posted on Jan, 17 2013 @ 02:23 PM
Dubbed Operation Aurora, the 2010 exploitation of zero-day vulnerabilities in Microsoft’s Internet Explorer, employed crucial social engineering
elements, compromising numerous U.S. corporations including Google, Yahoo, Symantec, Northrop Grumman, and Morgan Stanley. Staff
were sent messages supposedly from known colleagues which included bogus weblinks. Once clicked the malicious code launched, allowing hackers to
piggyback from local machines into the entire network. Whilst much of press coverage reported the infiltration of Chinese dissident gmail
accounts, Dmitri Alperovitch of cyber investigation firm CrowdStrike, believes they accessed far more, claiming the Chinese are
“hacking every company imaginable… stealing everything they need to capture business and market share”. The breach is widely
considered a “watershed moment”, in so much as it demonstrated that private industry and commerce had become as important, if not more so, than
military or government targets in global cyber-espionage efforts. Today, the most besieged assets include; information and communications
technologies,marine systems, aerospace/aeronautics, military, dual-use and clean technologies, advanced materials and manufacturing techniques,
pharmaceuticals, chemicals, and agricultural technologies.
Few people understand the true brilliance by which these maneuvers are taking place and how totally game-changing they really are.
Whenever people talk about how the "little man" has no chance to rise above "elite," I want to point out "upsets" such as this. All it takes is
ingenuity and knowledge and you CAN change the world. Even in ways that nobody ever expected.... This "war" has now moved to state-sponsored
(despite denials otherwise), but it did NOT start out there. It has become successful tactic because those in power realized two critical points:
1. This "weapon" can be used to effectively level the playing field against opponents who are stronger financially, economically, and militarily (is
that a word? lol...).
2. Few are prepared or positioned to counter this type of assault. All too easily, masters can become slaves and slaves masters.
(visit the link for the full news article)
edit on 17-1-2013 by CIAGypsy because: (no reason given)
edit on 17-1-2013 by
CIAGypsy because: (no reason given)