Items Tagged with "Military"
July 18, 2012 Added by:Matthijs R. Koot
The biggest threat in the digital domain is due to high-end and complex digital offensive capabilities that are targeted at a specific targets that can severely limit the the armed forces' ability to act. A lack of insight into digital possibilities to carry out attacks is a real risk to the armed forces...
July 17, 2012 Added by:Headlines
The 67th Network Warfare Wing is the Air Force's premier tactical cyber warfighting organization defending the Air Force network, transforming network operations, and providing full-spectrum capabilities across the Air Force enterprise and to U.S. Cyber Command and the Combatant Commanders...
July 16, 2012 Added by:Headlines
"Almost all cyberattacks are 'to whom it may concern' but Stuxnet was a bullet with someone's name on it. Repeating something like Stuxnet or (computer virus) Flame will be much more difficult... But the defender needs to plug all holes, while the attacker need only find one..."
July 16, 2012
DOD has taken steps to address a critical electronic warfare management gap, but it has not established a departmentwide governance framework for electronic warfare. DOD’s oversight of electronic warfare capabilities may be further complicated by its evolving relationship with computer network operations...
July 12, 2012 Added by:Stefano Mele
The DOD has specific challenges that require careful adoption considerations, especially in areas of cybersecurity, continuity of operations, information assurance, and resilience. Additional challenges include service acquisition and funding, data migration and management, and overcoming network dependence...
July 04, 2012 Added by:Headlines
“Preventing the loss of critical U.S. information and technologies is one of the most important investigative priorities of the FBI. Our adversaries routinely target sensitive research and development data and intellectual property from universities, government agencies, manufacturers, and defense contractors..."
July 02, 2012 Added by:Pierluigi Paganini
The problem is the security of these vehicles, which are based on high-tech components, and we know that nothing is totally secure. US drones are exploitable, possibly allowing hackers to take control. A team of researchers from the University of Texas at Austin recently conducted a successful hack...
June 29, 2012 Added by:Don Eijndhoven
What makes this interesting is that they are declaring that non-combatants may also be actively targeted. In essence, they are putting the world on notice that if you’re involved with a cyber attack, part of a militia or a terrorist, you have a bull’s-eye on your head. No matter where you are. Plain and simple...
June 25, 2012 Added by:Pierluigi Paganini
The discovery of new cyber weapons will be published with increasing frequency, the real question to ask is if the world is really prepared to respond to these attacks. The stakes are high, security is critical for every nation, and the whole world must be analyzed as a monolithic system...
June 20, 2012
“This strategy is not simply about embracing the newest technology - it is about keeping the DoD workforce relevant in an era when information and cyberspace play a critical role in mission success," said Teri Takai, Department of Defense chief information officer...
June 19, 2012 Added by:Jeffrey Carr
Russia plans to spend US$13B on UAS development over the next eight years. Part of that technology development strategy is almost certainly going to be acquiring intellectual property on related technology from foreign firms. Two good examples of companies at risk are Boeing and General Atomics...
June 19, 2012 Added by:Infosec Island Admin
I have said this before and I am saying it again, we are just monkeys with digital guns. Fools with tools really. I am afraid of the level of hubris here and frankly feel that it’s almost time to just become a Luddite. At least Luddites won’t be compromised by their toasters because China made malware to p0wn us...
June 12, 2012 Added by:Headlines
“Although cyberspace presents some very unique characteristics, this transitional model is designed to continue DoD’s efforts at normalizing cyber as an integrated function with other land, maritime, air and space functions,” DoD spokesperson Lt. Col. April Cunningham said...
June 12, 2012 Added by:Headlines
Manning is accused of the largest intelligence leak in U.S. history while deployed to Iraq as a military intelligence analyst, including installing unauthorized software onto government computers to extract classified information and transmitting the data to the whistle-blowing group WikiLeaks...
June 11, 2012 Added by:Joel Harding
Contrary to previous reports that Stuxnet and Flame were unrelated, the authors apparently worked together at one point. If this is the case we might begin looking for evidence of more code from Operation Olympic Games floating around. Flame provides a framework for future warfare in cyberspace...
June 11, 2012 Added by:Headlines
"To the North, it is attractive to develop cyber capabilities as it does not cost much money to establish and maintain cyber units. Another reason is it is very difficult to trace down the origin of cyber attacks, which can be a good excuse when it is blamed for any cyber attack"...