Forum Views ()
Forum Replies ()
Read more with google mobile :
Special report
Yahoo!
My Yahoo!
Mail
More Yahoo! Services
Account Options
New User? Sign Up
Sign In
Help
Yahoo! Search
web search
Home
Singapore
Asia Pacific
World
Business
Entertainment
Sports
Technology
Africa
Europe
Latin America
Middle East
North America
Special report - The Pentagon's new cyber warriors
Reuters - Wednesday, October 6
Send
IM Story
Print
By Jim Wolf
WASHINGTON - Guarding water wells and granaries from enemy raids is as old as war itself. In the Middle Ages, vital resources were hoarded behind castle walls, protected by moats, drawbridges and knights with double-edged swords.
Today, U.S. national security planners are proposing that the 21st century's critical infrastructure -- power grids, communications, water utilities, financial networks -- be similarly shielded from cyber marauders and other foes.
The ramparts would be virtual, their perimeters policed by the Pentagon and backed by digital weapons capable of circling the globe in milliseconds to knock out targets.
An examination by Reuters, including dozens of interviews with military officers, government officials and outside experts, shows that the U.S. military is preparing for digital combat even more extensively than has been made public. And how to keep the nation's lifeblood industries safe is a big, if controversial, aspect of it.
"The best-laid defences on military networks will matter little unless our civilian critical infrastructure is also able to withstand attacks," says Deputy U.S. Defence Secretary William Lynn, who has been reshaping military capabilities for an emerging digital battlefield.
Any major future conflict, he says, inevitably will involve cyber warfare that could knock out power, transport and banks, causing "massive" economic disruption.
But not everyone agrees that the military should or even can take on the job of shielding such networks. In fact, some in the private sector fear that shifting responsibility to the Pentagon is technologically difficult -- and could prove counterproductive.
For the moment, however, proponents of the change seem to have the upper hand. Their case has been helped by the recent emergence of Stuxnet, a malicious computer worm of unknown origin that attacks command modules for industrial equipment.
Experts describe the code as a first-of-its-kind guided cyber missile. Stuxnet has hit Iran especially hard, possibly slowing progress on Tehran's nuclear program, as well as causing problems elsewhere.
Stuxnet was a cyber shot heard around the world. Russia, China, Israel and other nations are racing to plug network gaps. They also are building digital arsenals of bits, bytes and logic bombs -- code designed to interfere with a computer's operation if a specific condition is met, according to experts inside and outside the U.S. government.
THE WORMS ARE COMING!
In some ways, the U.S. military-industrial complex -- as President Dwight Eisenhower called ties among policymakers, the armed forces and arms makers -- is turning into more of a military-cyber-intelligence mash-up.
The Pentagon's biggest suppliers -- including Lockheed Martin Corp, Boeing Co, Northrop Grumman Corp, BAE Systems Plc and Raytheon Co -- each have big and growing cyber-related product and service lines for a market that has been estimated at $80 billion to $140 billion a year worldwide, depending on how broadly it is defined.
U.S. officials have shown increasing concern about alleged Chinese and Russian penetrations of the electricity grid, which depends on the Internet to function. Beijing, at odds with the United States over Taiwan arms sales and other thorny issues, has "laced U.S. infrastructure with logic bombs," former National Security Council official Richard Clarke writes in his 2010 book "Cyber War," a charge China denies.
Such concerns explain the Pentagon's push to put civilian infrastructure under its wing by creating a cyber realm walled off from the rest of the Internet. It would feature "active" perimeter defences, including intrusion monitoring and scanning technology, at its interface with the public Internet, much like the Pentagon's "dot.mil" domain with its more than 15,000 Defence Department networks.
The head of the military's new Cyber Command, Army General Keith Alexander, says setting it up would be straightforward technically. He calls it a "secure zone, a protected zone." Others have dubbed the idea "dot.secure."
"The hard part is now working through and ensuring everybody's satisfied with what we're going to do," Alexander, 58, told reporters gathered recently near his headquarters at Fort Meade, Maryland.
