background preloader

Wars & Military

Facebook Twitter

Ataques a Computadores Militares. Quando surge uma notícia sobre um ataque de crackers a alguma empresa, todos ficam chocados. mesmo sendo eventos relativamente esporádicos e isolados, a atenção que a mídia dá para o assunto chega a assustar toda uma população. Mas saibam que esses ataques cibernéticos a grandes empresas norte-americanas e européias que tem ocorrido esses anos todos, são fichinhas perto do que acontece com os militares. Podemos dizer que essa última categoria está acostumada a vivenciar milhares de tentativas de ataques, todos os dias. Um exemplo disso é o Pentágono, o Quartel-General do Departamento de Defesa (DoD - Department of Defense) dos Estados Unidos.

Eles costumam ser atacados por crackers individuais, grupos de criminosos, e até mesmo nações inteiras. Tenente-General Keith B. Mas nem tudo são flores por lá. Os senadores estão manifestando preocupação com a militarização dos esforços relacionados a segurança cibernética. Links de Interesse: CyberWar_News. Exército Brasileiro. Has CIA changed its strategy in Pakistan drone war? General Petraeus makes a point to President Obama in the White House Situation Room A fresh US drone strike killed a group of senior militants in Pakistan today, the latest in a string of recent attacks which have reportedly killed a high ranking militant, or High Value Target as they are known in military jargon.

On 6 September former US General David Petraeus took charge at the Central Intelligence Agency. Since then the Bureau has recorded twelve CIA drone strikes, eleven in Pakistan and one in Yemen. Of these at least seven have killed senior militants. Another attack reportedly targeted but missed an HVT. Could it be that the US is moving away from its recent strategy of using drone strikes to kill low-ranking militants in Pakistan? In the early years of the drone campaign under President Bush, almost all attacks were against HVTs who were viewed as a strategic threat to US interests. For the Bureau’s full data on CIA drone strikes in Pakistan click here.

Well maybe. The Next Wave of Botnets Could Descend from the Skies. The buzz starts low and quickly gets louder as a toy quadricopter flies in low over the buildings. It might look like flight enthusiasts having fun, but it could be a future threat to computer networks. In two separate presentations last month, researchers showed off remote-controlled aerial vehicles loaded with technology designed to automatically detect and compromise wireless networks.

The projects demonstrated that such drones could be used to create an airborne botnet controller for a few hundred dollars. Attackers bent on espionage could use such drones to find a weak spot in corporate and home Internet connections, says Sven Dietrich, an assistant professor in computer science at the Stevens Institute of Technology who led the development of one of the drones. “You can bring the targeted attack to the location,” says Dietrich. “[Our] drone can land close to the target and sit there—and if it has solar power, it can recharge—and continue to attack all the networks around it.” Betrayer and Betrayed: New Documents Reveal Truth on NATO's 'Most Damaging' Spy - SPIEGEL ONLINE - News - International. Everyone thought Hermann Simm deserved to be honored. It was Monday, Feb. 6, 2006, and he was dressed in his best suit to attend the day's event. He had been invited to Estonia's presidential palace to accept the "Order of the White Star" for his "service to the Estonian nation.

" It was an ironic choice. It wasn't the only medal Simm received for his services that year. The other honor was one that he could only see on his computer screen, supposedly so as to not jeopardize his cover. Sergey Jakovlev, his handler with the SVR, Russia's foreign intelligence service, appeared on the screen to show him his medal. Four years on, Simm has now reached the late phase of his career. This is the same man whom NATO, in a classified 141-page report, has recognized as the spy who was "most damaging in Alliance history.

" 28 NATO Countries Sharing Secrets Of course, Simm was not the only spy in NATO's past. A Swift Rise to Power Simm kept his new job a secret from his family. The NATO Monitor. [2010] U.S. Spies Want Algorithms to Spot Hot Trends | Danger Room. The U.S. intelligence community wants a sharp competitive edge on the world’s best and brightest ideas.

