Blog Posts Tagged with "Military"

94ae16c30d35ee7345f3235dfb11113c

Stuxnet: Classified Disclosures for Political Gain

June 04, 2012 Added by:Joel Harding

Operations Security or OPSEC is strictly enforced in the military, this is one of the basic tenets of Information Operations. We have had problems with Senators and Congressmen in the past disclosing classified information when doing so suited their purpose. Now the President has become the “Discloser in Chief”...

Comments  (8)

54a9b7b662bfb0f0445d1661d7ed180b

To Backdoor or Not?

June 03, 2012 Added by:Jayson Wylie

There is speculation of purposeful backdoor implementations for monitoring by the US government in the name of national security. If there is the ability for a government to monitor communications, how can we be assured that another government is not using the same means, but for different purpose?

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

The Atomic Bomb of Cyberspace

June 02, 2012 Added by:Joel Harding

Warfare in cyberspace has always been clean, antiseptic and as long as nobody admitted it, attribution was almost impossible. But now we have a bad guy and it is us. Once cyberweapons become sophisticated enough to cause widespread damage, the United States will be blamed for starting it all...

Comments  (0)

Bd623fa766512fdf6b57db66f522b741

Stuxnet: Tsunami of Stupid or Evil Genius?

June 01, 2012 Added by:Ali-Reza Anghaie

We just compounded ugly. Weaponizing Cyberspace is a losing proposition across the board but it's still going to happen. I was just hoping we'd cut it a bit short and realize the errors - this NYT piece makes me feel like we don't have enough depth in DC to realize the risks before it's too late...

Comments  (7)

94ae16c30d35ee7345f3235dfb11113c

Information Warfare and Cyberspace

May 30, 2012 Added by:Joel Harding

Why do I keep running into the phrase Information Warfare? If the discussion is about cyber and warfare in cyberspace, why use the phrase Information Warfare? Has cyber ‘anything’ become so overused that we need to resort to using a much broader term to interest people in a cybersecurity discussion?

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Chinese-Made US Military Chip: Backdoor or Debugging Function?

May 29, 2012 Added by:Pierluigi Paganini

News has been circulating on internet about a microchip used by the US military and manufactured in China that contains a secret "backdoor" that makes possible remote control of devices utilizing it. Security expert Robert Graham has declared that the bug is merely for debugging operations...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Flame Trojan Ignites Cyberwar Chatter

May 29, 2012 Added by:Headlines

"Flame shares many characteristics with notorious cyber weapons Duqu and Stuxnet: while its features are different, the geography and careful targeting of attacks coupled with the usage of specific software vulnerabilities seems to put it alongside those familiar super-weapons currently deployed in the Middle East.."

Comments  (0)

59d9b46aa00c70238bb89056cfeb96c0

Memorial Day – A Big Thank You

May 27, 2012 Added by:Thomas Fox

Today is Memorial Day, the day we celebrate the men and women who have served our country in our armed forces. I would ask each of you to honor our veterans, even if it is just a moment to reflect on those who made the ultimate sacrifice in giving their lives to protect the rest of us...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NATO and Cyber Defense

May 24, 2012 Added by:Headlines

In February 2012, a 58 million Euro contract was awarded to establish a NATO Cyber Incident Response Capability (NCIRC), to be fully operational by the end of 2012. A Cyber Threat Awareness Cell is also being set up to enhance intelligence sharing and situational awareness...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Howard Schmidt on Partnership Developments in Cybersecurity

May 23, 2012 Added by:Infosec Island Admin

Earlier this month, we gave the green light to two long-awaited Defense Industrial Base (DIB) efforts designed to help companies protect critical information. The programs allow eligible DIB companies and the Government to share cybersecurity information...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Dutch Military Intelligence Dives into Cyber

May 21, 2012 Added by:Don Eijndhoven

One of the most interesting facts extracted from the report is that the MIVD will focus the majority of its cyber warfare efforts in countering espionage. Given that this is probably the most tangible and widely represented cyber activity currently employed, this is a wise choice...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Hard Power, Soft Power, and the Power of Digital Espionage

May 21, 2012 Added by:Infosec Island Admin

By combining the military, the economic, and the political aspects of soft and hard power, and the gray’s in between, China has become a force to be reckoned with. In order to better understand the mosaic, we need to re-tool some of the ideas we have preconceived for ourselves...

Comments  (4)

03b2ceb73723f8b53cd533e4fba898ee

US vs. China: Is the Cyber Warfare Gap Increasing?

May 21, 2012 Added by:Pierluigi Paganini

"We continue to see China expressing interest in making investments to improve their capacity for operations in cyberspace, and that is something that we pay very, very careful attention to. There is the potential for these types of operations to be very disruptive..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Security Developments Involving the People’s Republic of China

May 21, 2012 Added by:Headlines

"In 2011, computer networks and systems around the world continued to be targets of intrusions and data theft, many of which originated within China. Although some of the targeted systems were U.S. government-owned, others were commercial networks owned by private companies..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Air Force Command Realigns Cyberspace Capabilities

May 18, 2012 Added by:Headlines

"As the lead major command for space and cyberspace, Air Force Space Command is chartered to organize, train and equip space and cyberspace forces and is tasked to review and efficiently use the resources assigned to the command," said Lt.Gen. Michael J. Basla...

Comments  (0)

C4363f41d25c216c53c8d71a1ac44a90

Dutch MoD Innovation Competition 2012: CYBER Operations 2.0

May 16, 2012 Added by:Matthijs R. Koot

The Dutch Ministry of Defense's (MoD) annually issues a "Defense Innovation Competition" is a competition that is intended to get input from and foster relations with Dutch industry and SME. This year's theme is "CYBER Operations 2.0"...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »