Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
Commentary: Tracking cyberterrorists
by Arnaud De Borchgrave
Washington (UPI) May 29, 2013


Taiwan to open new cyberwar unit: report
Taipei (AFP) May 29, 2013 - Taiwan is preparing to launch a fourth cyberwar unit, a local newspaper reported Wednesday, in response to what it claims is a growing security threat from Chinese hackers.

The new unit is scheduled to open on July 1 and will work to counter cyber attacks on government websites, said the Taipei-based newspaper United Evening News.

It will bring to four the number of Taiwanese military units assigned to cyberwar and information-related tasks, added the paper.

The defence ministry declined to comment on the report.

Taiwanese government websites have frequently come under cyber attack from China, usually during disputes between the two sides, military authorities say.

In the six months to June last year, hackers launched more than one million attacks on the website of Taiwan's National Security Bureau (NSB), the Liberty Times reported.

The NSB did not reveal how many of the attacks came from China while saying all hacking attempts were blocked.

But the bureau described the perceived cyber threat from the mainland as "very severe" when asked to evaluate it in parliament two months ago.

"China's cyberwar capabilities were organised by the military and government units, using Internet viruses to attack Taiwan's government, economic and military websites," it said in a report cited by the Liberty Times.

However ties between Taipei and Beijing have improved markedly since Ma Ying-jeou of the China-friendly Kuomintang party came to power in 2008 on a platform of ramping up trade and tourism links with the mainland.

Ma was reelected in January 2012 for a second and final four-year term.

Yet China still considers Taiwan part of its territory awaiting reunification, by force if necessary, even though the island has ruled itself for more than 60 years after their split in 1949 at the end of a civil war.

Tracking, finding and killing Osama bin Laden required unusual skill, intelligence and courage. Tracking al-Qaida's financial conduits through cyberspace is infinitely more difficult.

Network forensics is one of the world's most challenging assignments -- explained in vivid, dramatic detail by Juan C. Zarate, a former super sleuth in the U.S. government's long campaign to find and disrupt al-Qaida's terrorist funding in the Worldwide Web.

A former assistant secretary of the Treasury and deputy assistant to the president and deputy national security adviser, Zarate's "Treasury's War" is a griping electronic whodunit in a constantly changing environment where inequalities are widening and where technology is destroying more jobs than it creates.

Terrorists and organized criminals use cyberspace speed, secrecy and anonymity in a borderless electronic universe where everything moves at the speed of light -- from self-radicalization and fraud to cyber weapons training and illicit financing.

Al-Qaida and its Associated Movements around the world raise money online where cyberfraud is a global criminal enterprise.

They manage criminal syndicates that acquire thousands of credit cards, withdraw small amounts from each one, ranging from $10-$50, then return them as if they had never been stolen.

The victims invariably keep quiet, only too happy to get their electronic credit cards back on line. Millions of customers don't even notice the loss.

A recent demonstration moved 100 terabits per second through ether-space. Detecting who's doing what to whom at such speeds and then redirecting traffic to foil cyberterrorists is the challenge that cyber sleuths face round the clock, 365 days a year.

Zarate, a senior adviser at the Center for Strategic and International Studies, is a chief architect of modern financial warfare for the U.S. government.

His "Treasury's War" takes the reader into the shadowy world where banks and U.S. Treasury tools come together to foil terrorists and to influence geopolitical outcomes.

From his Treasury and White House offices, Zarate, with a dedicated group of Treasury officials, designed and then led a secret financial war against America's enemies.

This is the first book that lifts the veil of secrecy on the financial power they marshaled against America's enemies.

The financial and cyber warriors, says Zarate, "created an international financial environment in which the private sector's bottom line dovetailed directly with U.S. national security interests -- with the goal of isolating rogues from the legitimate financial system."

The global terrorist funding and illicit financial networks range from the slaughter of elephants (tusks go for $50,000 and up) and rhinoceros (a single horn fetches up to $30,000) in Africa to the heroin trade in Afghanistan.

The United States and its closest allies are also engaged in a new kind of electronic warfare against the financial networks of rogue regimes -- everything from nuclear proliferators to criminal syndicates and their links with transnational terrorist networks.

Zarate takes the reader behind the scenes to explain how the group he led redefined the U.S. Treasury's role, "and used its unique powers, relationships and reputation to apply financial pressure against America's enemies."

The goal was -- and is now 24/7 -- to isolate rogues from the legitimate international financial system. And in so doing, created "a new brand of financial power (that) leveraged the private sector and created an international financial environment in which the private sector's bottom line dovetailed directly with U.S. national security interests."

