Items Tagged with "Military"


69dafe8b58066478aea48f3d0f384820

Air Force General Urges Enhanced Cyber Deterrence

January 27, 2011 Added by:Headlines

“If we elect to use cybercapability to deter — and you don’t necessarily have to, you can use something else to deter bad cyberbehavior — [but] if we’re going to use cybercapabilities to deter, that’s going to beg for some demonstration of that capability..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Pentagon Fails to Disclose Covert Cyber Ops

January 13, 2011 Added by:Headlines

A classified report on military operations provided to Congress by he Pentagon failed to disclose the military's use of cyber-based operations. The Pentagon's Michael Vickers, replied by questioning whether or not cyber ops are covered by the law that dictates what should be covered in the reports...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Military and Government Exposures Down in 2010

January 10, 2011 Added by:Headlines

Other then breaches reported by the media and a few progressive state websites, there is little or no information available on many data breach events.It is clear without a mandatory national reporting requirement that many data breaches will continue to be unreported, or underreported...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

USB Device Containing Military Secrets Missing

January 05, 2011 Added by:Headlines

A removable USB storage device, alleged to contain classified level-two U.S. military secrets, is missing in South Korea. The unit was first reported missing in July, but the Army officer responsible for the hardware falsely reported that he had located and then discarded the device...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Body of Cyberwarfare Expert Discovered in Landfill

January 04, 2011 Added by:Headlines

Noted cyberwarfare expert John Wheeler's body was discovered on New Years Eve in a Delaware landfill. Wheeler was an expert in cyberwarfare and counter-ops technologies, and advised the military on the establishment of Cyberspace Forces as the Special Assistant to the Secretary of the Air Force...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Bogus Chinese Processors Used in Missile Systems

November 23, 2010 Added by:Headlines

An administrator at VisionTech plead guilty to charges she assisted in selling sub-grade Chinese computer processors to DoD contractors for use in U.S. military weapons systems. Companies that bought the components include Northrop Grumman, Raytheon Missile Systems, and BAE Systems...

Comments  (0)

D13f77e036666dbd8f93bf5895f47703

Pentagon Considers Preemptive Strikes as Cyberdefense

September 17, 2010 Added by:Theresa Payton

Safety & privacy - they can coexist but there is a healthy tension. Sometimes we give up privacy to be secure. Sometimes we guard our privacy and knowingly or unknowingly give up some of our security. It's a true conundrum. How much privacy are we willing to give up for that safety?

Comments  (0)

A88973e7d0943d295c99820ab9aeed27

Analysis of the 2008 Pentagon Hack

August 30, 2010 Added by:Simon Heron

Are we to believe that a foreign government trying to hack into the Pentagon would use a relatively benign worm based on an existing and two-year old worm, SillyFDC, that had limited ability once installed? Or would they go for something a bit more sophisticated?

Comments  (3)

21d6c9b1539821f5afbd3d8ce5d96380

Army Private Cloud RFP Released

August 07, 2010 Added by:Kevin L. Jackson

Traditionally the Army has used a relatively decentralized approach to provision of information systems and services. This approach has enabled significant innovation and enhanced warfighting capability. The Army is now ready to leverage a more centralized approach...

Comments  (0)

34200746591339726df9791b17bc885c

In Rebuke of China

February 02, 2010 Added by:Tom Schram

In the current issue of Foreign Affairs, former NATO Commander General Wesley K. Clark and current Department of Veteran Affairs CTO Peter Levin write:  “There is no form of military combat more irregular than an electronic attack: It is extremely cheap, is very fast, can be carrier out anonymously, and can disrupt or deny critical servi...

Comments  (3)

Page « < 8 - 9 - 10 - 11 - 12 > »