Tuesday, December 13, 2011

Iran Nearly Finished Decoding U.S. Drone, Tehran Claims

AP Photo/Sepahnews

Dec. 8, 2011: A photo by the Iranian Revolutionary Guards purportedly shows a U.S. RQ-170 Sentinel drone that Tehran says its forces downed earlier in the week, as the chief of the aerospace division of Iran's Revolutionary Guards, Gen. Amir Ali Hajizadeh, right, listens to an unidentified colonel.

TEHRAN, Iran –  Iranian experts are in the final stages of recovering data from the U.S. surveillance drone captured by the country's armed forces, state TV reported Monday.

Tehran has flaunted the capture of the RQ-170 Sentinel, a top-secret aircraft with stealth technology, as a victory for Iran and a defeat for the United States in a complicated intelligence and technological battle.

President Barack Obama said Monday that the U.S. was pressing Iran to return the aircraft, which U.S. officials say malfunctioned and was not brought down by Iran. But a senior commander of Iran's Revolutionary Guard said on Sunday that the country would not send it back, adding that "no one returns the symbol of aggression."

Iranian lawmaker Parviz Sorouri, a member of the parliament's national security and foreign policy committee, said Monday the extracted information will be used to file a lawsuit against the United States for what he called the "invasion" by the unmanned aircraft.

Sorouri also claimed that Iran has the capability to reproduce the drone through reverse engineering, but he did not elaborate.

State TV broadcast images Thursday of Iranian military officials inspecting what it identified as the drone. Iranian state media have said the unmanned spy aircraft was detected and brought down over the country's east, near the border with Afghanistan.

Officers in the Revolutionary Guard, Iran's most powerful military force, have claimed the country's armed forces brought down the surveillance aircraft with an electronic ambush, causing minimum damage to the drone.

American officials have said that U.S. intelligence assessments indicate that Iran neither shot the drone down, nor used electronic or cybertechnology to force it from the sky. They contend the drone malfunctioned. The officials spoke anonymously in order to discuss the classified program.

U.S. officials are concerned others may be able to reverse engineer the chemical composition of the drone's radar-deflecting paint or the aircraft's sophisticated optics technology that allows operators to positively identify terror suspects from tens of thousands of feet in the air.

They are also worried adversaries may be able to hack into the drone's database, although it is not clear whether any data could be recovered. Some surveillance technologies allow video to stream through to operators on the ground but do not store much collected data. If they do, it is encrypted.

Separately, in comments to the semi-official ISNA news agency, Sorouri said Iran would soon hold a navy drill to practice the closure of the strategic Strait of Hormuz at the mouth of the Persian Gulf, which is the passageway for about 40 percent of the world's oil tanker traffic.

Despite Sorouri's comments and past threats that Iran could seal off the waterway if the U.S. or Israel moved against Iranian nuclear facilities, no such exercise has been officially announced.

"Iran will make the world unsafe" if the world attacks Iran, Sorouri said.

Both the U.S. and Israel have not rule out military option against Iran's controversial nuclear program, which the West suspects is aimed at making atomic weapons. Iran denies the charge, saying its nuclear activities are geared toward peaceful purposes like power generation.

In another sign of the increasing tensions between Iran and the U.S., Tehran said Monday it has asked Interpol to help seek the arrest of two former U.S. officials it accuses of supporting the assassinations of Iranian officials.

Iran's state prosecutor, Gholamhossein Mohseni Ejehei, told reporters that Iran has filed charges against retired U.S. Army Gen. Jack Keane and former CIA agent Reuel Marc Gerecht.

Ejehei said Iran sent a request to Interpol in Paris to help pursue the two Americans through its office in Washington.

Iran says the two men urged the Obama administration to use covert action against Iran and kill some of its top officials, including Brig. Gen. Ghassem Soleimani commander of the Quds Force, the special foreign operations unit of the Revolutionary Guard.

Related Video



View the Original article

12 Chinese Hacker Teams Responsible for Most U.S. Cybertheft

Chinese Web surfers browse the Internet in a local cybercafe. (AP Photo)

WASHINGTON –  As few as 12 different Chinese groups, largely backed or directed by the government there, do the bulk of the China-based cyberattacks stealing critical data from U.S. companies and government agencies, according to U.S. cybersecurity analysts and experts.

The aggressive, but stealthy attacks, which steal billions of dollars in intellectual property and data, often carry distinct signatures allowing U.S. officials to link them to certain hacker teams. And, analysts say the U.S. often gives the attackers unique names or numbers, and at times can tell where the hackers are and even who they may be.

