Blog Posts Tagged with "National Security"

94ae16c30d35ee7345f3235dfb11113c

Stuxnet: Classified Disclosures for Political Gain

June 04, 2012 Added by:Joel Harding

Operations Security or OPSEC is strictly enforced in the military, this is one of the basic tenets of Information Operations. We have had problems with Senators and Congressmen in the past disclosing classified information when doing so suited their purpose. Now the President has become the “Discloser in Chief”...

Comments  (8)

Bd623fa766512fdf6b57db66f522b741

The Next War on Terror Will Be (Lost) Online

May 31, 2012 Added by:Ali-Reza Anghaie

Consider we might be putting our cyber soldiers on the wrong line. Sure, there are growing ranks of cyber counter-terrorism practitioners across both private and public space, except that's only to meet the enemy we really want to see - the one that suits perhaps what we're comfortable doing or getting funding for...

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Memorial Day – A Big Thank You

May 27, 2012 Added by:Thomas Fox

Today is Memorial Day, the day we celebrate the men and women who have served our country in our armed forces. I would ask each of you to honor our veterans, even if it is just a moment to reflect on those who made the ultimate sacrifice in giving their lives to protect the rest of us...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Iranian Hackers Hit NASA: Isolated Attack or Act of Cyberwar?

May 24, 2012 Added by:Pierluigi Paganini

Hackers have written an HTTPS protocol scanner to find weaknesses in the NASA website. A NASA spokesman hasn't denied the hack, and the agency is investigating the event. Is it an isolated operation conducted by a group of hackers, or a state-sponsored act of cyberwar?

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

FBI: Al-Qaeda Video Calls for Electronic Jihad against the US

May 24, 2012 Added by:Dan Dieterle

A 6 minute Al Qaeda video translated by the FBI calls for extremist followers to perform cyber attacks against the US. The video states that US computer systems are as vulnerable to electronic warfare as airline security was leading up to the 9/11 attacks...

Comments  (0)

54a9b7b662bfb0f0445d1661d7ed180b

Security: Back to the "Made in the USA" Tradition

May 23, 2012 Added by:Jayson Wylie

The US government’s Department of Defense had, and may still have, issues with counterfeit components being procured and used in military weapons, vehicles and equipment. It’s a national security issue when the supply chains are compromised by weaknesses and scams...

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

Notes on Electromagnetic Pulse (EMP) in US, UK, NL

May 22, 2012 Added by:Matthijs R. Koot

In 2009, there was a discussion on a forum for pilots about an article that argued that a commercial aircraft could be brought down by DIY EMP bombs. Also in 2009, the U.S. Patent Application for an Electromagnetic pulse (EMP) hardened information infrastructure was filed...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

Hard Power, Soft Power, and the Power of Digital Espionage

May 21, 2012 Added by:Infosec Island Admin

By combining the military, the economic, and the political aspects of soft and hard power, and the gray’s in between, China has become a force to be reckoned with. In order to better understand the mosaic, we need to re-tool some of the ideas we have preconceived for ourselves...

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

US vs. China: Is the Cyber Warfare Gap Increasing?

May 21, 2012 Added by:Pierluigi Paganini

"We continue to see China expressing interest in making investments to improve their capacity for operations in cyberspace, and that is something that we pay very, very careful attention to. There is the potential for these types of operations to be very disruptive..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Security Developments Involving the People’s Republic of China

May 21, 2012 Added by:Headlines

"In 2011, computer networks and systems around the world continued to be targets of intrusions and data theft, many of which originated within China. Although some of the targeted systems were U.S. government-owned, others were commercial networks owned by private companies..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

SCADA Security: Consequences and Difficulty with Incentives

May 18, 2012 Added by:Rafal Los

Here's the problem - when it comes to critical infrastructure protection it's very difficult to legislate and regulate the organizations that matter into a state of better security. The problem is that in order to enforce policy and rules there either have to be consequences to failing, or incentives not to fail - or both...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Enhances Cybersecurity Collaboration with Australia

May 18, 2012 Added by:Headlines

This statement of intent will help enhance situational awareness and information sharing on cybersecurity issues, increase collaboration and sharing of cybersecurity best practices, and create opportunities for training and cooperation in cyber exercises...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Air Force Command Realigns Cyberspace Capabilities

May 18, 2012 Added by:Headlines

"As the lead major command for space and cyberspace, Air Force Space Command is chartered to organize, train and equip space and cyberspace forces and is tasked to review and efficiently use the resources assigned to the command," said Lt.Gen. Michael J. Basla...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

White House Cybersecurity Coordinator Howard Schmidt Resigns

May 17, 2012 Added by:Headlines

"It has been a tremendous honor for me to have served in this role and to have worked with such dedicated and professional colleagues both in the government and private sector. We have made real progress in our efforts to better deal with the risks in cyberspace..."

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Has Anonymous Infiltrated the US Government?

May 16, 2012 Added by:Pierluigi Paganini

"Right now we have access to every classified database in the U.S. government. It’s a matter of when we leak the contents of those databases, not if. You know how we got access? We didn’t hack them. The access was given to us by the people who run the systems…"

Comments  (6)

5106d48203954b74e6ea495e5c7f21b0

No National 'Stand Your Cyberground' Law Please

May 14, 2012 Added by:William Mcborrough

We know that some attacks on our privately owned critical infrastructure have been attributed to foreign government networks. Would it be wise to license companies to attack these networks? The last thing we need is an international incident started by some SysAdmin..

Comments  (0)

Page « < 2 - 3 - 4 - 5 - 6 > »