Items Tagged with "Military"
January 27, 2011 Added by:Headlines
“If we elect to use cybercapability to deter — and you don’t necessarily have to, you can use something else to deter bad cyberbehavior — [but] if we’re going to use cybercapabilities to deter, that’s going to beg for some demonstration of that capability..."
January 13, 2011 Added by:Headlines
A classified report on military operations provided to Congress by he Pentagon failed to disclose the military's use of cyber-based operations. The Pentagon's Michael Vickers, replied by questioning whether or not cyber ops are covered by the law that dictates what should be covered in the reports...
January 10, 2011 Added by:Headlines
Other then breaches reported by the media and a few progressive state websites, there is little or no information available on many data breach events.It is clear without a mandatory national reporting requirement that many data breaches will continue to be unreported, or underreported...
January 05, 2011 Added by:Headlines
A removable USB storage device, alleged to contain classified level-two U.S. military secrets, is missing in South Korea. The unit was first reported missing in July, but the Army officer responsible for the hardware falsely reported that he had located and then discarded the device...
January 04, 2011 Added by:Headlines
Noted cyberwarfare expert John Wheeler's body was discovered on New Years Eve in a Delaware landfill. Wheeler was an expert in cyberwarfare and counter-ops technologies, and advised the military on the establishment of Cyberspace Forces as the Special Assistant to the Secretary of the Air Force...
November 23, 2010 Added by:Headlines
An administrator at VisionTech plead guilty to charges she assisted in selling sub-grade Chinese computer processors to DoD contractors for use in U.S. military weapons systems. Companies that bought the components include Northrop Grumman, Raytheon Missile Systems, and BAE Systems...
September 17, 2010 Added by:Theresa Payton
Safety & privacy - they can coexist but there is a healthy tension. Sometimes we give up privacy to be secure. Sometimes we guard our privacy and knowingly or unknowingly give up some of our security. It's a true conundrum. How much privacy are we willing to give up for that safety?
August 30, 2010 Added by:Simon Heron
Are we to believe that a foreign government trying to hack into the Pentagon would use a relatively benign worm based on an existing and two-year old worm, SillyFDC, that had limited ability once installed? Or would they go for something a bit more sophisticated?
August 07, 2010 Added by:Kevin L. Jackson
Traditionally the Army has used a relatively decentralized approach to provision of information systems and services. This approach has enabled significant innovation and enhanced warfighting capability. The Army is now ready to leverage a more centralized approach...
February 02, 2010 Added by:Tom Schram
In the current issue of Foreign Affairs, former NATO Commander General Wesley K. Clark and current Department of Veteran Affairs CTO Peter Levin write: “There is no form of military combat more irregular than an electronic attack: It is extremely cheap, is very fast, can be carrier out anonymously, and can disrupt or deny critical servi...