Alexander also heads the National Security Agency, or NSA, the super-secretive Defence Department arm that shields national security information and networks, and intercepts foreign communications.
The Pentagon is already putting in place a pilot program to boost its suppliers' network defences after break-ins that have compromised weapons blueprints, among other things. Lynn told Alexander to submit plans, in his NSA role, for guarding the so-called defence industrial base, or DIB, that sells the Pentagon $400 billion in goods and services a year.
"The DIB represents a growing repository of government information and intellectual property on unclassified networks," Lynn said in a June 4 memo obtained by Reuters.
He gave the general 60 days to develop the plan, with the Homeland Security Department, to provide "active perimeter" defences to an undisclosed number of Pentagon contractors.
"We must develop additional initiatives that will rapidly increase the level of cybersecurity protection for the DIB to a level equivalent to the unclassified network," Lynn wrote.
The Pentagon, along with the Homeland Security department, is now consulting volunteer "industry partners" on the challenges private sector companies envision, said Air Force Lieutenant Colonel Rene White, a Pentagon spokeswoman, in a status report.
THROWBACK?
Some see the Pentagon's proposed new ring around certain critical services as a throwback almost to the dark ages.
"Dot.secure becomes new Target One," says Richard Bejtlich, General Electric Co's director of incident response. "I can't think of an easier way to help an adversary target the most critical information on industry computers."
Bejtlich and others say such an arrangement would only be as strong as its weakest link, vulnerable to compromise in many ways. "I guarantee users will want to and need to transfer information between their normal company Internet-connected computers and 'dot.secure'," he says. "Separation is a fool's goal."
Utilities already use encrypted, password-controlled systems to handle communication between power plants and large-scale distribution systems.
Trying to move that traffic off the existing Internet onto an independent computer network would be expensive, and would not necessarily guarantee security.
"Even a private network is only so secure," said Dan Sheflin, a vice president at Honeywell International Inc who works on grid-control technology. "A big threat is employees walk in, unknowingly or knowingly, with thumb drive, plug it in, put their kids' pictures on their PC and, oh boy, something's on the network. Those are things that even a private network could be subject to."
Rather than building a new network, a more practical solution could be improving the security of existing systems.
"The real issue is not letting people in and having layers of defence if they do get in to isolate them and eradicate them," said Sheflin, of Honeywell, which makes grid components ranging from home thermostats to automation systems to run power plants. "This is a very difficult problem. We are up against well-funded groups who can employ many people who spend their time trying to do this."
Greg Neichin of San Francisco-based Cleantech Group LLC, a research firm, says utility companies already are well aware of the need to guard their infrastructure, which can represent billions of dollars of investment. "Private industry is throwing huge sums at this already," he says. "What is the gain from government involvement?"
Companies ranging from Honeywell to General Electric Co -- whose chief executive, Jeff Immelt, called the U.S. energy grid a relic last month -- are pushing the drive towards a "smart grid."
That model would permit two-way communication between power producers and consumers, so a utility could avoid a blackout during a peak demand time by sending a signal to users' thermostats to turn down air conditioning, for instance. Such a system could also allow variable pricing -- lowering prices during off-peak demand times, which would encourage homeowners to run major appliances like dishwashers and washing machines in the evenings, when industrial demand declines.
Neichin is worried that efforts to wall off grid-related communication could stifle that kind of innovation.
But even Sheflin of Honeywell argues that private companies are not likely to solve a problem of this magnitude on their own. "The government needs to be involved in this," he said. "There is going to have to be someone that says, 'Wait a minute, this is of paramount importance.' I don't think it's going to be private industry that will raise the red flag."
A Pentagon spokesman said he could not address industry concerns right now, but the Defence Department would do so before long. Still, the military's proposal faces other complications.
WHO'S IN CHARGE?
