20. 08. 2014
Off
darpa-technology

DARPA: Tanks in the future will not depend on armor but technology

Source: Tech Times Tanks are usually layered with a thick metal armor to shield them; however, this makes them massive, slow and not very agile. DARPA envisions the creation of an advanced agile...

Read More →
06. 08. 2014
Off
Hacker using laptop. Lots of digits on the computer screen.

The FBI uses malware to combat online anonymity

Editor’s Note: Anonymity already compromised if using TOR – TOR Originally sponsored by the U.S. Naval Research Laboratory  Source: Engadget Online anonymity is a beautiful, terrible thing, so naturally governments and law enforcement types are eager to...

Read More →
27. 07. 2014
Off
Enduring Freedom

U.S. Army Looks to 3D Print Warheads

Source: 3D Prints There are so many amazing uses for 3D printing which have emerged over the last couple of years. From 3D printed medical models which have already saved numerous lives, to 3D printed prosthetics wwhich...

Read More →
09. 07. 2014
Off
Marine-revised squad x

DARPA SQUAD X INFRASTRUCTURE STUDY SEEKS INNOVATIVE WAYS TO IMPROVE DISMOUNTED SQUADS’ TACTICAL ADVANTAGE

Source: DARPA.mil Today’s dismounted squads use many different technologies to gather and share information. In many instances, however, these valuable but disparate inputs are not well integrated, leaving squad members without the degree...

Read More →
04. 07. 2014
Off
16788372

German agent ‘spying for US’

Source: TheLocal.de UPDATE: Media reports on Friday said that an employee of Germany’s foreign intelligence service is suspected of spying for Washington on a parliamentary panel probing US surveillance. Media reports on Friday...

Read More →
02. 05. 2014
Off
1368_15_royal-signals-soldiers-operating~unications-satellite-system-in-iraq

Analysis: How the UK connects to the US global drone network

            Source: Computer Weekly A Computer Weekly investigation subsequently established that the UK plays a crucial role in supporting the US military network by providing part of the core...

Read More →
29. 04. 2014
Off
circuit-board-brain-e1398796608532

A circuit board modeled on the human brain

              Source: Earth Sky Stanford bioengineers have developed a new circuit board modeled on the human brain, possibly opening up new frontiers in robotics and computing. For...

Read More →
23. 04. 2014
Off
400px-Flag_of_the_United_States_Federal_Bureau_of_Investigation.svg

FBI is said to gather data on foreign governments with hackers’ help

            Source: Brisbane Times An informant working for the FBI coordinated a 2012 campaign of hundreds of cyberattacks on foreign websites, including some operated by the governments of...

Read More →
22. 04. 2014
Off
Alias

DARPA Is Developing The Ultimate Autopilot System

        Source: Fast Company One of the problems the military faces with several decades of working aircraft is that the command interfaces are all slightly different, therefore requiring them to...

Read More →
21. 04. 2014
Off
21MESH01-master675

Mesh Networks to avoid surveillance in Tunisia funded by U.S. State Department

          Editor’s Note: Any communication network funded by U.S. State Department and USAID  is a red flag. You should be asking yourself why the State Department is beta testing...

Read More →
01. 04. 2014
Off
BTOCompilation

Inside the Military’s New Office for Cyborgs:Biological Technology Office

                  Source: Defense One The ability to link human brains to machines, create new life forms and build Star Trek-style disease detectors will be the focus...

Read More →
31. 03. 2014
Off
bilde

Night-vision contact lenses may be in your future

          Source: Military Times Here’s what you need to know: 1. What it is. Graphene is a single-atom layer of graphite. It’s the same material found in that No....

Read More →
19. 03. 2014
Off
Boeing-VTOL-X-Plane-Concept-1395242440394

DARPA’s Newest X-Plane Concepts Are All Robots

          Source: IEEE Spectrum Yesterday, DARPA announced the four companies that’ll be competing to develop a new experimental aircraft that combines the efficiency of an airplane with the versatility of a...

Read More →
13. 03. 2014
Off
3027609-inline-duke-acoustic-cloak

How U.S. Military Funded Researchers Built A 3-D Invisibility Cloak For Sound

            Source: Fast Company Technology for an invisibility cloak hasn’t yet been perfected, but researchers at Duke University have just invented what they’re calling the world’s first “3-D...

Read More →
25. 02. 2014
Off
DARPA

DARPA seeks to automate battlefield decision aids

Source: GCN Today’s battlefield commanders have a spectrum of flexible and powerful tools, including manned and unmanned platforms, weapons, sensors and electronic warfare systems that interact over robust satellite and tactical communications links....

Read More →
24. 02. 2014
Off
Q-Warrior-Infographic-660x466

Google Glass for the Battlefield

Source: Wired Walking around Silicon Valley with an augmented reality display on your face makes you a glasshole. On the battlefield, though, similar technology will soon turn U.S. soldiers into a lethal cross...

Read More →
22. 02. 2014
Off
nextgov-medium

WELCOME TO ALGORITHMIC PRISON

  Source: NextGov Corporations and government are using information about us in a new – and newly insidious – way. Employing massive data files, much of the information taken from the Internet, they...

Read More →
11. 02. 2014
Off
ARES_Concepts_v2_610x472

DARPA’s hot for futuristic helicopter-like delivery drones

Source: CNET In hard-to-reach warzones, it can be near impossible to get supplies to ground soldiers or conduct rescue missions without coming under enemy fire or landing in minefields. Given these logistical issues,...

Read More →
03. 02. 2014
Off
k20140203d

Transhumanism and War

Source: Institute for ethics &emerging technologies Throughout the transhumanist movement there is a strong belief, that transhuman technology will eventually end all wars and poverty. On the other hand there is a very...

Read More →
23. 01. 2014
Off
oilrig1-680x400

U.S. GAS, OIL COMPANIES TARGETED IN ESPIONAGE CAMPAIGNS

Source: Threat Post American gas and oil companies have been targeted by a hacking group with ties to the Russian Federation for close to 18 months, a new research report indicates. The attackers...

Read More →
22. 01. 2014
Off
army_virtual_wargames

Army looks to virtual training, shared intell amid budget cuts

Source: FCW Amid stagnant budgets and declining force size, Army leaders routinely stress the need to maintain readiness. Finite funding has placed a greater emphasis on simulation, virtual environments and shared platforms for...

Read More →
21. 01. 2014
Off
5293-05-darpa

ARF:Russia’s Weapons Research Agency Strives To Rival U.S. Counterpart

Source: Moscow times The Russian counterpart to the U.S. DARPA military research agency has outlined several promising high-end defense projects for an armed forces currently receiving a massive influx of state investment. President Vladimir Putin chaired a meeting on high-precision...

Read More →
15. 01. 2014
Off
quantum leap

Mathematics of cyberwarfare

Source: PC Who says math won’t help you in the real world? Researchers at the University of Michigan believe they have calculated the optimum time for a cyber attack. The model, from student...

Read More →
31. 12. 2013
Off
Strategic Chessboard: U.S.-Myanmar rapprochement to ‘hedge’ China

Strategic Chessboard: U.S.-Myanmar rapprochement to ‘hedge’ China

Source: Turkish Weekly Emre Tunç Sakaoğlu The United States, in accordance with an overall shift in its foreign policy due to the Obama administration’s “pivot to Asia”, initiated an engagement process with pragmatic...

Read More →
02. 12. 2013
Off
Electronic Warfare: Scientist-developed malware covertly jumps air gaps using inaudible sound

Electronic Warfare: Scientist-developed malware covertly jumps air gaps using inaudible sound

Source: Ars Technica Computer scientists have developed a malware prototype that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when...

Read More →
10. 10. 2013
Off
Exposed: the invisible conflict being waged by the world’s superpowers

Exposed: the invisible conflict being waged by the world’s superpowers

Source: Tech Radar The next world war will be online, and the consequences will be very real In the long Cold War between NATO and the Warsaw Pact, espionage was rife. Security services...

Read More →
09. 10. 2013
Off
The Next Step For U.S. Special Forces: Cybernetic Exoskeletons

The Next Step For U.S. Special Forces: Cybernetic Exoskeletons

Source: Fast Company The military’s elite special forces will be getting a sneak peek at our future of wearable computing and omnipresent sensors in the most direct way possible: Cybernetic exoskeletons with liquid...

