Blog Posts Tagged with "Military"

E11e506024f5d2b70f037b9af4734f33

Is Al Qaeda’s Internet Strategy Working?

December 07, 2011 Added by:Stefano Mele

While almost all terrorist organizations have websites, al Qaeda is the first to fully exploit the Internet. This reflects al Qaeda’s unique characteristics. It regards itself as a global movement and therefore depends on a global communications network to reach its perceived constituents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Drone Probably Experienced Mechanical Failure

December 05, 2011 Added by:Headlines

“U.S. and NATO officials wouldn’t say what kind of American drone had disappeared, but U.S. officials said there was no indication that the aircraft had been shot down by the Iranians. One American official said the drone likely suffered from a mechanical failure..."

Comments  (0)

296634767383f056e82787fcb3b94864

Was Iran's Downing of RQ-170 Related to the Malware Infection at Creech AFB?

December 04, 2011 Added by:Jeffrey Carr

Iran took over the controls of a Lockheed Martin RQ-170 Sentinel stealth drone and landed it with minimal damage. As of this writing, the U.S. Air Force hasn't yet confirmed or denied the attack. I've left a message with the on-call PA officer at Creech Air Force Base...

Comments  (3)

0a8cae998f9c51e3b3c0ccbaddf521aa

Collision of Physical and Digital Defenses

November 30, 2011 Added by:Rafal Los

With all the SCADA hacking lately we have to let reason guide us, and emphasize temperance while we develop our own defensive capability in the digital age. It's too easy to just say "strike the attacker" but much harder when that attacker is a virtual ghost in the fabric of cyberspace...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Debating Cyber Warfare – More Questions from .GOV

November 29, 2011 Added by:Don Eijndhoven

The problem of Attribution: Not knowing who will attack, is attacking or has attacked you complicates the situation considerably. It makes all action and reaction susceptible to a fair margin of error and so any response should be carefully considered before execution...

Comments  (5)

7fef78c47060974e0b8392e305f0daf0

The Hezbollah Cyber Army: War in Hyperspace?

November 29, 2011 Added by:Infosec Island Admin

The whole idea of a Cyber Jihad is a notion that should not just be sloughed off as rhetoric. I do think that if the VEVAK are involved (and they would want a hand in this I am sure) they could in fact get some real talent and reign in the ranks to do some real damage down the road...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iranian Cyber-Jihadi Cells Plot Western Destruction

November 28, 2011 Added by:Headlines

"The first state to appropriate the strategy of asymmetric war itself was the Islamic Republic of Iran... Because in [cyberspace] one can destroy the laws that have been created by the security apparatus of the enemy, and one can attack their strategies"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Protecting and Promoting the UK in a Digital World

November 28, 2011 Added by:Headlines

"With greater openness, interconnection and dependency comes greater vulnerability. The threat to our national security from cyber attacks is real and growing. Organised criminals, terrorists, hostile states, and ‘hacktivists’ are all seeking to exploit cyber space to their own ends"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report Details China's Electronic Espionage Apparatus

November 22, 2011 Added by:Headlines

"In Senate testimony in 2011, Director of National Intelligence James Clapper outlined concerns about Chinese cyber surveillance, highlighting that the ―Chinese have made a substantial investment in this area, they have a very large organization devoted to it and they‘re pretty aggressive..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Malicious Cyber Activities Directed Against U.S. Satellites

November 21, 2011 Added by:Headlines

"Two U.S. government satellites have each experienced at least two separate instances of interference apparently consistent with cyber activities against their command and control systems... The techniques appear consistent with authoritative Chinese military writings..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Department of Defense Cyberspace Policy Report

November 18, 2011 Added by:Headlines

"While the development and integration of cyber technologies have created many high leverage opportunities for DoD, our increasing reliance upon cyberspace also creates vulnerabilities for both DoD and the Nation..."

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Chinese Intelligence and Cyber Reconnaissance Infrastructure

November 18, 2011 Added by:Stefano Mele

Governments, businesses, military, all rely on communications. Moreover, information collected and collated from intercepted diplomatic, military, commercial and financial communications offers potential competitors an advantage on the negotiation table or battlefield...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Neuromancing The Cyberwars

November 17, 2011 Added by:Infosec Island Admin

It’s pretty damned hard to determine who did what and where on the net. Digital forensics only gets you so far - compromised machines can be tampered with in so many ways to make it look like someone did something, and these guys want to launch cruise missiles against nation states over a DDoS?

Comments  (1)

94ae16c30d35ee7345f3235dfb11113c

Should We Strike Iran? How About the Information War?

November 16, 2011 Added by:Joel Harding

A pre-emptive information strike would only cause the Iranians to involuntarily spasm and deploy suicide teams to attack US and other targets worldwide. Anything less would just be posturing for political purposes and could possibly result in more senseless deaths...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

DoD Report: Cyber Attacks Could Elicit Military Response

November 16, 2011 Added by:Headlines

"When warranted, we will respond to hostile attacks in cyberspace as we would to any other threat to our country. We reserve the right to use all necessary means - diplomatic, informational, military and economic - to defend our nation, our allies, our partners and our interests..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NATO Drafting Cyber Warfare International Law Manual

November 15, 2011 Added by:Headlines

"The manual is meant to address all the legal issues under a framework of both international use-of-force law and international humanitarian law... it examines related problems such as sovereignty, state responsibility and neutrality... [and] especially those regarding retaliation..."

Comments  (0)

Page « < 6 - 7 - 8 - 9 - 10 > »