In an effort to find the next big thing before it happens, they’re looking to do away with fallible human trendspotters, and enlist an algorithmic system to “scan the horizon” and tap into the first signs of burgeoning memes in science and technology. Iarpa, the intel world’s far-out research arm, is already wary of trusting big calls and predictions to flesh-and-blood experts alone. Earlier this year, the agency solicited proposals for a system that would evaluate and rank the value of expert opinion based on niche, learning style, prior performance and “other attributes predictive of accuracy.” This time around, Iarpa’s looking for a system that wouldn’t just rate experts, but would take over many of their responsibilities entirely. In other words, while Iarpa wants an code-driven prediction system, it’s one that’ll inevitably be founded on fallible human input.

See Also: Imperialism. CyberWar. Pentagon asks hackers for help with cyber security  J. Scott Applewhite/AP Former top counterterrorism adviser Richard Clarke is sworn in to testify to the federal panel reviewing the Sept. 11 attacks in 2004. WASHINGTON - The Pentagon agency that invented the Internet is asking the hacker community for help in eliminating Defense Department computer vulnerabilities. The Defense Advanced Research Projects Agency, or DARPA, hosted a meeting this week for defense stakeholders and civilian computer experts, acknowledging that it has to start thinking differently about cyber security, Wired.com reported. And the computer networks that run U.S. infrastructure are so vulnerable to cyber attack that the White House should think twice before even attacking emerging adversaries, a national security expert said.

Richard Clarke, who advised ex-Presidents Bill Clinton and George W. Bush, added that U.S. defense networks are "as porous as a colander. " Pentagon: Online Cyber Attacks Can Count as Acts of War. Risk REPORT. Governo dos EUA alerta falha de segurança na Siemens O governo dos Estados Unidos alertou clientes da Siemens de que sistemas de gestão de controle industrial que compraram da empresa apresentam uma falha de segurança que, de acordo com um pesquisador, poderia permitir que hackers prejudiquem infraestrutura essencial. A Siemens ainda está se recuperando das consequências da descoberta do vírus Stuxnet, no ano passado, um worm criado especificamente para atacar seus sistemas de controle industrial.

Acredita-se que o Stuxnet tenha danificado cerca de mil centrífugas usadas pelo Irã para o enriquecimento de urânio, no final de 2009 ou começo de 2010. Ataques aos sistemas da empresa poderiam ter impacto amplo. A equipe de resposta de emergência para sistemas de controle industrial do Departamento de Segurança Interna dos EUA (ICS-CERT) enviou o alerta a companhias de energia, água e outros operadores de sistemas de controle industrial, em 19 de maio. Eli Pariser: Tenha cuidado com os "filtros-bolha" online. Lockheed Martin Hack Linked to RSA's SecurID Breach. Keeping Secrets: Cryptography in a Connected World. Since the earliest days of communication, clever minds have devised methods for enciphering messages to shield them from prying eyes. Today, cryptography has moved beyond the realm of dilettantes and soldiers to become a sophisticated scientific art—combining mathematics, physics, computer science, and electrical engineering.

It not only protects messages, but it also safeguards our privacy. From email to banking transactions, modern cryptography is used everywhere. But does it really protect us? What took place was a discussion of cryptography’s far-reaching influence throughout history (from Julius Caesar’s reign to Julian Assange’s WikiLeaks), and the ways in which it—and our privacy—are constantly under assault today as threats lurk behind IP addresses, computational power increases, and our secrets move online. More from this series: Keeping Secrets Josh Zepps Josh Zepps is a correspondent for Bloomberg TV’s Energy Now, reporting on the future of energy and the environment.

Espion. The DIY Terminator: Private Robot Armies And The Algorithm-Run Future Of War | Fast Company. 1. Attack Of The Drones Last month, NATO’s commanders in Libya went with caps-in-hand to the Pentagon to ask for reconnaissance help in the form of more Predator drones. “It’s getting more difficult to find stuff to blow up,” a senior NATO officer complained to The Los Angeles Times. The Libyan rebels’ envoy in Washington had already made a similar request. “We can't get rid of [Qaddafi] by throwing eggs at him,” the envoy told the newspaper.

