Hacker using laptop. Lots of digits on the computer screen.

The FBI uses malware to combat online anonymity

Editor’s Note: Anonymity already compromised if using TOR – TOR Originally sponsored by the U.S. Naval Research Laboratory  Source: Engadget Online anonymity is a beautiful, terrible thing, so naturally governments and law enforcement types are eager to...

Read More →
16788372

German agent ‘spying for US’

Source: TheLocal.de UPDATE: Media reports on Friday said that an employee of Germany’s foreign intelligence service is suspected of spying for Washington on a parliamentary panel probing US surveillance. Media reports on Friday...

Read More →
circuit-board-brain-e1398796608532

A circuit board modeled on the human brain

              Source: Earth Sky Stanford bioengineers have developed a new circuit board modeled on the human brain, possibly opening up new frontiers in robotics and computing. For...

Read More →
400px-Flag_of_the_United_States_Federal_Bureau_of_Investigation.svg

FBI is said to gather data on foreign governments with hackers’ help

            Source: Brisbane Times An informant working for the FBI coordinated a 2012 campaign of hundreds of cyberattacks on foreign websites, including some operated by the governments of...

Read More →
Alias

DARPA Is Developing The Ultimate Autopilot System

        Source: Fast Company One of the problems the military faces with several decades of working aircraft is that the command interfaces are all slightly different, therefore requiring them to...

Read More →
21MESH01-master675

Mesh Networks to avoid surveillance in Tunisia funded by U.S. State Department

          Editor’s Note: Any communication network funded by U.S. State Department and USAID  is a red flag. You should be asking yourself why the State Department is beta testing...

Read More →
DARPA

DARPA seeks to automate battlefield decision aids

Source: GCN Today’s battlefield commanders have a spectrum of flexible and powerful tools, including manned and unmanned platforms, weapons, sensors and electronic warfare systems that interact over robust satellite and tactical communications links....

Read More →
nextgov-medium

WELCOME TO ALGORITHMIC PRISON

  Source: NextGov Corporations and government are using information about us in a new – and newly insidious – way. Employing massive data files, much of the information taken from the Internet, they...

Read More →
oilrig1-680x400

U.S. GAS, OIL COMPANIES TARGETED IN ESPIONAGE CAMPAIGNS

Source: Threat Post American gas and oil companies have been targeted by a hacking group with ties to the Russian Federation for close to 18 months, a new research report indicates. The attackers...

Read More →
quantum leap

Mathematics of cyberwarfare

Source: PC Who says math won’t help you in the real world? Researchers at the University of Michigan believe they have calculated the optimum time for a cyber attack. The model, from student...

Read More →
Electronic Warfare: Scientist-developed malware covertly jumps air gaps using inaudible sound

Electronic Warfare: Scientist-developed malware covertly jumps air gaps using inaudible sound

Source: Ars Technica Computer scientists have developed a malware prototype that uses inaudible audio signals to communicate, a capability that allows the malware to covertly transmit keystrokes and other sensitive data even when...

Read More →
Exposed: the invisible conflict being waged by the world’s superpowers

Exposed: the invisible conflict being waged by the world’s superpowers

Source: Tech Radar The next world war will be online, and the consequences will be very real In the long Cold War between NATO and the Warsaw Pact, espionage was rife. Security services...

Read More →
Computer simulations reveal war drove the rise of civilisations

Computer simulations reveal war drove the rise of civilisations

Source: The Conversation According to British historian Arnold Toynbee, “History is just one damned thing after another.” Or is it? That is the question Peter Turchin of the University of Connecticut in Storrs...

Read More →
Israeli Army Unit 8200 – little difference between tracking consumers and tracking terrorists.

Israeli Army Unit 8200 – little difference between tracking consumers and tracking terrorists.

Source: jewish business news If you want to make it as a tech entrepreneur, enlist in the Israeli Defense Force and aim for Unit 8200. Unit 8200 runs Israel’s tech intel unit, it...

Read More →
Russia Setting up Cyber Warfare Unit Under Military

Russia Setting up Cyber Warfare Unit Under Military

Source: IBTimes Russia is beefing up its cyber security by creating a separate cyber warfare wing under the military. The army perceives that the internet could become the new theatre of war, says...

Read More →
How Military Counterinsurgency Software Is Being Adapted To Tackle Gang Violence in Mainland USA

How Military Counterinsurgency Software Is Being Adapted To Tackle Gang Violence in Mainland USA

Source: MIT Technology Review Analysts believe that insurgents in Afghanistan form similar networks to street gangs in the US. So the software for analysing these networks abroad ought to work just as well...

Read More →
3-D printing will streamline the Navy’s supply chain — and much more

3-D printing will streamline the Navy’s supply chain — and much more

Source: AFJ Three-dimensional printing, a fast-moving technology that is still in its infancy, promises to upend the way we think about supply chains, sea basing and even maritime strategy. But it also requires...

Read More →
Pages:1234567...16»