Blog Posts Tagged with "Military"

Bd623fa766512fdf6b57db66f522b741

A Navy SEAL Provides Lessons on Security

April 12, 2012 Added by:Ali-Reza Anghaie

Powerful Peace absolutely applies in our field. Information Security professionals can draw out the roadmap to economic and potential physical catastrophe. In this field we won't have the benefit of hindsight, we need to get it right before it gets out of control...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Defense Department to Accelerate Cyber Weapons Development

April 10, 2012 Added by:Headlines

“Cyberweapons are fundamentally different... You can make a general-purpose fighter plane and it will function more or less the same in the Pacific as in the Atlantic. The same is not true for going after a Russian cyber-target versus a Chinese target..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

An Anatomy of US Cyber Command

April 10, 2012 Added by:Dan Dieterle

When you think of USCYBERCOM, the Air Force comes to mind immediately. Since the beginning, the Air Force has been a driving force behind US Cyber War. But there is another group that is more responsible for the creation of USCYBERCOM and actually forms the Command’s backbone...

Comments  (1)

C4363f41d25c216c53c8d71a1ac44a90

Dutch Response to AIV/CAVV Advice on Digital Warfare

April 09, 2012 Added by:Matthijs R. Koot

The digital domain is a new operational domain for the armed forces. The Ministry of Defense is investing to significantly strengthen existing capabilities and develop new ones including offensive. The right to self-defense also applies to cyber attacks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

New Commander Leads Air Force Cyber Warriors

April 09, 2012 Added by:Headlines

As commander of 50 NOG, Sutherland is responsible for 1,500 military, DoD civilian and contractor personnel assuring access to cyberspace by operating and maintaining the $6.2 billion Air Force Satellite Control Network and the $100 million communications and information gateway...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Infosec: The Eternal Struggle

April 06, 2012 Added by:Infosec Island Admin

The military and the government movers and shakers are all moving with fear tinged with desire, for more control over the internet as a whole while the beltway bandits are all in the wings, like a murder of crows watching dark eyed, waiting for their moment to strike...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Northern Command Makes Cyber Security a Priority

March 26, 2012 Added by:Headlines

Northcom's responsibility in the cyber domain "is consequence management in the event of a catastrophic cyber attack on this country. Northcom could certainly be called upon to provide support to civil authorities in the recovery. But we think our role is broader..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Defense Department Finalizing Cyberwar Operations Guidelines

March 21, 2012 Added by:Headlines

“I think the capabilities are available in cyber to virtually cripple this nation, to bring down the power grid system, to impact on our governmental systems, to impact on Wall Street on our financial systems, and literally to paralyze this country..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Digital Posse Comitatus: Generals Obfuscate and Inveigle Congress

March 21, 2012 Added by:Infosec Island Admin

9/11 opened the floodgates to the world of warrantless wiretaps and surveillance culture we now have and diminished the lines between military and civilian agencies collection and alleged sharing of data. In the case of the NSA though, the abilities were always there...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Nuclear Facility Networks "Under Constant Attack"

March 20, 2012 Added by:Headlines

"Stuxnet showed that airgapping is not a perfect defense. Even in secure systems, people stick in their thumb drives, they go back and forth between computers. They can find vulnerabilities that way. If people put enough attention to it, they can possibly be penetrated..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Millions of US Government Email Addresses for Sale

March 19, 2012 Added by:Pierluigi Paganini

An underground black market is offering 2,462,935 U.S government email addresses and another 2,178,000 U.S military email addresses for sale. The risks are really serious, as this information could be used by hostile government in cyber attacks and cyber espionage activities...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Army's First Dedicated Cyber Brigade Now Operational

March 19, 2012 Added by:Headlines

"It’s a very complex threat—pervasive, evolving, highly intelligent, very adaptive to our countermeasures. It ranges from nation-states to non-nation-state actors, criminal elements and individual hackers... It’s a wide and varied threat we have to defend against..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Use of Social Networks for Cyber Espionage

March 13, 2012 Added by:Pierluigi Paganini

There has been an upsurge in cyber espionage by governments in search of information relating to military and industrial technologies. Of strategic importance for these activities are social networks through which one can trace a target's relationships, habits, and location...

Comments  (1)

E11e506024f5d2b70f037b9af4734f33

Chinese Network Operations and Cyber Espionage Capabilities

March 09, 2012 Added by:Stefano Mele

Developments in Chinese network operations applications and research and development point to a nation fully engaged in leveraging all available resources to create a technically advanced ability to operate in cyberspace as a means of meeting military and civilian goals...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Northrop Report Examines Chinese Information Warfare Strategies

March 08, 2012 Added by:Headlines

"PLA leaders have embraced the idea that successful warfighting is predicated on the ability to exert control over an adversary’s information and information systems, often preemptively. This goal has effectively created a new strategic and tactical high ground..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

North Korea’s Cyber War Forces

March 06, 2012 Added by:Dan Dieterle

North Korean Students that show aptitude are selected from elementary schools and are groomed in cyber warfare throughout their college years. They constantly hone their skills and even attend foreign colleges to learn the latest security techniques...

Comments  (0)

Page « < 3 - 4 - 5 - 6 - 7 > »