Sketched out by analysts who have worked with U.S. companies and the government on computer intrusions, the details illuminate recent claims by American intelligence officials about the escalating cyber threat emanating from China. And the widening expanse of targets, coupled with the expensive and sensitive technologies they are losing, is putting increased pressure on the U.S. to take a much harder stand against the communist giant.

It is largely impossible for the U.S. to prosecute hackers in China, since it requires reciprocal agreements between the two countries, and it is always difficult to provide ironclad proof that the hacking came from specific people.

Several analysts described the Chinese attacks, speaking on condition of anonymity because of the sensitivity of the investigations and to protect the privacy of clients. China has routinely rejected allegations of cyberspying and says it also is a target.

"Industry is already feeling that they are at war," said James Cartwright, a retired Marine general and former vice chairman of the Joint Chiefs of Staff.

A recognized expert on cyber issues, Cartwright has come out strongly in favor of increased U.S. efforts to hold China and other countries accountable for the cyberattacks that come from within their borders.

"Right now we have the worst of worlds," said Cartwright. "If you want to attack me you can do it all you want, because I can't do anything about it. It's risk free, and you're willing to take almost any risk to come after me."

The U.S., he said, "needs to say, if you come after me, I'm going to find you, I'm going to do something about it. It will be proportional, but I'm going to do something ... and if you're hiding in a third country, I'm going to tell that country you're there, if they don't stop you from doing it, I'm going to come and get you."

Cyber experts agree, and say that companies are frustrated that the government isn't doing enough to pressure China to stop the attacks or go after hackers in that country.

Much like during the Cold War with Russia, officials say the U.S. needs to make it clear that there will be repercussions for cyberattacks.

The government "needs to do more to increase the risk," said Jon Ramsey, head of the counter threat unit at the Atlanta-based Dell SecureWorks, a computer security consulting company. "In the private sector we're always on defense. We can't do something about it, but someone has to. There is no deterrent not to attack the U.S."

Cyberattacks originating in China have been a problem for years, but until a decade or so ago analysts said the probes focused mainly on the U.S. government -- a generally acknowledged intelligence gathering activity similar to Americans and Russians spying on each other during the Cold War.

But in the last 10 to 15 years, the attacks have gradually broadened to target defense companies, and then other critical industries including those in energy, finance and other sectors.

According to Ramsey and other cyber analysts, hackers in China have different digital fingerprints, often visible through the computer code they use, or the command and control computers that they use to route their malicious software through.

U.S. government officials have been reluctant to tie the attacks directly back to the Chinese government, but analysts and officials quietly say that they have tracked enough intrusions to specific locations to be confident they are linked to Beijing -- either the government or the military. And, they add that they can sometimes glean who benefited from a particular stolen technology.

One of the analysts said investigations show that the dozen or so Chinese teams appear to get "taskings," or orders, to go after specific technologies or companies within a particular industry. At times, two or more of the teams appear to get the same shopping list, and compete to be the first to get it, or the one with the greatest haul.

Analysts and U.S. officials agree that a majority of the cyberattacks seeking intellectual property or other sensitive or classified data are done by China-based hackers. While much of the cyberattacks stealing credit card or financial information come from Eastern Europe or Russia.

According to experts, the malicious software or high-tech tools used by the Chinese haven't gotten much more sophisticated in recent years. But the threat is persistent, often burying malware deep in computer networks so it can be used again and again over the course of several months or even years.

The tools include malware that can record keystrokes, steal and decrypt passwords, and copy and compress data so it can be transferred back to the attacker's computer. The malware can then delete itself or disappear until needed again.

Several specific attacks linked to China include:

-- Two sophisticated attacks against Google's systems that stole some of the Internet giant's intellectual property and broke into the Gmail accounts of several hundred people, including senior U.S. government officials, military personnel and political activists.

-- Last year computer security firm Mandiant reported that data was stolen from a Fortune 500 manufacturing company during business negotiations when the company was trying to buy a Chinese company.

-- Earlier this year, McAfee traced an intrusion to an Internet protocol address in China and said intruders took data from global oil, energy and petrochemical companies.

A Chinese Foreign Ministry spokesman, Liu Weimin, did not respond Monday to the specific allegations about government-supported cyber-attacks but said Internet security is an issue the world needs to address collectively. The international community should "prevent the Internet from becoming a new battlefield," Liu said at a daily media briefing in Beijing.

For the first time, U.S. intelligence officials called out China and Russia last month, saying they are systematically stealing American high-tech data for their own economic gain. The unusually forceful public report seemed to signal a new, more vocal U.S. government campaign against the cyberattacks.

The next step, said Cartwright, must be a full-throated U.S. policy that makes it clear how the U.S. will deal with cyberattacks, including the attackers as well as the nations the attacks are routed through. Once an attack is detected, he said the U.S. should first go through the State Department to ask the country to stop the attack. If the country refuses, he said, the U.S. will have the right to stop the computer server from sending the attack by whatever means possible while still avoiding any collateral damage.

Print Email Share Comments Recommend Tweet View Article Please enable JavaScript to view the comments powered by Disqus. You must login to comment.

View Article

Advertisement

FOLLOW FOX NEWS SCITECH

Latest Scitech Videos Trending in SciTech

1

Scientists Close in on 'God Particle'

2

World's Biggest Aircraft Will Ferry Passengers to Space in Stratolaunch Vision

3

'Walking' Fish Prompts Evolution Rethink

4

Rara.com: Cheering for Online Music This Christmas

5

Will the Great Pyramid's Secret Doors Be Opened? See all trendsSponsored By

--

View the Original article

Russian Scientist Apologizes for Failed Mars Moon Mission

ROSCOSMOS

An artist's impression of Phobos-Grunt in Mars orbit.

PARIS –  A prominent Russian scientist lamented the failure of the country's Phobos-Grunt spacecraft in an open letter Thursday, Dec. 8. The mission was meant to collect samples from Mars' moon Phobos, but instead is languishing in Earth orbit.

"We are deeply sorry about the failure" of Phobos-Grunt, wrote Lev Zelenyi, director of the Space Research Institute and Chair of the Russian Academy of Sciences' Solar System Exploration Board, in a letter to fellow scientists and mission team members. "We hope in

View the Original article

Japan Launches Second Spy Satellite This Year

AP Photo/Kyodo News

Dec. 12, 2011: An H-2A rocket carrying a radar satellite lifts off from the Tanegashima Space Center in Tanegashima, Kagoshima Prefecture, southwestern Japan. Japan has successfully launched the intelligence-gathering satellite, its second this year.

TOKYO –  Japan successfully put a spy satellite into orbit on Monday and expects to complete its network of intelligence-gathering satellites with another launch next year.

Japan's space agency, JAXA, said the launch from the remote southern island of Tanegashima went off without a hitch and the radar-equipped satellite is functioning properly. It was the second launch of the year, following a successful liftoff in September.

Officials refused to provide details of the satellite's capabilities.

Japanese media reports say it will augment the optical satellites Japan has already launched by providing data of what is happening on the ground at night or through cloud cover.

Japan launched its first pair of spy satellites in 2003, prompted by concerns over North Korea's missile program. It currently has four optical information-gathering satellites in orbit, though the latest of those is not fully operational yet.

It previously launched two radar intelligence satellites, but both malfunctioned.

The satellite launched Monday is expected to begin gathering intelligence in a few months, an official with the Cabinet Satellite Information Center told The Associated Press. He requested anonymity because details of the program are classified.

Another radar satellite launch is planned net year, the official said.

That would give Japan the combination of two optical and two radar satellites that it wants to complete its network. Tokyo is seeking to use the satellites to provide information on any given spot on the planet at least once a day.

Related Stories Russian Scientist Apologizes for Failed Mars Moon Mission Are These Satellite Images Exposing America's Secrets? Jigsaw Puzzlers Summoned to Defend the Nation Print Email Share Comments Recommend Tweet View Article Please enable JavaScript to view the comments powered by Disqus. You must login to comment.

View Article

Advertisement

FOLLOW FOX NEWS SCITECH

Latest Scitech Videos Trending in SciTech

1

Scientists Close in on 'God Particle'

2

World's Biggest Aircraft Will Ferry Passengers to Space in Stratolaunch Vision

3

'Walking' Fish Prompts Evolution Rethink

4

Rara.com: Cheering for Online Music This Christmas

5

Will the Great Pyramid's Secret Doors Be Opened? See all trendsSponsored By

--

View the Original article

Holiday Gift Guide: 5 Best Tech Gifts for Moms

Looking for a gift for the mom in your life and want to get a little fancier than a scarf? How about some high-tech toys that will help make her life a little easier?

Below are a few gadgets that the moms I know would be thrilled to find under their trees this year.

Amazon Kindle
Amazon's new lineup of Kindle eReaders are sure to impress. Whether mom is a news junkie or enjoys her alone time with bodice ripping romance novels, she'll love having an eReader that's easy to use and light enough to fit in a purse or coat pocket. Prices start at $79.

Tag by Cobra
I don't want to insinuate that Moms lose their keys more than Dads -- but that's sure true in my house. My wife's keys are forever getting lost in the black hole that is the diaper bag. With the Cobra Tag, you can find your keys with a small keychain tag that pairs with a BlackBerry or Android phone. When the keys go missing, use the app on the phone to signal to them. When the phone goes missing, the keychain tag can signal to the phone to help you find it too. If they both go missing, of course, you're really out of luck.

Dyson Hot
For the woman who is always cold, consider this portable heater with a lot of panache. It's a bladeless heating fan that can turn itself off and on to keep any room at your desired temperature. It's portable and handy with its remote control. It is also safe to use around children and pets.

Brookstone Body Bean
This is the modern day equivalent to the hot water bottle or electric heating pad -- only much safer. Plug the Body Bean in for 15 minutes and it stays warm for up to four hours! It is small and compact and would make a great stocking stuffer.

iRobot Roomba 700 Series
Want to help mom clean the house? You can weather vacuum the floor yourself -- or buy her a robot to do it more regularly (and with less complaining than you would offer). The Roomba vacuums every part of a room multiple times and can run on your schedule with its timer mode. It cleans carpet, tile, or hardwood floors and is a great gift for the mom who deserves a break from housework. And who doesn't?

Click here for more Holiday Gift Guides

Clayton Morris is a Fox and Friends host. Follow Clayton's adventures online on Twitter

View the Original article

'Elvis' Monkey and Psychedelic Gecko Among New Species Discovered in Southeast Asia

AP Photo/Fauna & Flora International, Martin Aveling

In this undated image provided by Fauna & Flora International, a monkey with an "Elvis" hairdo is seen. It was discovered in Myanmar in 2010.

A psychedelic gecko and a monkey with an "Elvis" hairdo are among 208 new species described last year by scientists in the Mekong River region of Southeast Asia, a conservation group announced Monday.

The animals were discovered in a biodiverse region that is threatened by habitat loss, deforestation, climate change and overdevelopment, the WWF said in a report.

The newly described species include a "psychedelic gecko" in southern Vietnam and a nose-less monkey in a remote province of Myanmar that looks like it wears a pompadour.

"While this species, sporting an Elvis-like hairstyle, is new to science, the local people of Myanmar know it well," the Switzerland-based group said in its report.

The region is home to some of the world's most endangered species, including tigers, Asian elephants, Mekong dolphins and Mekong giant catfish, the group said.

"This is a region of extraordinary richness in terms of biodiversity but also one that is extremely fragile," said Sarah Bladen, communications director for WWF Greater Mekong. "It's losing biodiversity at a tragic rate."

The Mekong flows through China, Myanmar, Laos, Thailand, Cambodia and Vietnam.

In October, WWF announced Vietnam has lost its last Javan rhinoceros, making the 40 to 60 Javan rhinos living in Indonesia the last remaining members of their species.

Print Email Share Comments Recommend Tweet View Article Please enable JavaScript to view the comments powered by Disqus. You must login to comment.

View Article

Advertisement

FOLLOW FOX NEWS SCITECH

Latest Scitech Videos Trending in SciTech

1

Scientists Close in on 'God Particle'

2

Rara.com: Cheering for Online Music This Christmas

3

'Walking' Fish Prompts Evolution Rethink

4

Will the Great Pyramid's Secret Doors Be Opened?

5

Amidst User Complaints, Amazon Plans Fix for Kindle Fire See all trendsSponsored By

--

View the Original article

Will the Great Pyramid's Secret Doors Be Opened?

The Great Pyramids of Egypt

Will the mystery over the Great Pyramid's secret doors be solved in 2012?

I dare say yes. After almost two decades of failed attempts, chances are now strong that researchers will reveal next year what lies behind the secret doors at the heart of Egypt's most magnificent pyramid.

New revelations on the enduring mystery were already expected this year, following a robot exploration of the 4,500-year-old pharaonic mausoleum.

But unrest in Egypt froze the project at its most promising stage, after it produced the first ever images behind one of the Great Pyramid's mysterious doors.

Now the Supreme Council of Antiquities (SCA), once led by the controversial yet charismatic Zahi Hawass, is slowly returning to granting permits for excavations and archaeological research.

NEWS: Giza Pyramids Align Toward City of Sun God

"As with other missions, we have had to resubmit our application to be allowed to continue. We are currently waiting for the various committees to formalize the approval," project mission manager Shaun Whitehead, of the exploration company Scoutek UK, told Discovery News.

"Once we're allowed to continue, I have no doubt that we can complete our work in 2012," he added.

Built for the pharaoh Cheops, also known as Khufu, the Great Pyramid is the last remaining wonder of the ancient world.

SCIENCE CHANNEL VIDEO: Pyramid Fail

The monument is the largest of a family of three pyramids on the Giza plateau, on the outskirts of Cairo, and has long been rumored to have hidden passageways leading to secret chambers.

Archaeologists have long puzzled over the purpose of four narrow shafts deep inside the pyramid since they were first discovered in 1872.



View the Original article