22. 04. 2014
Alias

DARPA Is Developing The Ultimate Autopilot System

        Source: Fast Company One of the problems the military faces with several decades of working aircraft is that the command interfaces are all slightly different, therefore requiring them to...

Read More →
21. 04. 2014
21MESH01-master675

Mesh Networks to avoid surveillance in Tunisia funded by U.S. State Department

          Editor’s Note: Any communication network funded by U.S. State Department and USAID  is a red flag. You should be asking yourself why the State Department is beta testing...

Read More →
25. 02. 2014
Off
DARPA

DARPA seeks to automate battlefield decision aids

Source: GCN Today’s battlefield commanders have a spectrum of flexible and powerful tools, including manned and unmanned platforms, weapons, sensors and electronic warfare systems that interact over robust satellite and tactical communications links....

Read More →
22. 02. 2014
Off
nextgov-medium

WELCOME TO ALGORITHMIC PRISON

  Source: NextGov Corporations and government are using information about us in a new – and newly insidious – way. Employing massive data files, much of the information taken from the Internet, they...

Read More →
23. 01. 2014
Off
oilrig1-680x400

U.S. GAS, OIL COMPANIES TARGETED IN ESPIONAGE CAMPAIGNS

Source: Threat Post American gas and oil companies have been targeted by a hacking group with ties to the Russian Federation for close to 18 months, a new research report indicates. The attackers...

Read More →
15. 01. 2014
Off
quantum leap

Mathematics of cyberwarfare

Source: PC Who says math won’t help you in the real world? Researchers at the University of Michigan believe they have calculated the optimum time for a cyber attack. The model, from student...

Read More →
02. 12. 2013
Off
Electronic Warfare: Scientist-developed malware covertly jumps air gaps using inaudible sound

Electronic Warfare: Scientist-developed malware covertly jumps air gaps using inaudible sound

Source: Ars Technica Computer scientists have developed a malware prototype that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when...

Read More →
10. 10. 2013
Off
Exposed: the invisible conflict being waged by the world’s superpowers

Exposed: the invisible conflict being waged by the world’s superpowers

Source: Tech Radar The next world war will be online, and the consequences will be very real In the long Cold War between NATO and the Warsaw Pact, espionage was rife. Security services...

Read More →
24. 09. 2013
Off
Computer simulations reveal war drove the rise of civilisations

Computer simulations reveal war drove the rise of civilisations

Source: The Conversation According to British historian Arnold Toynbee, “History is just one damned thing after another.” Or is it? That is the question Peter Turchin of the University of Connecticut in Storrs...

Read More →
21. 08. 2013
Off
Israeli Army Unit 8200 – little difference between tracking consumers and tracking terrorists.

Israeli Army Unit 8200 – little difference between tracking consumers and tracking terrorists.

Source: jewish business news If you want to make it as a tech entrepreneur, enlist in the Israeli Defense Force and aim for Unit 8200. Unit 8200 runs Israel’s tech intel unit, it...

Read More →
20. 08. 2013
Off
Russia Setting up Cyber Warfare Unit Under Military

Russia Setting up Cyber Warfare Unit Under Military

Source: IBTimes Russia is beefing up its cyber security by creating a separate cyber warfare wing under the military. The army perceives that the internet could become the new theatre of war, says...

Read More →
03. 07. 2013
Off
How Military Counterinsurgency Software Is Being Adapted To Tackle Gang Violence in Mainland USA

How Military Counterinsurgency Software Is Being Adapted To Tackle Gang Violence in Mainland USA

Source: MIT Technology Review Analysts believe that insurgents in Afghanistan form similar networks to street gangs in the US. So the software for analysing these networks abroad ought to work just as well...

Read More →
27. 05. 2013
Off
3-D printing will streamline the Navy’s supply chain — and much more

3-D printing will streamline the Navy’s supply chain — and much more

Source: AFJ Three-dimensional printing, a fast-moving technology that is still in its infancy, promises to upend the way we think about supply chains, sea basing and even maritime strategy. But it also requires...

Read More →
21. 05. 2013
Off
The future of propaganda:  big data will be a key part of the propaganda campaigns around the wars.

The future of propaganda: big data will be a key part of the propaganda campaigns around the wars.

Source: Gigaom In 2009, Sean Gourley, an Oxford-trained physicist, gave a TED talk called “The Mathematics of War.” Gourley had been working with the Pentagon, the United Nations and the Iraqi Government to help them better...

Read More →
16. 05. 2013
Off
U.S. could use cyberattack on Syrian air defenses

U.S. could use cyberattack on Syrian air defenses

Editor’s Note: Electronic Warfare : IDF’s teleprocessing corps C4i , Israel’s high-tech whiz kids, Unit 8200, and W32.Flame and Israel invests millions in drive for elite ‘cyber warriors’: Unit 8200 Source: USA Today The Pentagon has...

