Blog Posts Tagged with "Military"
June 04, 2012 Added by:Joel Harding
Operations Security or OPSEC is strictly enforced in the military, this is one of the basic tenets of Information Operations. We have had problems with Senators and Congressmen in the past disclosing classified information when doing so suited their purpose. Now the President has become the “Discloser in Chief”...
June 03, 2012 Added by:Jayson Wylie
There is speculation of purposeful backdoor implementations for monitoring by the US government in the name of national security. If there is the ability for a government to monitor communications, how can we be assured that another government is not using the same means, but for different purpose?
June 02, 2012 Added by:Joel Harding
Warfare in cyberspace has always been clean, antiseptic and as long as nobody admitted it, attribution was almost impossible. But now we have a bad guy and it is us. Once cyberweapons become sophisticated enough to cause widespread damage, the United States will be blamed for starting it all...
June 01, 2012 Added by:Ali-Reza Anghaie
We just compounded ugly. Weaponizing Cyberspace is a losing proposition across the board but it's still going to happen. I was just hoping we'd cut it a bit short and realize the errors - this NYT piece makes me feel like we don't have enough depth in DC to realize the risks before it's too late...
May 30, 2012 Added by:Joel Harding
Why do I keep running into the phrase Information Warfare? If the discussion is about cyber and warfare in cyberspace, why use the phrase Information Warfare? Has cyber ‘anything’ become so overused that we need to resort to using a much broader term to interest people in a cybersecurity discussion?
May 29, 2012 Added by:Pierluigi Paganini
News has been circulating on internet about a microchip used by the US military and manufactured in China that contains a secret "backdoor" that makes possible remote control of devices utilizing it. Security expert Robert Graham has declared that the bug is merely for debugging operations...
May 29, 2012 Added by:Headlines
"Flame shares many characteristics with notorious cyber weapons Duqu and Stuxnet: while its features are different, the geography and careful targeting of attacks coupled with the usage of specific software vulnerabilities seems to put it alongside those familiar super-weapons currently deployed in the Middle East.."
May 27, 2012 Added by:Thomas Fox
Today is Memorial Day, the day we celebrate the men and women who have served our country in our armed forces. I would ask each of you to honor our veterans, even if it is just a moment to reflect on those who made the ultimate sacrifice in giving their lives to protect the rest of us...
May 24, 2012 Added by:Headlines
In February 2012, a 58 million Euro contract was awarded to establish a NATO Cyber Incident Response Capability (NCIRC), to be fully operational by the end of 2012. A Cyber Threat Awareness Cell is also being set up to enhance intelligence sharing and situational awareness...
May 23, 2012 Added by:Infosec Island Admin
Earlier this month, we gave the green light to two long-awaited Defense Industrial Base (DIB) efforts designed to help companies protect critical information. The programs allow eligible DIB companies and the Government to share cybersecurity information...
May 21, 2012 Added by:Don Eijndhoven
One of the most interesting facts extracted from the report is that the MIVD will focus the majority of its cyber warfare efforts in countering espionage. Given that this is probably the most tangible and widely represented cyber activity currently employed, this is a wise choice...
May 21, 2012 Added by:Scot Terban
By combining the military, the economic, and the political aspects of soft and hard power, and the gray’s in between, China has become a force to be reckoned with. In order to better understand the mosaic, we need to re-tool some of the ideas we have preconceived for ourselves...
May 21, 2012 Added by:Pierluigi Paganini
"We continue to see China expressing interest in making investments to improve their capacity for operations in cyberspace, and that is something that we pay very, very careful attention to. There is the potential for these types of operations to be very disruptive..."
May 21, 2012 Added by:Headlines
"In 2011, computer networks and systems around the world continued to be targets of intrusions and data theft, many of which originated within China. Although some of the targeted systems were U.S. government-owned, others were commercial networks owned by private companies..."
May 18, 2012 Added by:Headlines
"As the lead major command for space and cyberspace, Air Force Space Command is chartered to organize, train and equip space and cyberspace forces and is tasked to review and efficiently use the resources assigned to the command," said Lt.Gen. Michael J. Basla...
May 16, 2012 Added by:Matthijs R. Koot
The Dutch Ministry of Defense's (MoD) annually issues a "Defense Innovation Competition" is a competition that is intended to get input from and foster relations with Dutch industry and SME. This year's theme is "CYBER Operations 2.0"...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013