The U.S. Department of Homeland Security now leads efforts to secure federal non-military systems, often described as the Internet's "dot.gov" domain. It also has the lead in protecting critical infrastructure. NSA and Cyber Command lend a hand when asked to do so, including by U.S. companies seeking to button up their networks.
The idea of letting the Defence Department wall off certain private-sector networks is highly tricky for policymakers, industry and Pentagon planners. Among the issues: what to protect, who should be in charge, how to respond to any attack and whether the advent of a military gateway could hurt U.S. business's dealings overseas, for instance for fear of Pentagon snooping.
In addition, the 1878 Posse Comitatus Act generally bars federal military personnel from acting in a law-enforcement capacity within the United States, except where expressly authorized by the Congress.
Alexander says the White House is considering whether to ask Congress for new authorities as part of a revised team approach to cyber threats that would also involve the FBI, the Department of Homeland Security and the Defence Department.
There are persistent signs of strains between Cyber Command and the Homeland Security Department over how to enhance the U.S. cybersecurity posture.
"To achieve this, we have to depart from the romantic notion of cyberspace as the Wild Wild West," Homeland Deputy Secretary Jane Lute told the annual Black Hat computer hackers' conference in Las Vegas in July. "Or the scary notion of cyberspace as a combat zone. The goal here is not control, it's confidence."
Alexander made a reference to tensions during certain meetings ahead of Cyber Storm III, a three-day exercise mounted by U.S. Homeland Security last week with 12 other countries plus thousands of participants across government and industry. It simulated a major cyber attack on critical infrastructure.
"Defence Department issues versus Homeland Security issues," he told the House of Representatives Armed Services Committee on September 23. "And that's probably where you'll see more friction. So how much of each do you play? How radical do you make the exercise?"
President Barack Obama's cybersecurity coordinator, Howard Schmidt, is working with Congress and within the administration to develop policies and programs to improve U.S. cybersecurity, says a White House spokesman, Nicholas Shapiro.
Obama, proclaiming October National Cybersecurity Awareness Month, said protecting digital infrastructure is a "national security priority."
"We must continue to work closely with a broad array of partners -- from federal, state, local and tribal governments to foreign governments, academia, law enforcement and the private sector -- to reduce risk and build resilience in our shared critical information and communications infrastructure," he said.
VIRTUAL CASTLE WALLS
Active defences of the type the military would use to shield a "dot.secure" zone represent a fundamental shift in the U.S. approach to network defence, Lynn says. They depend on warnings from communications intercepts gathered by U.S. intelligence.
Establishing this link was a key reasons for the creation of Cyber Command, ordered in June 2009 by Defence Secretary Robert Gates after he concluded that the cyber threat had outgrown the military's existing structures.
"Policymakers need to consider, among other things, applying the National Security Agency's defence capabilities beyond the ".gov" domain, such as to domains that undergird the commercial defence industry," Lynn wrote in the September/October issue of Foreign Affairs.
"The Pentagon is therefore working with the Department of Homeland Security and the private sector to look for innovative ways to use the military's cyber defence capabilities to protect the defence industry," he said.
U.S. Senator Sheldon Whitehouse, who led a Senate Intelligence Committee cyber task force that submitted a classified report to the panel in July, has floated a similar idea, drawing an analogy to medieval fortresses.
"Can certain critical private infrastructure networks be protected now within virtual castle walls in secure domains where those pre-positioned offences could be both lawful and effective?" he asked in a July 27 floor speech.
"This would obviously have to be done in a transparent manner, subject to very strict oversight. But with the risks as grave as they are, this question cannot be overlooked," said the Rhode Island Democrat. "There is a concerted and systematic effort under way by national states to steal our cutting-edge technologies."
The "dot.secure" idea may be slow in getting a full congressional airing. More than 40 bills on cyber security are currently pending. The chairman of the House Armed Services Committee, Missouri Democrat Ike Skelton, told Reuters he was not ready to pass judgement on possible new powers for Cyber Command.
CYBER WARRIORS
Cyber Command leads day-to-day protection for the more than 15,000 U.S. defence networks and is designed to mount offensive strikes if ordered to do so.
