Blog Posts Tagged with "Electronic Warfare"
January 18, 2013 Added by:Joel Harding
I know the Chinese recently held a military exercise under constrained conditions, they even advertised it ex post facto. Why don’t we? I would see that as the perfect opportunity to increase the cross-pollination, knowledge and appreciation between Electronic Warfare and cyber...
May 24, 2012 Added by:Dan Dieterle
A 6 minute Al Qaeda video translated by the FBI calls for extremist followers to perform cyber attacks against the US. The video states that US computer systems are as vulnerable to electronic warfare as airline security was leading up to the 9/11 attacks...
May 21, 2012 Added by:Joel Harding
I received an alert recently about an article dealing with Electronic Warfare or EW. Since EW has always been one of the components of Information Operations I decided to take a look. Mistake. My very first indicator, before I even had to think, was that the title was in ALL CAPS...
January 03, 2012 Added by:Joel Harding
Now in the very likely propaganda department… The Voice of Russia is stating in an article published recently that Iran is offering access to their recently acquired RQ-170 Sentinel, reputedly a captured CIA collection platform, to Russia and China...
December 20, 2011 Added by:Joel Harding
Iran is claiming that an “electronic warfare” unit forced down an US RQ-170 Sentinel Drone through a cyber attack. The Iranians are saying they are close to uncovering all the secrets contained in the drone and unlocking the software. Instead of a detailed explanation, I just say BS...
December 18, 2011 Added by:Scot Terban
The documents show a program to “augment” the GPS environment in Iran by placing base stations with the Fajr GPS (GBAS) network/hardware in specific sites throughout the country to ostensibly help with aircraft navigation. In their presentation, they mention the possibility of spoofing...
December 17, 2011 Added by:Joel Harding
Cyber attack? Oh come on now. This would be a highly complex operation and I doubt even the Russians have that capability. First you would need to inject the proper commands into the system. Then, you’d have to establish a link through the CandC network from Beale or Creech Air Force Base...
December 15, 2011 Added by:Ron Baklarz
While it is reported that intercepting unencrypted drone communication data streams had first been known to US military since the mid-1990's, this exploitation continued on into 2009 where militant laptops were found with drone data and unencrypted video feeds from Predator drones...
November 17, 2011 Added by:Scot Terban
It’s pretty damned hard to determine who did what and where on the net. Digital forensics only gets you so far - compromised machines can be tampered with in so many ways to make it look like someone did something, and these guys want to launch cruise missiles against nation states over a DDoS?
November 03, 2011 Added by:Dan Dieterle
Granted you would be coming in through a firewall to attack a computer, but is it really any different than attacking it through radar waves? Especially if the results would be the same, or very similar? If this is true, then is cyber warfare really any different from Electronic Warfare?
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013