Read More →
24. 09. 2013
Off
Computer simulations reveal war drove the rise of civilisations

Computer simulations reveal war drove the rise of civilisations

Source: The Conversation According to British historian Arnold Toynbee, “History is just one damned thing after another.” Or is it? That is the question Peter Turchin of the University of Connecticut in Storrs...

Read More →
22. 09. 2013
Off
The Congo Mines That Supply ‘Conflict Minerals’ For The World’s Gadgets

The Congo Mines That Supply ‘Conflict Minerals’ For The World’s Gadgets

Source: Gizmodo Most people who own a smartphone — or a laptop, or a new car — aren’t familiar with tantalum, the rare, blue-grey metal that conducts electricity through these devices. But thanks...

Read More →
22. 09. 2013
Off
Wargame Predicts Army Loses High Tech Edge

Wargame Predicts Army Loses High Tech Edge

Source: Breaking Defense ARMY WAR COLLEGE: A massive wargame held here this week to explore the “Deep Future” of warfare in the 2030s demonstrated a stark truth — one that Clausewitz enumerated in...

Read More →
10. 09. 2013
Off
Stealth coating based on squid skin could make soldiers invisible to night vision

Stealth coating based on squid skin could make soldiers invisible to night vision

Source: Telegraph Most camouflage materials used to disguise soldiers and vehicles during the day show up easily when viewed through night vision goggles and infrared cameras. This is because leaves and other foliage...

Read More →
21. 08. 2013
Off
NSA Spying Gets Even Creepier With Facial Recognition Software

NSA Spying Gets Even Creepier With Facial Recognition Software

Source: Policy Mic The Department of Homeland Security is developing new technology that would allow it to scan people’s faces and identify them in a crowd. The Biometric Optic Surveillance System (BOSS), has...

Read More →
21. 08. 2013
Off
Israeli Army Unit 8200 – little difference between tracking consumers and tracking terrorists.

Israeli Army Unit 8200 – little difference between tracking consumers and tracking terrorists.

Source: jewish business news If you want to make it as a tech entrepreneur, enlist in the Israeli Defense Force and aim for Unit 8200. Unit 8200 runs Israel’s tech intel unit, it...

Read More →
20. 08. 2013
Off
Russia Setting up Cyber Warfare Unit Under Military

Russia Setting up Cyber Warfare Unit Under Military

Source: IBTimes Russia is beefing up its cyber security by creating a separate cyber warfare wing under the military. The army perceives that the internet could become the new theatre of war, says...

Read More →
18. 08. 2013
Off
Canadian Forces test stealth snowmobile for covert Arctic ops

Canadian Forces test stealth snowmobile for covert Arctic ops

Source: The Spec The Canadian military has been secretly test-driving a $620,000 stealth snowmobile in its quest to quietly whisk troops on clandestine operations in the Arctic. The Canadian Press has learned that...

Read More →
08. 07. 2013
Off
DRDO:Unmanned technology will be the focus of future warfare

DRDO:Unmanned technology will be the focus of future warfare

Source: ET Future warfare scenario requires multiple functionality unmannedtechnology with human intelligence interface and ability to coordinate multiple systems in consonance, DRDO Director General Avinash Chander said here today. Space, cyber space and asymmetric dimensions of warfare are assuming greater importance...

Read More →
03. 07. 2013
Off
How Military Counterinsurgency Software Is Being Adapted To Tackle Gang Violence in Mainland USA

How Military Counterinsurgency Software Is Being Adapted To Tackle Gang Violence in Mainland USA

Source: MIT Technology Review Analysts believe that insurgents in Afghanistan form similar networks to street gangs in the US. So the software for analysing these networks abroad ought to work just as well...

Read More →
27. 05. 2013
Off
3-D printing will streamline the Navy’s supply chain — and much more

3-D printing will streamline the Navy’s supply chain — and much more

Source: AFJ Three-dimensional printing, a fast-moving technology that is still in its infancy, promises to upend the way we think about supply chains, sea basing and even maritime strategy. But it also requires...

Read More →
21. 05. 2013
Off
The future of propaganda:  big data will be a key part of the propaganda campaigns around the wars.

The future of propaganda: big data will be a key part of the propaganda campaigns around the wars.

Source: Gigaom In 2009, Sean Gourley, an Oxford-trained physicist, gave a TED talk called “The Mathematics of War.” Gourley had been working with the Pentagon, the United Nations and the Iraqi Government to help them better...

Read More →
16. 05. 2013
Off
U.S. could use cyberattack on Syrian air defenses

U.S. could use cyberattack on Syrian air defenses

Editor’s Note: Electronic Warfare : IDF’s teleprocessing corps C4i , Israel’s high-tech whiz kids, Unit 8200, and W32.Flame and Israel invests millions in drive for elite ‘cyber warriors’: Unit 8200 Source: USA Today The Pentagon has...

Read More →
15. 05. 2013
Off
‘Minority Report’ policing comes to the UK

‘Minority Report’ policing comes to the UK

Source: Telegraph Kent Police is using computer software to analyse historic offending and criminal behaviour to try and pinpoint where crimes will happen next. It is an echo of the Tom Cruise science...

Read More →
10. 05. 2013
Off
Electronic Warfare : IDF’s teleprocessing corps C4i

Electronic Warfare : IDF’s teleprocessing corps C4i

Source: JP “I’m directing EW at the head. This is also a form of psychological warfare. I can engage in this and then deny it. It wrecks the functionality of the enemy,” the...

Read More →
09. 05. 2013
Off
Training for war in a virtual battlespace

Training for war in a virtual battlespace

Source: TPP There is a sandstorm all around, and anything could be hidden up ahead in the haze of central Iraq. As a U.S. Army Humvee edges forward, a burst of gunfire erupts,...

Read More →
29. 04. 2013
Off
Superstrong, telepathic – the bionic soldiers of the future: How radical technology could transform British troops within 30 years

Superstrong, telepathic – the bionic soldiers of the future: How radical technology could transform British troops within 30 years

Source:DM Warfare may be an awful thing, but it has a habit of accelerating health technology in ways that are helpful to everyone. For example, in World War II the Allies made significant...

Read More →
15. 04. 2013
Off
Pain Rays and Robot Swarms: The Radical New War Games the DOD Plays

Pain Rays and Robot Swarms: The Radical New War Games the DOD Plays

Source: Atlantic In the year 2025, a rogue state–long suspected of developing biological weapons–now seems intent on using them against U.S. allies and interests. Anticipating such an event, we have developed a secret...

Read More →
31. 03. 2013
Off
Predictive Policing Project: LAPD Pre-Crime Divisions

Predictive Policing Project: LAPD Pre-Crime Divisions

Source: AGE The morning watch at the Los Angeles Police Department’s Foothill division begins at 6am, when the shift’s officers gather for roll-call and a briefing. The dozen or so officers file into...

Read More →
19. 03. 2013
Off
Amazon Web Services to build CIA spook cloud

Amazon Web Services to build CIA spook cloud

Source:FCW In a move sure to send ripples through the federal IT community, FCW has learned that the CIA has agreed to a cloud computing contract with electronic commerce giant Amazon, worth up...

Read More →
16. 03. 2013
Off
Carnegie Mellon and NSA seek high school hackers for next generation of cyber warriors

Carnegie Mellon and NSA seek high school hackers for next generation of cyber warriors

Source: AP Bored with classes? Carnegie Mellon University and one of the government’s top spy agencies want to interest high school students in a game of computer hacking. Their goal with “Toaster Wars”...

Read More →
11. 03. 2013
Off
Researchers print flexible electronic tattoo directly onto human skin

Researchers print flexible electronic tattoo directly onto human skin

Source: Extreme Tech From the research lab that brought us stick-on electronic tattoos, and recently the stretchable battery, we now have the first electronic sensor that has been printed directly onto human skin....

Read More →
02. 03. 2013
Off
The Russian army is preparing for war in cyberspace

The Russian army is preparing for war in cyberspace

Source: R&I Cyberspace is rapidly becoming, if not a battlefield in the direct sense of the word, then a central arena for future wars. In this context, the decision by the Russian Ministry...