The Pentagon told both camps it would think about it, citing the need for drones in places like Yemen, Somalia, and Pakistan, where Predator strikes have killed dozens this month alone. “Drones are essentially flying--and sometimes armed--computers,” the Brookings Institution noted in a paper published last month. “You have high school kids competing in robotics competitions with equipment that 10 years ago would have been considered military-grade,” says Peter W. 2. Another is purely financial. But the most important factor may be doctrinal. 3. 4. Strategic Studies Institute (SSI) | US Army War College. Des sociétés militaires privées. Les compagnies militaires privées, qui échappent au contrôle des députés et la société auraient pour mission de résoudre certains problèmes spécifiques à l’étranger, en évitant des procédures et des débats compliqués qui sont inévitables dans le cas de l’utilisation de l’armée des pays occidentaux.

En outre, ce qui est également important, c’est que les pertes des compagnies militaires privées ne sont pas comptabilisées par les structures de l’Etat, ce qui permet aux gouvernements d’éviter de poser des questions inconfortables, qui surviennent lorsque l’armée perd ses soldats dans des conflits armés. Dans certains pays, les compagnies militaires privées peuvent en effet remplacer les forces armées, protéger efficacement les installations des menaces diverses, assurant le transport, le dédouanement et fournissant d'autres services de nature militaire. Très souvent, les spécialistes des compagnies militaires privées sont utilisées pour la formation des forces armées des Etats étrangers. Cryptovirus Flame. The effort, involving the National Security Agency, the CIA and Israel’s military, has included the use of destructive software such as the Stuxnet virus to cause malfunctions in Iran’s nuclear-enrichment equipment. The emerging details about Flame provide new clues to what is thought to be the first sustained campaign of cyber-sabotage against an adversary of the United States.

“This is about preparing the battlefield for another type of covert action,” said one former high-ranking U.S. intelligence official, who added that Flame and Stuxnet were elements of a broader assault that continues today. “Cyber-collection against the Iranian program is way further down the road than this.” Flame came to light last month after Iran detected a series of cyberattacks on its oil industry.

There has been speculation that Washington had a role in developing Flame, but the collaboration on the virus between the United States and Israel has not been previously confirmed. Conventional plus cyber. Not a Click Away: Joseph Kony in the Real World. In 2006, I flew with a group of journalists and United Nations officials to a remote village in Garamba National Park in eastern Congo, just on other side of the South Sudan border, for a meeting with Joseph Kony and the leaders of the Lord's Resistance Army (LRA).

The meeting was to be held in a designated staging ground – a neutral space, deep in the forest, created by the UN as part of yet another protracted peace agreement between Kony and the Ugandan government. When we arrived, dozens of heavily armed LRA soldiers emerged from the forest and took their places among the stacks of rotting food that had been delivered to the clearing as an enticement and sign of goodwill. The LRA soldiers, dressed in camouflage pants and European football jerseys, spoke to no one and refused any attempt to address them. Of course no one was killed or arrested that day. Kony was, of course, the main attraction. Kony 2012 wants both. The most common defense of Kony 2012 is that it raises awareness.

Military Blogs. Carto cyberguerre. U.S.ARMY SURVIVAL MANUAL. The Spy files. War on Gaza - Experimental Beta. War on Gaza - Experimental Beta Click on the dots to view reports © 2013 Microsoft Corporation © 2010 NAVTEQ 6 Dec 11 Dec 16 Dec 21 Dec 26 Dec 31 Dec 5 Jan 10 Jan 15 Jan 20 Jan 25 Jan 30 Jan Overview of reported incidents over time This is an experimental web service.

Submit an Incident Submit via SMS | Twitter Submit via SMS | Twitter Incidents (from map above listed chronologically) TITLE LOCATION Date Israeli jets strike Rafah tunnels: Raids... Official & mainstream news TITLE SOURCE Date AJELive: Rebels claim control of strategic... As content is contributed from users around the world, AlJazeera cannot be held accountable for accuracy of data on this site. Ushahidi Souktel. Combats. Military Channel : Wars, Weapons, Vehicles, Games, Top Ten Lists. Hommes des casernes - Militaires. Activism. War / Military Industrial Complex. National Security and Arms Control.