Blog Posts Tagged with "Military"

94ae16c30d35ee7345f3235dfb11113c

The Cyberworld Points at China

September 01, 2011 Added by:Joel Harding

While the rest of the world is seeking to define and quantify cyberwar, cyber espionage, cyber theft - and only then, finding ways to stop it - I believe the Chinese are nimbly spanking our butts in cyberspace – and we don’t have the guts to stop them...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Chinese Documentary Reveals Cyber Attack Software

August 23, 2011 Added by:Headlines

"Now we've got proof. They're also extending their persecution of Falun Gong overseas, attacking a civil website in the U.S. These are the clear messages revealed in these six seconds of video." said Jason Ma, a commentator for New Tang Dynasty Television...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Hackers Could Target Automated Military Systems

August 15, 2011 Added by:Dan Dieterle

Congress has created a requirement that 1/3 of ALL military ground vehicles be automated or unmanned by 2015. Are automated systems susceptible to malfunctions, glitches or software errors? Are there any instances of these systems turning on their creator? Unfortunately, yes...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Israeli Cyber Command Plans to Cripple Iran in Cyberspace

August 09, 2011 Added by:Headlines

"The center, which has been set up under the auspices of military intelligence unit 8200 has already conducted a series of 'soft' espionage missions, including hacking into Iran’s version of Facebook and other social networking sites..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Researchers Break Military Chip Encryption Keys

August 04, 2011 Added by:Dan Dieterle

In the attack, power use is monitored during the power up sequence of the chip. As it is powered up, the chip accesses a key used to decrypt the configuration data file and data stream. By analyzing the power used, the team was able to decrypt the key...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Weapon Systems Specs Stolen in Contractor Breach

July 16, 2011 Added by:Headlines

Reuters reports that a classified US military weapons system will now need to be redesigned after specs and plans for the system were stolen from a defense contractor database in a breach earlier this year...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD Releases Strategy for Operating in Cyberspace

July 15, 2011 Added by:Headlines

"Given the integrated nature of cyberspace, computer-induced failures of power grids, transportation networks, or financial systems could cause massive physical damage and economic disruption. DoD operations—both at home and abroad—are dependent on this critical infrastructure...."

Comments  (13)

69dafe8b58066478aea48f3d0f384820

UPDATE: Booz Allen Hamilton Issues Statement on Hack

July 12, 2011 Added by:Headlines

"Booz Allen Hamilton has confirmed today that the posting of certain data files on the Internet yesterday was the result of an illegal attack. We are conducting a full review of the nature and extent of the attack..."

Comments  (5)

69dafe8b58066478aea48f3d0f384820

Connexion Hack Team Dumps Military and Gov Accounts

July 08, 2011 Added by:Headlines

A new ad-hoc group of hacktivists calling itself "Connexion Hack Team" has published a list of email addresses associated with the US government including account information from the military, the Department of Homeland Security, the National Security Agency, and several state agencies...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

China: There is No Cyber War With the United States

June 22, 2011 Added by:Headlines

"The U.S. military is hastening to seize the commanding military heights... and another Internet war is being pushed to a stormy peak. To protect [China's] Internet security, we must accelerate Internet defense development and accelerate steps to make a strong Internet army..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

U.S. Rules of the Road for Cyber Warfare Issued

June 22, 2011 Added by:Headlines

"We've had 50 years in which we haven't really had to rethink what might happen in a war here. We need to think very hard about an actual strategy about how to win a war in which cyber weapons are prominently featured..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Attribution Problems Hinder U.S. Cyberwar Strategy

June 07, 2011 Added by:Headlines

"The military is setting itself up for failure because attribution is difficult, and it's easy to spoof your identity thereby falsely implicating the wrong group. A military attack could be misplaced... but at the same time not responding will now be seen as a sign of weakness..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Pentagon: Cyber Attacks Considered Act of War

May 31, 2011 Added by:Headlines

The report concludes that the Laws of Armed Conflict should also extend to the cyberspace field of operations. "If you shut down our power grid, maybe we will put a missile down one of your smokestacks," said an unidentified military official...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NATO: Cyber Defense and the New Strategic Concept

May 27, 2011 Added by:Headlines

Cyber attacks offer vastly favorable cost-benefit ratios in comparison to conventional military options. It is increasingly probable that a cyber attack on a NATO country will precede, or even replace a physical assault, moving cyber issues to the forefront of security concerns...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

China Acknowledges Existence of Cyberwarfare Unit

May 26, 2011 Added by:Headlines

While numerous nations are involved in varying levels of cyber aggression, what makes the Chinese threat so much more palpable is the systemic nature and comparatively large scale of the state-sponsored cyber-offensive operations...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

Re-Analyzing Cyberdeterrence and Cyberwarfare

May 15, 2011 Added by:J. Oquendo

Military commanders and generals responsible for strategies could spend hours re-analyzing how their locations are constantly being exposed. Money down the drain. Soldiers may even be injured as a result or even worse loss of life. All the while the vulnerability existed from something as simple as an iPad or a mobile phone...

Comments  (0)

Page « < 8 - 9 - 10 - 11 - 12 > »