Read More →
21. 02. 2013
Off
Digital Blackwater: U.S. Government outsources cyberwarfare to private U.S. firms

Digital Blackwater: U.S. Government outsources cyberwarfare to private U.S. firms

Source: AP When Kevin Mandia, a retired military cybercrime investigator, decided to expose China as a primary threat to U.S. computer networks, he didn’t have to consult with American diplomats in Beijing or...

Read More →
18. 02. 2013
Off
Gladius “future soldier” system

Gladius “future soldier” system

Source: Gizmag The Rheinmetall Group has been awarded an €84 million (US$112 million) contract to supply a further sixty of its Gladius “future soldier” systems to the German Federal Defense Force (Bundeswehr). The...

Read More →
10. 02. 2013
Off
Raytheon’s RIOT program tracking people’s movements and predicting future behaviour

Raytheon’s RIOT program tracking people’s movements and predicting future behaviour

Source: Guardian A multinational security firm has secretly developed software capable of tracking people’s movements and predicting future behaviour by mining data from social networking websites. A video obtained by the Guardian reveals...

Read More →
07. 02. 2013
Off
Who controls the Internet?

Who controls the Internet?

Source: Business Line Internet governance is an important policy and governance issue that has been raised at international level. Since the World Summit on Internet Society in 2003, nations have called for a...

Read More →
05. 02. 2013
Off
U.K. spy agencies plan to install Web snooping ‘black boxes’

U.K. spy agencies plan to install Web snooping ‘black boxes’

Source: ZDNET The ‘black box’ snooping devices would also be used to collect data from overseas companies, including U.S.-based service providers and social networks, such as Facebook, Google, and Twitter. The U.K.’s intelligence...

Read More →
04. 02. 2013
Off
U.S. pre-emptive cyberstrikes will be launched under secret guidelines to protect computer systems

U.S. pre-emptive cyberstrikes will be launched under secret guidelines to protect computer systems

Source: Independent The US could launch pre-emptive cyber strikes against countries it suspects of threatening its interests with a digital attack, under a new set of secret guidelines to safeguard the nation’s computer...

Read More →
27. 01. 2013
Off
Pentagon to create National, Combat and Cyber Protection Mission Forces

Pentagon to create National, Combat and Cyber Protection Mission Forces

Source:SMH/WP The Pentagon has approved a major expansion of its cybersecurity force over the next several years, more than quadrupling its size to bolster the nation’s ability to defend critical computer systems and...

Read More →
23. 01. 2013
Off
China trying to encircle India via tech deals with neighbours: RAW

China trying to encircle India via tech deals with neighbours: RAW

Source: Times of India India should counter China’s move to build and run communication networks in its neighbourhood countries such as Nepal and Maldives, the telecom ministry and the national security establishment have...

Read More →
18. 01. 2013
Off
US Department of Defense Tactical Electromagnetic Cyber Warfare: Plant Malware Through the Air

US Department of Defense Tactical Electromagnetic Cyber Warfare: Plant Malware Through the Air

Source: Defense News It was right around that time that scientists began to turn their attention to another project: trying to access these protected networks remotely, through the air, by reading activity via...

Read More →
08. 01. 2013
Off
Cyber attack could defeat UK armed forces, MPs warned

Cyber attack could defeat UK armed forces, MPs warned

Source: Scotsman THE armed forces are now so dependent on information technology that their ability to operate could be “fatally compromised” by a sustained cyber attack, MPs warned yesterday. The Commons Defence Committee...

Read More →
04. 01. 2013
Off
Russia prepares to Robot warfare

Russia prepares to Robot warfare

Source: RBTH It is difficult to judge the validity of the opinion that the very idea of using robotics in the field is criminal and conjures up images of “terminators” — cold-blooded killing...

Read More →
03. 01. 2013
Off
It’s global cyber war out there

It’s global cyber war out there

Source: AFR Sitting in an office in the Australian Security Intelligence Organisation’s Soviet-style building, which mirrors the Orwellian bunker one might imagine, Australia’s most experienced spy master, David Irvine, has a lot on...

Read More →
17. 12. 2012
Off
IDF ground forces undergo communications revolution

IDF ground forces undergo communications revolution

Source: JPost A communications system is being introduced into the IDF’s ground forces that is set to revolutionize the way the army engages the enemy and interacts with its units on the battlefield....

Read More →
10. 12. 2012
Off
Remember that MP3? The ITU police are en-route

Remember that MP3? The ITU police are en-route

Source: Voice of Russia In a very quiet release of information the Internet Warriors and “Hacktivist” Group Anonymous, has informed the world of one of the tools that will be used to bring...

Read More →
10. 12. 2012
Off
National Intelligence Council see Asia overtaking America, Europe by 2030

National Intelligence Council see Asia overtaking America, Europe by 2030

Source: Abs-Cbn China’s economy is likely to surpass the United States in less than two decades while Asia will overtake North America and Europe combined in global power by 2030, a U.S. intelligence...

Read More →
06. 12. 2012
Off
Russia’s Defense Ministry to get “all-seeing eye” in 2013

Russia’s Defense Ministry to get “all-seeing eye” in 2013

Source: RBTH Russia’s Defense Ministry is in the process of completing the technical documentation and securing project financing for Russia’s new multi-positional reconnaissance information system (MRIS). A source at the ministry told Izvestia...

Read More →
06. 12. 2012
Off
Army Black Hawk flies autonomously over California

Army Black Hawk flies autonomously over California

Source: US Army Over the skies east of San Jose, a Black Hawk helicopter was seen flying low and slow Nov. 5. There were pilots aboard the aircraft, but all maneuvers during this...

Read More →
29. 10. 2012
Off
U.S. Army Sponsored Artificial Intelligence Surveillance System Attempts to Predict The Future

U.S. Army Sponsored Artificial Intelligence Surveillance System Attempts to Predict The Future

Source: Forbes In something that looks straight out of the CBS show “Person of Interest“, the science website Phsy.org is reporting on a potentially important breakthrough from researchers at Carnegie Mellon. In research...

Read More →
21. 10. 2012
Off
Cyber war targets Middle East oil and gas companies

Cyber war targets Middle East oil and gas companies

Source: Al Arabiya/AFP Middle Eastern oil and gas companies have been targeted in massive attacks on their computer networks in an increasingly open cyber war where a new virus was discovered just this...

Read More →
08. 10. 2012
Off
Mysterious Algorithm Was 4% of Trading Activity Last Week

Mysterious Algorithm Was 4% of Trading Activity Last Week

Source: CNBC A single mysterious computer program that placed orders — and then subsequently canceled them — made up 4 percent of all quote traffic in the U.S. stock market last week, according...

Read More →
21. 09. 2012
Off
Raytheon software can monitor world media 24/7

Raytheon software can monitor world media 24/7

Source: Fox News It’s amazing technology, stuff deployed operationally since 2004 by the Department of Defense for a variety of purposes, including open-source intelligence, information operations, public affairs and PsyOps. Raytheon’s BBN Broadcast...

Read More →
17. 09. 2012
Off
U.S. Navy Eyes Technology To Cloak Subs

U.S. Navy Eyes Technology To Cloak Subs

Source: Aviation Week The U.S. Navy is investing in research that could make its submarines even stealthier with cloaking technology that seems to come straight out of a Tom Clancy thriller or a...

Read More →
17. 09. 2012
Off
United States linked to computer viruses used for espionage operations and cyber warfare.

United States linked to computer viruses used for espionage operations and cyber warfare.

Source: Reuters Researchers have found evidence suggesting that the United States may have developed three previously unknown computer viruses for use in espionage operations or cyber warfare. The findings are likely to bolster...

Read More →
22. 08. 2012
Off
Facebook, the CIA, DARPA, and the Tanking IPO

Facebook, the CIA, DARPA, and the Tanking IPO

Source: IB Times The big infusion of cash that sent Mark Zuckerberg and his fledgling college enterprise on their way came from Accel Partners, in 2004. Jim Breyer, head of Accel, attached a...

Read More →
15. 08. 2012
Off
Talk of Military Attack May Be Cover for Cyber War on Iran

Talk of Military Attack May Be Cover for Cyber War on Iran

Source: Arutz Sheva Journalists are scratching their heads to figure out why Israeli and American leaders are leading a daily chatter of a military attack on Iran, but the flow of words may...

Read More →
14. 08. 2012
Off
Executives advocate a military approach to cybersecurity

Executives advocate a military approach to cybersecurity

A new study being released by a private Internet security company highlights cyberworld weaknesses when it comes to gathering intelligence on hackers and suggests that businesses take a more military-minded approach to defense....

Read More →
09. 08. 2012
Off
Cyber surveillance virus Gauss found in region

Cyber surveillance virus Gauss found in region

Dubai: A new cyber surveillance virus, named Gauss, has been found in the Middle East that can spy on financial transactions, email and social networking activity, according to Kaspersky Labs. “The virus is...

Read More →
09. 08. 2012
Off
NYPD launches new analytics tool for fighting terror, crime – Domain Awareness System

NYPD launches new analytics tool for fighting terror, crime – Domain Awareness System

Source: Computerworld New York City is using a new data aggregation and real-time analytics tool to combat crime and terror threats in the city. The new Domain Awareness System (DAS), developed jointly by...

Read More →
18. 07. 2012
Off
The war being waged on the web

The war being waged on the web

Source: Telegraph In the past five years, cyber and telecommunications defence has left its niche market to become one of the fastest growing industries in the world. In 2011, governments, industry and ordinary...

Read More →
17. 07. 2012
Off
‘Madi’ Cyber Espionage Campaign in Middle East Uncovered

‘Madi’ Cyber Espionage Campaign in Middle East Uncovered

Source IB Times The active cyber-espionage campaign is targetting very specific victims including employees of critical infrastructure companies, financial services and government embassies, which are mainly located in Middle Eastern countries. So far...

Read More →
05. 07. 2012
Off
U.S. Military Sharpens Preparation for Cyberwar

U.S. Military Sharpens Preparation for Cyberwar

The U.S. military is accelerating its cyberwarfare training programs in an aggressive expansion of its preparations for conflict on an emerging battlefield. The renewed emphasis on building up cyberwarfare capabilities comes even as...

Read More →
25. 06. 2012
Off
The secret labs where America’s most futuristic weapons are built

The secret labs where America’s most futuristic weapons are built

Source: The Week Stuxnet and Flame, two of the key covert computer viruses used in OLYMPIC GAMES, were likely developed at Ft. Meade, Md. At NSA headquarters, computer scientists successfully weaponized C++ and...

Read More →
24. 06. 2012
Off
The ‘cyber war’ era began long ago

The ‘cyber war’ era began long ago

Source: Malta Independent US military strategist John Boyd states: “War comprises acts of physical, biological, psychological, social, cultural and other destruction at all levels, for example, intrapsychic, interpersonal, intergroup, interorganisational, and international.” Cyber...

Read More →
21. 06. 2012
Off
Big Brother is watching Facebook and Twitter

Big Brother is watching Facebook and Twitter

Source: New Scientist SATIRICAL newspaper The Onion recently described Facebook as a project of the Central Intelligence Agency. “After years of secretly monitoring the public, we were astounded,” a fictional agency deputy director...

Read More →
20. 06. 2012
Off
The Future of Drone Surveillance: Swarms of Cyborg Insect Drones

The Future of Drone Surveillance: Swarms of Cyborg Insect Drones

Source: Network World Forget the roachbots and the swarm of MIT humanoid robots dancing in sync, as well as “disposable” quarter-sized kilobots which are “cheap enough to swarm in the thousands,” and think...

Read More →
17. 06. 2012
Off
What Facebook Knows

What Facebook Knows

Heading Facebook’s effort to figure out what can be learned from all our data is Cameron Marlow, a tall 35-year-old who until recently sat a few feet away from ­Zuckerberg. The group Marlow...

Read More →
16. 06. 2012
Off
Drones, computers new weapons of US shadow wars

Drones, computers new weapons of US shadow wars

Source: AP   After a decade of costly conflict in Iraq and Afghanistan, the American way of war is evolving toward less brawn, more guile. Drone aircraft spy on and attack terrorists with...

Read More →
09. 06. 2012
Off
Israel’s high-tech whiz kids, Unit 8200, and W32.Flame

Israel’s high-tech whiz kids, Unit 8200, and W32.Flame

Source: UPI Israel’s highly secretive Unit 8200 of Military Intelligence is increasingly seen to have played a leading role with the United States in developing a powerful new cyberweapon known as W32.Flame that...

