Items Tagged with "Military"
April 16, 2012 Added by:Headlines
“I think it’s very important to do as much as we can to prevent and mitigate the threat at home, but we can only get so far acting unilaterally. We have to act in concert… with countries around the world to address this problem...”
April 13, 2012 Added by:Ron Baklarz
Was it me or when they showed the North Korean Space Control Center did it not look like a group of students at a code fest? Seriously, there were no large screens for tracking and I’ve seen more computing power at the local senior citizens home...
April 12, 2012 Added by:Ali-Reza Anghaie
Powerful Peace absolutely applies in our field. Information Security professionals can draw out the roadmap to economic and potential physical catastrophe. In this field we won't have the benefit of hindsight, we need to get it right before it gets out of control...
April 10, 2012 Added by:Headlines
“Cyberweapons are fundamentally different... You can make a general-purpose fighter plane and it will function more or less the same in the Pacific as in the Atlantic. The same is not true for going after a Russian cyber-target versus a Chinese target..."
April 10, 2012 Added by:Dan Dieterle
When you think of USCYBERCOM, the Air Force comes to mind immediately. Since the beginning, the Air Force has been a driving force behind US Cyber War. But there is another group that is more responsible for the creation of USCYBERCOM and actually forms the Command’s backbone...
April 09, 2012 Added by:Matthijs R. Koot
The digital domain is a new operational domain for the armed forces. The Ministry of Defense is investing to significantly strengthen existing capabilities and develop new ones including offensive. The right to self-defense also applies to cyber attacks...
April 09, 2012 Added by:Headlines
As commander of 50 NOG, Sutherland is responsible for 1,500 military, DoD civilian and contractor personnel assuring access to cyberspace by operating and maintaining the $6.2 billion Air Force Satellite Control Network and the $100 million communications and information gateway...
April 06, 2012 Added by:Infosec Island Admin
The military and the government movers and shakers are all moving with fear tinged with desire, for more control over the internet as a whole while the beltway bandits are all in the wings, like a murder of crows watching dark eyed, waiting for their moment to strike...
March 26, 2012 Added by:Headlines
Northcom's responsibility in the cyber domain "is consequence management in the event of a catastrophic cyber attack on this country. Northcom could certainly be called upon to provide support to civil authorities in the recovery. But we think our role is broader..."
March 21, 2012 Added by:Headlines
“I think the capabilities are available in cyber to virtually cripple this nation, to bring down the power grid system, to impact on our governmental systems, to impact on Wall Street on our financial systems, and literally to paralyze this country..."
March 21, 2012 Added by:Infosec Island Admin
9/11 opened the floodgates to the world of warrantless wiretaps and surveillance culture we now have and diminished the lines between military and civilian agencies collection and alleged sharing of data. In the case of the NSA though, the abilities were always there...
March 20, 2012 Added by:Headlines
"Stuxnet showed that airgapping is not a perfect defense. Even in secure systems, people stick in their thumb drives, they go back and forth between computers. They can find vulnerabilities that way. If people put enough attention to it, they can possibly be penetrated..."
March 19, 2012 Added by:Pierluigi Paganini
An underground black market is offering 2,462,935 U.S government email addresses and another 2,178,000 U.S military email addresses for sale. The risks are really serious, as this information could be used by hostile government in cyber attacks and cyber espionage activities...
March 19, 2012 Added by:Headlines
"It’s a very complex threat—pervasive, evolving, highly intelligent, very adaptive to our countermeasures. It ranges from nation-states to non-nation-state actors, criminal elements and individual hackers... It’s a wide and varied threat we have to defend against..."
March 13, 2012 Added by:Pierluigi Paganini
There has been an upsurge in cyber espionage by governments in search of information relating to military and industrial technologies. Of strategic importance for these activities are social networks through which one can trace a target's relationships, habits, and location...
March 13, 2012
The INSA white paper provides critical analysis of current cloud computing adoption best practices, and discusses potential cost savings, likely impacts on government organizational culture, potential deployment models and necessary security measures...