The command has already lined up more than 40,000 military personnel, civilians and contractors under Alexander's control, nearly half the total involved in operating the Defence Department's sprawling information technology base.
It is still putting capabilities in place from across the military as it rushes to reach full operational capability by the end of this month. Reuters has pinned down the numbers involved for each service.
The Air Force component, the 24th Air Force, will align about 5,300 personnel to conduct or support round-the-clock operations, including roughly 3,500 military, 900 civilian and 900 contractors, said spokeswoman Captain Christine Millette. The unit was declared fully operational on October 1, including its 561st Network Operations Squadron based at Peterson Air Force Base, Colorado, where it operates, maintains and defends Air Force networks.
The Navy adds about 14,000 active duty military and civilian employees serving at information operations, network defence, space and telecommunication facilities around the world. They are now aligned operationally under the U.S. Fleet Cyber Command, said spokesman Commander Steve Mavica.
The Army contributes more than 21,000 soldiers and civilians, including the Army Intelligence and Security Command, for cyber-related actions, said Lieutenant Colonel David Patterson, an Army spokesman.
The Marine Corps will assign roughly 800 of its forces to "pure" cyber work, according to Lieutenant General George Flynn, deputy commandant for combat development.
Cyber Command's headquarters staff will total about 1,100, mostly military, under a budget request of about $150 million for the fiscal year that started October 1, up from about $120 million the year before.
Beside guarding Defence Department computers, the nation's cyber warriors could carry out computer-network attacks overseas with weapons never known to have been used before.
"You can turn a computer or a power plant into a useless lump of metal," says a former U.S. national security official familiar with the development of U.S. cyber warfare capabilities. "We could do all kind of things that would be useful adjuncts to a balanced military campaign."
Such weapons could blow up, say, a chemical plant by instructing computers to raise the temperature in a combustion chamber, or shut a hydro-electric power plant for months by sabotaging its turbines.
Scant official information is available on the development of U.S. cyber weapons, which are typically "black" programs classified secret. They are built from binary 1s and 0s -- bits and bytes. They may be aimed at blinding, jamming, deceiving, overloading and intruding into a foe's information and communications circuits.
An unclassified May 2009 U.S. Air Force budget-justification document for Congress lifted the veil on one U.S. cyber weapon program. It described "Project Suter" software, apparently designed to invade enemy communication networks and computer systems, including those used to track and help shoot down enemy warplanes.
"Exercises provide an opportunity to train personnel in combined, distributed operations focussed on the 'Find, Fix and Finish' process for high-value targets," says the request for research, development, test and evaluation funds.
The U.S. Air Force Space Command has proposed the creation of a graduate-level course for "network warfare operations." The proposed five-and-a-half-month class would produce officers to lead weapons and tactics development "and provide in-depth expertise throughout the air, space and cyberspace domains focussed on the application of network defence, exploitation and attack," Lieutenant Colonel Chad Riden, the space command's Weapons and Tactics branch chief, said in an emailed reply to Reuters.
GEORGIA ON THEIR MIND
The world got a glimpse of what lower-level cyber warfare might look like in Estonia in 2007 and in Georgia in 2008 when cyber attacks disrupted networks amid conflicts with Russia.
Now, the Stuxnet computer virus is taking worries about cyber warfare to new heights as the first reported case of malicious software designed to sabotage industrial controls.
"Stuxnet is a working and fearsome prototype of a cyber-weapon that will lead to a new arms race in the world," said Kaspersky Lab, a Moscow-based security software vendor. "This time it will be a cyber arms race."
The program specifically targets control systems built by Siemens AG, a German equipment maker. Iran, the target of U.N. sanctions over its nuclear program, has been hit hardest of any country by the worm, according to experts such as the U.S. technology company Symantec.
Asked about Stuxnet, U.S. Navy Vice Admiral Bernard McCullough, head of Cyber Command's Navy component, told Reuters: "It has some capabilities we haven't seen before."
Discovered in June, Stuxnet -- named for parts of its embedded code -- is capable of reprogramming software that controls such things as robot arms, elevator doors and HVAC climate control systems, said Sean McGurk, who has studied it for the U.S. Department of Homeland Security at an Idaho lab that grabs live viruses from the Internet and serves as a kind of digital Petri dish.
"We're not looking right now to try to attribute where it came from," McGurk told reporters at the National Cybersecurity and Communications Integration Centre that he runs in Arlington, Virginia. "What we're focussing on now is how to mitigate and prevent the spread," he said on September 24.
And then there is China. Its cyber clout has been a growing concern to U.S. officials amid bilateral strains over U.S. arms sales to Taiwan, Beijing's currency policies, its territorial claims in the South China Sea and other irritants.
Beijing appears to have thoroughly pierced unclassified U.S. government networks, said Dmitri Alperovitch, who heads Internet-threat intelligence analysis and correlation for McAfee, a software and security vendor that counts the Pentagon among its clients.
"In the U.S. when you're sending an email over an unclassified system you might as well copy the Chinese on that email because they'll probably read it anyway because of their pretty thorough penetration of our network," he says.
Still, Chinese cyber capabilities lag those of the United States, Russia, Israel and France in that order, adds Alperovitch. He headed McAfee's investigation into Aurora, a codename for a cyber espionage blitz on high-tech Western companies that led Google to recast its relationship with China earlier this year.
Cyber arms entail "high reward, low risk" says Jeffrey Carr, a consultant to the United States and allied governments on Russian and Chinese cyber warfare strategy and tactics.
Lynn, the deputy defence secretary steering the military's cyber overhaul, went to Brussels on September 14 to brief NATO allies on U.S. cyber defence initiatives. He encouraged them to take action to secure NATO networks, said Bryan Whitman, a Pentagon spokesman.
Some U.S. computer defences are already linked with those of its allies, notably through existing intelligence-sharing partnerships with Britain, Canada, Australia and NATO. But "far greater levels of cooperation" are needed to stay ahead of the threat, Lynn says.
NATO's secretary-general, Anders Fogh Rasmussen, "believes that this is a growing problem and that it can reach levels that can threaten the fundamental security interests of the alliance," NATO spokesman James Appathurai said.
A Rasmussen-compiled draft of a new NATO vision statement is due to be approved by NATO states at a November 19-20 summit in Lisbon and will endorse a more prominent cyber defence role for the alliance.
They all agree that castle walls alone are no longer an option.
Recommend
Send
IM Story
Print
Related Articles
Lead poisoning kills 400 children in Nigeria: MSF AFP - Wednesday, October 6
World pours 11.7 billion dollars into anti-AIDS fight AFP - 33 minutes ago
Wall Street springs to five-month high AFP - 46 minutes ago
Rebel chief arrested in DR.Congo over mass rape: UN AFP - 58 minutes ago
Hungary declares emergency as toxic mud spill kills four AFP - 1 hour 1 minute ago
News Search
Top Stories
World pours 11.7 billion dollars into anti-AIDS fight
Wall Street springs to five-month high
US pledges 4 billion dollars to fight AIDS, other diseases
Wonder carbon pioneers win Nobel Physics Prize
US services 'grow more than expected' in September
More Top Stories »
ADVERTISEMENT
Most Popular
Most Viewed
Most Recommended
Global marine life census charts vast world beneath the seas
Doctors fueled US starlet's drug addiction
US deficit is 'real and growing' threat: Bernanke
Iraq oil reserves overtake Iran
French rogue trader Kerviel jailed for three years
More Most Viewed »
US state executes first woman in nearly 100 years
Workers swarm Europe's streets in anti-cuts protests
More Most Recommended »
Elsewhere on Yahoo!
Financial news on Yahoo! Finance
Stars and latest movies
Best travel destinations
More on Yahoo! News
Home
Singapore
Asia Pacific
World
Business
Entertainment
Sports
Technology
Subscribe to our news feeds
Top StoriesMy Yahoo!RSS
» More news feeds | What are news feeds?
