3 of 14Image
Anonymous records U.K. police/FBI call; publishes it
In February, Anonymous settled a score with anti-Anonymous police in the U.K. and the U.S., by breaching a secure conference call in which the hacking collective was discussed, along with names of alleged members who had attacked high-value infrastructure targets and companies. It was no doubt a serious embarrassment for law enforcement on both sides of the Atlantic.
Not only did they breach the cybercrime call, it was recorded and subsequently uploaded to YouTube. The call shed light on U.S. and U.K. intelligence sharing arrangements, and clearly shows that a number of law enforcement units are working together in a bid to track down those who were involved in the previous and continued hacking attacks.
CBS News' 60 Minutes covers Stuxnet
Cybercrime to cyberwarfare: from low-level criminals to high-levels of state attacking countries, government targets, and their critical national infrastructure.
CBS News "60 Minutes" detailed how the Stuxnet cyberweapon was used, and how may have been behind the cyberattack. Many pointed fingers at the U.S. working with Israel, but even to this day it remains unclear who was behind the cyberattack.
Stuxnet, one of the most famous of all cyberweapons, specifically targeted Iran's nuclear facility, among other high value plants. In attacking the facility's networks, it caused a mini-meltdown at the unit that resulted in physical damage to the nuclear centrifuges, setting the program back by many months if not years.
See you later, SOPA. Oh wait, hello CISPA
Only a few months after SOPA was defeated by the collective protest power of the Web, in spite of the White House threatening to veto such a bill should it pass across Obama's desk, the Cybersecurity Intelligence Sharing and Protection Act (CISPA) came along and threatened to do just as much -- if not more damage than SOPA and PIPA would have done.
With support from major U.S. technology firms, such as Facebook, Microsoft, Verizon, Intel -- and so on -- the bill would allow the U.S. government to remove legal barriers that currently prevent companies, though exempt from the Fourth Amendment, from handing data to the government in order to share intelligence easily across the various intelligence and law enforcement agencies, without the need for a warrant. In spite of it being a "cybersecurity" tool in the global war on terrorism and online crime, the term is not actually defined in the bill.
Later in the year, though CISPA is still under review and yet to become law, President Obama signed a classified directive that would allow federal agencies to react accordingly -- including "offensive" action -- against those who breach networks, dish out cyberattacks and hack networks.