Read More →
08. 06. 2012
Off
Mossad Wants Credit for Stuxnet

Mossad Wants Credit for Stuxnet

Source: The Atlantic Israel’s officials have a message for anyone praising the CIA for its sophisticated cyber attack on Iran: It was our baby. The Stuxnet computer worm, described by David Sanger in The New...

Read More →
06. 06. 2012
Off
Germany military prepares special unit to tackle cyber attack

Germany military prepares special unit to tackle cyber attack

Source: Economic Times   Germany has prepared a special cyber warfare unit of its military to conduct offencive operations against computer hackers, who attack key installations or engage in espionage activities, defence ministry...

Read More →
03. 06. 2012
Off
IDF admits to using cyber space to attack enemies

IDF admits to using cyber space to attack enemies

The IDF uses cyber space to gather intelligence, attack enemies and conduct various military operations, the military revealed on Sunday in a posting on its official website. The rare announcement was the first...

Read More →
31. 05. 2012
Off
It Looks Like The Devastating New Virus Ripping Through Iran Was A Joint US-Israel Attack

It Looks Like The Devastating New Virus Ripping Through Iran Was A Joint US-Israel Attack

Security researchers have linked the Flame virus to Israel while U.S. computer security experts say that it bears the hallmarks of the National Security Agency (NSA), according to reports from Nicole Perlroth of...

Read More →
30. 05. 2012
Off
Flame: The Skype-Sniffing, Bluetooth-Enabled Super Spy Tool Is A Harbinger

Flame: The Skype-Sniffing, Bluetooth-Enabled Super Spy Tool Is A Harbinger

The news from cybersecurity researchers this Memorial Day sounded like a plot device from a science fiction movie. A hyper-secret surveillance program laid dormant on computers around the world for years, secretly turning...

Read More →
09. 05. 2012
Off
Our innate desire to be free: The science of civil war

Our innate desire to be free: The science of civil war

Phantom Report Notes:  Foreign military forces conducting combat missions against indigenous armies in unfamiliar terrain using state of the art technology to lead the way will lose. I do not care if NATO...

Read More →
09. 05. 2012
Off
Navy Wants Ultra-Violet Cloaking Device for Jet Fighters

Navy Wants Ultra-Violet Cloaking Device for Jet Fighters

The U.S. military is already investing tens of billions of dollars to make its jet fighters less visible to radars and infrared sensors. Now the Pentagon wants the defense industry to come up...

Read More →
07. 05. 2012
Off
Pilotless autonomous fighter jet project begins test flights over Irish Sea

Pilotless autonomous fighter jet project begins test flights over Irish Sea

BAE Systems has taken a step closer to removing pilots from fighter jets by launching the first major test flights for a new generation of intelligent drone aircraft. The defence group is assessing...

Read More →
06. 05. 2012
Off
“Super-Soldiers” Fight Disease With Bionic Implants

“Super-Soldiers” Fight Disease With Bionic Implants

The military’s Defense Advanced Research Projects Agency, or DARPA, announced plans to create nanosensors that monitor soldiers’ health on the battlefield and keep doctors constantly abreast about potential health problems. DARPA’s plan for...

Read More →
02. 05. 2012
Off
Darpa seeks technology to see through clouds for warfighter support

Darpa seeks technology to see through clouds for warfighter support

Source: Physorg Warfighters who encounter enemy forces on the ground benefit from overhead aircraft support. Some capabilities are lost, however, when cloud-cover obscures the view. Typically, airborne weapon systems that use electro-optic (EO)...

Read More →
25. 04. 2012
Off
Occupy Sites Help Cops, Corps Track Occupiers

Occupy Sites Help Cops, Corps Track Occupiers

Big Data is everywhere. Occupy Wall Street protesters, however, are dealing with a special challenge: Online marketers and analytics firms tracing the minutiae of their lives–including their email contacts and physical location–and possibly...

Read More →
23. 04. 2012
Off
Iran cuts off Internet access to oil refineries following malware attack

Iran cuts off Internet access to oil refineries following malware attack

Iran’s Ministry of Oil has cut off Internet accessto six oil refineries following an apparent cyber attack targeting their networks, it was widely reported on Monday. Representatives of the ministry said it has...

Read More →
Pages:123456»