Treasury and its new tools, Zarate explains in "Treasury's War," soon became critical in all the "central geopolitical challenges facing the United States, including terrorism, nuclear proliferation, and regimes in North Korea, Iran, Syria, Lebanon, Iraq and Cuba."

In addition to CSIS, Zarate is senior national security analyst for CBS News and is a visiting lecturer of law at the Harvard Law School. He was the first assistant secretary of the Treasury for terrorist financing and financial crimes.

Zarate then moved to the White House (under George W. Bush) where he served as deputy assistant to the president and deputy national security adviser for combating terrorism and contraband finance.

He is one of very few speakers who can address immensely complex issues of high-level strategic concern coupled with the intricacies of the financial methods of fighting terrorism.

Zarate is still using the skills he took to the White House -- for the private sector as a consultant.

There is still one critically important part of the electronic puzzle that eludes the combined forces of the electronic Kojak/Columbo/Poirot/Scarpetta/Holmes network. It's the informal, handshake ways of moving money, including Hawala. And Hawala's origins are found in texts of Islamic law that date to the eighth century.

In more recent times, Hawala is a round-the-clock system from scores of pay phones or mobiles in Pakistan, Yemen or any Persian Gulf country at predetermined times to say, for example, "Uncle Jack will airfreight your new suit Friday." Translation: The man who introduces himself as Uncle Jack is good to go with $10,000"

Similar amounts will be conveyed anonymously from these same countries to U.S. numbers. By the end of the year, the amounts usually balance out. If not, the discrepancy is carried over to the next year.

It's money transfer without money movement by word of mouth from one cellphone to another thousands of miles away. Mutual trust is the key ingredient.

After more than a decade of counter-terrorist and anti-money laundering efforts, it is clear that the Hawala code of secrecy survives countless attempts to dismantle it.

The U.S. government tried to regulate and infiltrate Hawala through hawaladars, the bearded ones who sit cross legged on a small rug behind a wooden stand in a dusty unpaved street.

In Quetta, the capital of Baluchistan in Pakistan, friends escorted this reporter to a long line of Hawala stalls. In one of them, different currencies, including dollars, stood in neat stacks next to the hawaladar's baggy pants. Armed guards stood on either side.

Hawala honor system transactions move a lot faster than cashing a check in a Pakistani bank. The old and new methods of moving money may be converging, making the challenge of countering terrorist and illicit finance all the more challenging in the 21st century.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
All governments hack secret data: Huawei
Sydney (AFP) May 29, 2013
Using the Internet to spy and steal sensitive data is standard practice by all countries, according to the security chief of controversial Chinese telecoms giant Huawei. The comments published Wednesday follow allegations that Chinese hackers gained access to secret designs for a slew of sophisticated US weapons programmes, and stole the blueprints for Australia's new intelligence agency hea ... read more


CYBER WARS
Russia developing counter-measures for European anti-missile shield

Jordan seeks to deploy Patriot missiles: minister

Lockheed Martin Completes Milestone for Training Element of United States Ballistic Missile Defense System

US missile defense still plagued by technical doubts

CYBER WARS
Russia to send Syria missiles as spillover fears grow

Defense Acquisition Board approves Standard Missile-6 full-rate production

Lockheed Martin and the MDA Conduct Test of New Air-Launched Missile Target Prototype

ESSM intercept of high-diving threat proves expanded defensive capability

CYBER WARS
After vowing transparency, US silent on drone killing

US drone strike kills six in Pakistan: officials

US drone crashes in Somalia: official

German railways to use mini drones to stop graffiti

CYBER WARS
Mutualink Platform to be Deployed by US DoD during JUICE 2013

General Dynamics to Deliver U.S. Army's Newest Tactical Ground Station Intelligence System

Boeing-built WGS-5 Satellite Enhances Tactical Communications for Warfighters

US Navy And Lockheed Martin Deliver Secure Communications Satellite For Mobile Users

CYBER WARS
Funding early awareness of emerging technology

Facial recognition technology proves its mettle

Warrior Web Prototype Takes Its First Steps

Lockheed Martin Conducts First EMD Flight Test of New GMLRS Warhead

CYBER WARS
Helicopter, encryptian device deals for EADS companis

Merkel under fire again over Mideast arms sales

Manila confirms boost to military spending

New Zealand beefs up defense spending

CYBER WARS
White House stresses personal side of Obama-Xi summit

In Asia, Hagel to promise 'follow-through' on US pivot

Outside View: Europe's tolerance tested by Islam

Three Chinese ships in disputed waters: Japan

CYBER WARS
Shape-shifting nanoparticles flip from sphere to net in response to tumor signal

Gold nanocrystal vibration captured on billion-frames-per-second film

Understanding freezing behavior of water at the nanoscale

Kinks and curves at the nanoscale




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement