporation said the documents taken in the cyber hit included cabling layouts for the huge building's security and communications systems, its floor plan, and its ... read more


CYBER WARS
Remembering storm, Obama, Christie again the odd couple

Africa plans emergency force, but can it deliver?

Bill Gates hopeful of more aid from China

Japan nuclear lab accident affected 30: agency

CYBER WARS
GPS solution provides three-minute tsunami alerts

Northrop Grumman Delivers 8,000th LN-100 Inertial Navigation System

NASA Builds Unusual Testbed for Analyzing X-ray Navigation Technologies

Pakistan adopts Chinese rival GPS satellite system

CYBER WARS
Study: African terrain may have pushed humans into walking on two feet

170,000 living in subdivided flats in Hong Kong: study

Monkey teeth help reveal Neanderthal weaning

China newborn rescued from toilet pipe: report

CYBER WARS
Bees tell birds to buzz off

Decoding the Genome of the Camel

New one-step process for designer bacteria

Plants frozen for centuries come back to life

CYBER WARS
Evolution in the blink of an eye

Scientists find chemical that causes 'kidney' failure in mosquitoes

Early progress in antibody protection from deadly flu

Vaccine hopes for hand, foot, mouth disease

CYBER WARS
China ruling party urges political education: ministry

China protest city demands ID to buy T-shirts: media

China migrant population growing, pay rises slowing

China baby's toilet fall accidental: police

CYBER WARS
Report: Belgian army sold helicopters to firm linked to trafficking

US feds 'kidnapped' suspected druglord: Guinea-Bissau

US ships look to net big contraband catches in Pacific

CYBER WARS
IMF cuts 2013 China growth forecast to 'around 7.75%'

Walker's World: Europe's prosperity envy

Walker's World: The trouble with banks.

Outside View: Europe's permanent recession




The content herein, unless otherwise known to be public domain, are Copyright 1995-2012 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement