article thumbnail

The role of a secret Dutch mole in the US-Israeli Stuxnet attack on Iran

Security Affairs

The development of the deadly cyber weapon started under the administration of George Bush Junior as part of a military operation named “ Olympic Games ”, but the Obama administration has been pushing a more energetic on the offensive program. In 2003, British and U.S. The Olympic Games operation was carried out by a joint U.

article thumbnail

Supply-Chain Security

Schneier on Security

Earlier this month, the Pentagon stopped selling phones made by the Chinese companies ZTE and Huawei on military bases because they might be used to spy on their users. We have to trust the country where the software is written -- and the countries where all the components are manufactured. We also have to trust the programmers.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Highlights from the New U.S. Cybersecurity Strategy

Krebs on Security

military in disrupting cybercriminal infrastructure, and it names China as the single biggest cyber threat to U.S. based semiconductor manufacturing and research and to make the U.S. But back in 2003, most of the world’s companies didn’t host their entire business in the cloud. ” Many of the U.S.

article thumbnail

MY TAKE: How state-backed cyber ops have placed the world in a constant-state ‘Cyber Pearl Harbor’

The Last Watchdog

That May 10th air strike by the Israel Defense Force marked the first use of military force in direct retaliation for cyber spying. This comes as no surprise to anyone in the military or intelligence communities. nuclear arsenal in 2003 • Breaches of computers at the Department of Commerce in 2006 • Hacking of military systems at U.S.

IoT 171