Also on Yahoo!
Answers
Groups
Mail
Messenger
Mobile
Travel
Finance
Movies
Sports
Games
» All Yahoo! Services
Site Highlights
Singapore
Full Coverage
Most Popular
Asia Entertainment
Photos
World Cup 2010
Yahoo! News Network
Copyright © 2010 Yahoo! Southeast Asia Pte. Ltd. (Co. Reg. No. 199700735D). All Rights Reserved.
Terms of Service |
Privacy Policy |
Community |
Intellectual Property Rights Policy |
Help
Other News on Wednesday, 6 October 2010 Jewish settlers replace Korans burnt in West Bank
Zambia orders Internet providers closed over licences
US pledges 4 billion dollars to fight AIDS, other diseases
Taliban steps up attacks in Kandahar with blasts
Multimedia creates the buzz at world's biggest book fair
Wonder carbon pioneers win Nobel Physics Prize
Italians help save heritage by texting
2 explosions rock southern Afghan city, killing 8
US services 'grow more than expected' in September
US-TECH Summary
Saudi prince killed servant, London court told
|
Afghan militant attacks kill 4 civilians, wound 6
Eiffel Tower, Brandenburg Gate On Al Qaeda's Hit List
Silver Most Popular Car Color Across the Globe
AT&T to sell three Motorola smartphones
ABC Family Cancels Nikki Blonsky's "Huge"
Firefighters Allow Home, Pets to Burn Because of Unpaid Service Fee
US consumers snapping up Android phones: survey
Rocket attack kills 2 civilians, wounds 6 others
U.S. warns Lebanon against Ahmadinejad visit to South
|
New Poll Still Has Rubio Leading Crist By Wide Margin
UAE and BlackBerry users stick to device as deadline nears
American Express Fights Antitrust Suit; MasterCard, Visa Settle
Afghan ambush kills 9 and wounds 25 in restive south
|
Nokia MeeGo chief leaves ahead of key launch
Reba, Sugarland, Rascall Flatts Added To CMA Awards Performers Line-Up
U.N. says captures rebel who led Congo rapes
|
A Conversation With President Obama To Air On MTV, BET, CMT
Special report: The Pentagon's new cyber warriors
Schwarzenegger Vetoes Declaw, Debark Legislation
N.Korea's heir apparent watches military drill
Ecuador extends state of alert after police unrest
|
Steven Tyler, Idina Menzel To Guest Star On Musical "Wonderland" Episode Of "Wonder Pets!"
UN praises East Timor human rights progress
US-TECH Summary
Small plane crashes in Bahamas, at least seven killed
|
'Superman' to fly again, under director Zack Snyder
N.Korea jamming device 'a new security threat'
Singapore Chinese put their bling on show in Paris
French arrest 12 in anti-terror raids amid attack warnings
AT&T to sell three Motorola smartphones
Special report
Japan tech fair offers glimpse of future lifestyles
Nokia MeeGo chief leaves ahead of key launch
Thai court clears way for Viktor Bout extradition
'Superman' to fly again, under director Zack Snyder
Israeli orchestra to play at German Wagner festival
Feathers and fountains at Chanel, romance at Valentino
Turkish company shoots Israel raid film on stormed ship
Italian eyewear giant to make Coach glasses
Want to shed pounds? Sleep longer say experts
Film for Hanoi millennium seen as too Chinese
AT&T to sell three Motorola smartphones
|
Placebo cancel concerts in Spain, Portugal
Paris takes fashion flight to tropics
Facebook & Twitter used in stock fraud: U.S. prosecutor
|
Netherlands regrets Indonesian president postponed visit
Yahoo buys Web advertising firm Dapper
|
BMW financial arm launches India operations
Qualcomm suspends Flo TV sales
|
No-Glasses 3D TV Set For December Launch In Japan
Airline, Union Clash Over Dancing Flight Attendants
Gunmen Kidnap 22 Acapulco Tourists
Indonesian Train Collision Kills 36