Read More →
15. 05. 2013
Off
‘Minority Report’ policing comes to the UK

‘Minority Report’ policing comes to the UK

Source: Telegraph Kent Police is using computer software to analyse historic offending and criminal behaviour to try and pinpoint where crimes will happen next. It is an echo of the Tom Cruise science...

Read More →
10. 05. 2013
Off
Electronic Warfare : IDF’s teleprocessing corps C4i

Electronic Warfare : IDF’s teleprocessing corps C4i

Source: JP “I’m directing EW at the head. This is also a form of psychological warfare. I can engage in this and then deny it. It wrecks the functionality of the enemy,” the...

Read More →
09. 05. 2013
Off
Training for war in a virtual battlespace

Training for war in a virtual battlespace

Source: TPP There is a sandstorm all around, and anything could be hidden up ahead in the haze of central Iraq. As a U.S. Army Humvee edges forward, a burst of gunfire erupts,...

Read More →
31. 03. 2013
Off
Predictive Policing Project: LAPD Pre-Crime Divisions

Predictive Policing Project: LAPD Pre-Crime Divisions

Source: AGE The morning watch at the Los Angeles Police Department’s Foothill division begins at 6am, when the shift’s officers gather for roll-call and a briefing. The dozen or so officers file into...

Read More →
19. 03. 2013
Off
Amazon Web Services to build CIA spook cloud

Amazon Web Services to build CIA spook cloud

Source:FCW In a move sure to send ripples through the federal IT community, FCW has learned that the CIA has agreed to a cloud computing contract with electronic commerce giant Amazon, worth up...

Read More →
16. 03. 2013
Off
Carnegie Mellon and NSA seek high school hackers for next generation of cyber warriors

Carnegie Mellon and NSA seek high school hackers for next generation of cyber warriors

Source: AP Bored with classes? Carnegie Mellon University and one of the government’s top spy agencies want to interest high school students in a game of computer hacking. Their goal with “Toaster Wars”...

Read More →
02. 03. 2013
Off
The Russian army is preparing for war in cyberspace

The Russian army is preparing for war in cyberspace

Source: R&I Cyberspace is rapidly becoming, if not a battlefield in the direct sense of the word, then a central arena for future wars. In this context, the decision by the Russian Ministry...

Read More →
21. 02. 2013
Off
Digital Blackwater: U.S. Government outsources cyberwarfare to private U.S. firms

Digital Blackwater: U.S. Government outsources cyberwarfare to private U.S. firms

Source: AP When Kevin Mandia, a retired military cybercrime investigator, decided to expose China as a primary threat to U.S. computer networks, he didn’t have to consult with American diplomats in Beijing or...

Read More →
10. 02. 2013
Off
Raytheon’s RIOT program tracking people’s movements and predicting future behaviour

Raytheon’s RIOT program tracking people’s movements and predicting future behaviour

Source: Guardian A multinational security firm has secretly developed software capable of tracking people’s movements and predicting future behaviour by mining data from social networking websites. A video obtained by the Guardian reveals...

Read More →
07. 02. 2013
Off
Who controls the Internet?

Who controls the Internet?

Source: Business Line Internet governance is an important policy and governance issue that has been raised at international level. Since the World Summit on Internet Society in 2003, nations have called for a...

Read More →
05. 02. 2013
Off
U.K. spy agencies plan to install Web snooping ‘black boxes’

U.K. spy agencies plan to install Web snooping ‘black boxes’

Source: ZDNET The ‘black box’ snooping devices would also be used to collect data from overseas companies, including U.S.-based service providers and social networks, such as Facebook, Google, and Twitter. The U.K.’s intelligence...

Read More →
04. 02. 2013
Off
U.S. pre-emptive cyberstrikes will be launched under secret guidelines to protect computer systems

U.S. pre-emptive cyberstrikes will be launched under secret guidelines to protect computer systems

Source: Independent The US could launch pre-emptive cyber strikes against countries it suspects of threatening its interests with a digital attack, under a new set of secret guidelines to safeguard the nation’s computer...

Read More →
27. 01. 2013
Off
Pentagon to create National, Combat and Cyber Protection Mission Forces

Pentagon to create National, Combat and Cyber Protection Mission Forces

Source:SMH/WP The Pentagon has approved a major expansion of its cybersecurity force over the next several years, more than quadrupling its size to bolster the nation’s ability to defend critical computer systems and...

Read More →
23. 01. 2013
Off
China trying to encircle India via tech deals with neighbours: RAW

China trying to encircle India via tech deals with neighbours: RAW

Source: Times of India India should counter China’s move to build and run communication networks in its neighbourhood countries such as Nepal and Maldives, the telecom ministry and the national security establishment have...

Read More →

Follow

Get every new post on this blog delivered to your Inbox.

Join other followers: