Items Tagged with "Military"


7fef78c47060974e0b8392e305f0daf0

The RQ170 Affair: Spoofing, Jamming, and The GBAS

December 18, 2011 Added by:Infosec Island Admin

The documents show a program to “augment” the GPS environment in Iran by placing base stations with the Fajr GPS (GBAS) network/hardware in specific sites throughout the country to ostensibly help with aircraft navigation. In their presentation, they mention the possibility of spoofing...

Comments  (2)

94ae16c30d35ee7345f3235dfb11113c

Who or What Downed the RQ-170?

December 17, 2011 Added by:Joel Harding

Cyber attack? Oh come on now. This would be a highly complex operation and I doubt even the Russians have that capability. First you would need to inject the proper commands into the system. Then, you’d have to establish a link through the CandC network from Beale or Creech Air Force Base...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Exercise Tested NATO Procedures for Cyber Defense

December 16, 2011 Added by:Headlines

“Effective cyber defense requires us to continually test and improve our crisis management and decision-making procedures. This exercise was a great opportunity to promote the practical implementation of NATO’s new Cyber Defense Policy adopted last June..."

Comments  (1)

91648658a3e987ddb81913b06dbdc57a

How the RQ-170 Was Hijacked

December 15, 2011 Added by:Ron Baklarz

While it is reported that intercepting unencrypted drone communication data streams had first been known to US military since the mid-1990's, this exploitation continued on into 2009 where militant laptops were found with drone data and unencrypted video feeds from Predator drones...

Comments  (9)

69dafe8b58066478aea48f3d0f384820

Congress Sanctions Offensive Military Action in Cyberspace

December 15, 2011 Added by:Headlines

Section 954 of the the FY 2012 defense authorization act states that “Congress affirms that the Department of Defense has the capability, and upon direction by the President may conduct offensive operations in cyberspace to defend our Nation, allies and interests..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Army Officially Activates First Dedicated Cyber Brigade

December 14, 2011 Added by:Headlines

"This [activation] is a tribute to the belief in the notion that our nation requires assured freedom of maneuver in cyberspace in this era of persistent conflict and the advent of the increasingly more sophisticated threats to our security," said Maj. Gen. Mary A. Legere...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Cyber Security and Illegal Information Operations

December 13, 2011 Added by:Joel Harding

The Concept of Convention on International Information Security was released in 2011 by the Shanghai Cooperative Organization, consisting of China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, and Uzbekistan. This concept was floated to the UN as a construct for international cybersecurity...

Comments  (0)

E11e506024f5d2b70f037b9af4734f33

Is Al Qaeda’s Internet Strategy Working?

December 07, 2011 Added by:Stefano Mele

While almost all terrorist organizations have websites, al Qaeda is the first to fully exploit the Internet. This reflects al Qaeda’s unique characteristics. It regards itself as a global movement and therefore depends on a global communications network to reach its perceived constituents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Drone Probably Experienced Mechanical Failure

December 05, 2011 Added by:Headlines

“U.S. and NATO officials wouldn’t say what kind of American drone had disappeared, but U.S. officials said there was no indication that the aircraft had been shot down by the Iranians. One American official said the drone likely suffered from a mechanical failure..."

Comments  (0)

296634767383f056e82787fcb3b94864

Was Iran's Downing of RQ-170 Related to the Malware Infection at Creech AFB?

December 04, 2011 Added by:Jeffrey Carr

Iran took over the controls of a Lockheed Martin RQ-170 Sentinel stealth drone and landed it with minimal damage. As of this writing, the U.S. Air Force hasn't yet confirmed or denied the attack. I've left a message with the on-call PA officer at Creech Air Force Base...

Comments  (3)

0a8cae998f9c51e3b3c0ccbaddf521aa

Collision of Physical and Digital Defenses

November 30, 2011 Added by:Rafal Los

With all the SCADA hacking lately we have to let reason guide us, and emphasize temperance while we develop our own defensive capability in the digital age. It's too easy to just say "strike the attacker" but much harder when that attacker is a virtual ghost in the fabric of cyberspace...

Comments  (0)

44a2e0804995faf8d2e3b084a1e2db1d

Debating Cyber Warfare – More Questions from .GOV

November 29, 2011 Added by:Don Eijndhoven

The problem of Attribution: Not knowing who will attack, is attacking or has attacked you complicates the situation considerably. It makes all action and reaction susceptible to a fair margin of error and so any response should be carefully considered before execution...

Comments  (5)

7fef78c47060974e0b8392e305f0daf0

The Hezbollah Cyber Army: War in Hyperspace?

November 29, 2011 Added by:Infosec Island Admin

The whole idea of a Cyber Jihad is a notion that should not just be sloughed off as rhetoric. I do think that if the VEVAK are involved (and they would want a hand in this I am sure) they could in fact get some real talent and reign in the ranks to do some real damage down the road...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Iranian Cyber-Jihadi Cells Plot Western Destruction

November 28, 2011 Added by:Headlines

"The first state to appropriate the strategy of asymmetric war itself was the Islamic Republic of Iran... Because in [cyberspace] one can destroy the laws that have been created by the security apparatus of the enemy, and one can attack their strategies"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Protecting and Promoting the UK in a Digital World

November 28, 2011 Added by:Headlines

"With greater openness, interconnection and dependency comes greater vulnerability. The threat to our national security from cyber attacks is real and growing. Organised criminals, terrorists, hostile states, and ‘hacktivists’ are all seeking to exploit cyber space to their own ends"...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report Details China's Electronic Espionage Apparatus

November 22, 2011 Added by:Headlines

"In Senate testimony in 2011, Director of National Intelligence James Clapper outlined concerns about Chinese cyber surveillance, highlighting that the ―Chinese have made a substantial investment in this area, they have a very large organization devoted to it and they‘re pretty aggressive..."

Comments  (0)

Page « < 6 - 7 - 8 - 9 - 10 > »