Kanye West enters Beautiful Dark Twisted Fantasy
|
Philip Roth reflects on novel's decline and Nemesis
|
CNN's Parker Spitzer debuts to scathing reviews
|
Taliban in talks with Karzai government: report
Kenzo's birthday show whisks Paris back in time
NASA to launch new mission to Mars
Taliban and Afghan government hold talks to end war: report
|
Spain vows to press Venezuela over ETA allegations
Gunmen attack NATO supply trucks in Pakistan
|
Wade out early in LeBron's Miami debut win
British embassy vehicle targeted in Yemen explosion: source
|
Dracula fish, bald bird among strange new species
Samsung Elec says 5 million Galaxy smartphones sold
Saudi prince killed servant, London court told
|
Hungary declares emergency as toxic mud kills four
France warns travelers against UK terror threat
|
Motorola, Verizon to sell Droid business phone
Wall Street at five-month high
North Korea nuclear threat is alarming, says South
|
World pours 11.7 billion dollars into anti-AIDS fight
Qualcomm pulls plug on Flo TV device sales
NATO to issue results of Pakistan cross-border probe
|
Qualcomm suspends Flo TV sales
buys display ad firm Dapper
Vietnam-China row over detained sailors intensifies
|
Yahoo buys Web advertising firm Dapper
Google asks court to dismiss Oracle patent suit
Taliban, Afghan government hold talks to end war
Taliban blow up NATO tankers to avenge drone attacks
Fiji opposition leader denies holding illegal meeting
Thai court clears way for Viktor Bout extradition
N.Zealand TV presenter in new race row
US-TECH Summary
North Korea nuclear threat is "alarming," says South
Documentarian Marshall Flaum dies at 85
Samsung Elec says 5 million Galaxy smartphones sold
Beijing confirms US-China defence ministers to meet
Motorola, Verizon to sell Droid business phone
|
"Avatar" special edition set for November release
Google denies Oracle's Android copyright complaint
|
Gunmen attack NATO supply trucks in Pakistan
Motorola, Verizon to sell Droid business phone
Samsung Elec says 5 million Galaxy smartphones sold
|
Women's website starts petition to save 'Huge'
'Whale strike' downs Australian fishing boat
Qualcomm pulls plug on Flo TV device sales
Confusion, apathy explain poor Games ticket sales
Taiwan HTC Q3 profit almost double
|
Court removes 'Merchant of Death' extradition hurdle
Thailand blames 'Red Shirts' for deadly bomb blast
NZ actor Sam Neill urges end to 'Hobbit' row
US-ENTERTAINMENT Summary
Documentarian Marshall Flaum dies at 85
China's scorched environment inspires artist Zeng
Tom Hanks circling "Sleeping Dogs"
"Avatar" special edition set for November release
"Heist," "Wanderlust" in cards for Alan Alda
MTV to revive "Punk'd" with Justin Bieber
"GhettoPhysics" an awkward but sharp-eyed mashup
Bodies unclaimed as Indonesia flood toll rises
EU-China tug-of-war hampers global recovery drive
Seoul shares up on foreign buying; techs, shipbuiders gain
S.Korea Q3 FDI down 13 pct; likely to miss 2010 target
Taiwan dollar, stocks rise on foreign fund inflows
South Korea treasury bonds flat on won's rebound
Spider-Man gets his new gal in Emma Stone
|
Seoul shares open up on U.S. gains; Hynix up
Tom Hanks circling Sleeping Dogs
|
Avatar special edition set for November release
|
US to include Malaysia in Trans-Pacific trade negotiations
Documentarian Marshall Flaum dies at 85
|
NZ new car registrations rise in September
Heist, Wanderlust in cards for Alan Alda
|
EU, Malaysia kick off free trade talks
CNN's Parker Spitzer gets bad reviews, low ratings
|
MTV to revive Punk'd with Justin Bieber
|
Europe pressures China as currency war bites
Linkin Park's Bennington says new album shows maturity
|
Burton remains faithful to McQueen in fashion debut
|
German industrial orders surge in August
Deutsche Bank record capital increase 'a success'
Hungary crews search for missing after red mud spill
|
Fitch cuts Ireland's debt ratings
British official wounded in Yemen rocket attack
Militants attack two Western targets in Yemen
|
British diplomat injured in Yemen attack: ministry
Countries release text of anti-counterfeiting pact
|
Kyrgyzstan to vote amid fears of more violence
|
ThyssenKrupp forecasts one billion euro profit
Climate talks struggle as China, U.S. face off
|
Explosion near British embassy in Yemen
Costco Q4 Profits Up 16 Percent
US-TECH Summary
Hamas armed wing warns PA over West Bank arrests
|
Obama Times His India Visit With Annual Festival
France issues UK terror alert, Germany plays down threat
|
Justin Bieber The Next Host Of Ashton Kutcher's "Punk'd"
Samsung says 5 million Galaxy S sold, launches handset
Iraqi Christians flee homeland even as war fades
|
Colorado Police Probe Craigslist Ad Giving Away Infant
Fish Living Near Power Plants Have Lower-Than Expected Mercury Levels
U.S. Women Need To Eat More Fruits, Vegetables, Researchers Say
Seriously Injured "Transformers 3" Extra Sues Studio
"Legend Of The Seeker" Final Season Released On DVD
Scientists find 200 new species in Papua New Guinea
Testing Of D.C. Pilot Online Voting System Resumes After Hacking
Aussies in charge in Delhi, fans snub athletics
IMF Calls For Action As Global Financial System Vulnerable
Japan ruling party crafts stimulus after BOJ eases
Dutch court rejects Indonesian president arrest call
Briton killed in Pakistan linked to failed NY bomber
'World's biggest book' launched at fair
HP to launch new webOS phones in early 2011
|
Japan ruling party seeks $58 bln extra budget
'Real women' elbow girls off the catwalks
Dancing Israeli soldier video goes viral
|
Pakistani rupee firms on soft dlr demand; stocks flat
Taiwan regulator rejects bid for Metlife unit
RPT-UPDATE 1-Taiwan seeks more talks on Carlyle unit sale-source
Smartphone maker HTC quarterly profit almost doubles
|
Chip maker AMD not for sale, CEO says
|
EU, South Korea sign major free trade deal
Hochtief wants ACS to bid for Australia's Leighton
Q+A-Taiwan to shout down, not regulate, "hot money" tide
S.Korea firm's superconductor cable market plans
Seoul shares up 1.3 pct at 33-month closing high
Film simulates Afghan capture of Prince Harry
|
Smartphone maker HTC quarterly profit almost doubles
'Enhanced ebooks' take giant book fair by storm
Chip maker AMD not for sale, CEO says
HP to launch new webOS phones in early 2011
Taiwan HTC Q3 profit almost double
Google denies Oracle's Android copyright complaint
Greece at new risk of being pushed off euro
Bodies of missing Tenn. mom, Jo Ann Bain, and daughter found
Female Breasts Are Bigger Than Ever
AMD Trinity Accelerated Processing Units Now in Volume Production
The Avengers (2012 film), made the second biggest opening- and single-day gross of all-time
AMD to Start Production of piledriver
Ivy Bridge Quad-Core, Four-Thread Desktop CPUs
Islamists Protest Lady Gaga's Concert in Indonesia
Japan Successfully Broadcasts an 8K Signal Over the Air
ECB boosts loans to 1 trillion Euro to stop credit crunch
Egypt : Mohammed Morsi won with 52 percent
What do you call 100,000 Frenchmen with their hands up
AMD Launches AMD Embedded R-Series APU Platform
Fed Should not Ignore Emerging Market Crisis
Fed casts shadow over India, emerging markets
Why are Chinese tourists so rude? A few insights