background preloader

GlobalSecurity.org - Reliable Security Information

GlobalSecurity.org - Reliable Security Information
Situation Report: Expert analysis, briefings and commentary from across the political spectrum. Behold a Pale Farce: Cyberwar & the propaganda machine of the national security megaplex by George Smith, 23 Apr -- "Readers of this blog know the topic of cyberwar reasonably well. The national mythology on it has been deadening and invariant for virtually two decades. ..." Why Afghanistan Matters: Renewing America and Renewing the World by Ed Corcoran, 26 Mar -- "The world is in an unprecedented strategic situation: no major nation faces a serious threat of invasion or subjugation. The Cold War had posed an existential threat; indeed more than once nuclear war was actually close. ..." CRIMEAN OPPORTUNITY by Ed Corcoran, 22 Mar -- "The Crimea has suddenly become the new focus of American-Russian competition...."

http://www.globalsecurity.org/

Related:  ADF CombinedInternational relationsOther defence forcesCyber Situational AwarenessReference sources

Northrop Grumman E-2 Hawkeye The Northrop Grumman E-2 Hawkeye is an American all-weather, carrier-capable tactical airborne early warning (AEW) aircraft. This twin-turboprop aircraft was designed and developed during the late 1950s and early 1960s by the Grumman Aircraft Company for the United States Navy as a replacement for the earlier E-1 Tracer, which was rapidly becoming obsolete. The aircraft's performance has been upgraded with the E-2B, and E-2C versions, where most of the changes were made to the radar and radio communications due to advances in electronic integrated circuits and other electronics. The fourth version of the Hawkeye is the E-2D, which first flew in 2007. The E-2 was the first aircraft designed specifically for its role, as opposed to a modification of an existing airframe, such as the Boeing E-3 Sentry.

43 Commando Fleet Protection Group Royal Marines The 43 Commando Fleet Protection Group Royal Marines (43 Cdo FP Gp RM),[3] formerly Comacchio Company Royal Marines (1980–1983), Comacchio Group Royal Marines (1983–2001) and Fleet Protection Group Royal Marines (2001-2012), is a 790 man unit of the Royal Marines responsible for guarding the United Kingdom's Naval nuclear weapons and other security-related duties. It falls under the authority of 3 Commando Brigade. History[edit] Second World War[edit] Early Commando units were all from the British Army but by February 1942, the Royal Marines were asked to organize Commando units of their own, and 6,000 men volunteered.[4] Security Affairs Same Origin Method Execution (SOME) is a new technique of attack against website presented by Ben Hayak, researcher at Trustwave, at Black Hat Europe in Amsterdam. The Same Origin Method Execution (SOME) attack method is related to JavaScript Object Notation with padding (JSONP) implementation, it allows a bad actor to impersonate the targeted user, and most concerning aspect of the attack is that the there is no need for user interaction if malicious code is served through a classic malvertising campaign. Be aware, if a domain is vulnerable to the attack, all its pages will result vulnerable. “Same Origin Method Execution” is a new technique that abuses JSONP in order to perform a limitless number of unintended actions on a website on behalf of users, by assembling a malicious set of timed frames and/or windows.

Jane's Information Group Jane's Information Group (often referred to as Jane's) is a British publishing company specialising in military, aerospace and transportation topics. It was acquired in 2007 by IHS Inc., and its open-source intelligence databases and publications continue to be produced under the IHS Jane's and IHS brands. History[edit] Jane's was founded in 1898 by Fred T. Jane who had begun sketching ships as an enthusiast naval artist while living in Portsmouth. This gradually developed into an encyclopaedic knowledge, culminating in the publishing of All the World's Fighting Ships (1898).[1]

Tactical assault group History[edit] An Army Black Hawk helicopter simulating counter-terrorism scenarios at Sydney Olympic Park, 2008. The Sydney Hilton bombing on 13 February 1978 was the catalyst for the Commonwealth Government to initiate an urgent review of security procedures to combat the threat of international terrorism. The anti-terrorist agencies (the Australian Federal Police and the Australian Security Intelligence Organisation) were placed on heightened alert and a Protective Security Coordination Centre was established. The Prime Minister proposed the establishment of a Standing Advisory Committee on Commonwealth State Cooperation for Protection against Violence, which would be primarily responsible for the coordination and funding of various organisations involved.

Special Boat Service In times of armed conflict and war the Special Boat Service (SBS) and 22 Special Air Service Regiment (22 SAS) are required to operate in small parties in enemy controlled territory. Operations of this nature require men of courage and high morale who are self-disciplined, intelligent, reliable, determined and physically fit, and who possess mental, moral and physical stamina. Principle roles of the SBS are Surveillance Reconnaissance (SR), including information reporting and target acquisition; Offensive Action (OA), including direction of air strikes, artillery and naval gunfire, designation for precision guided munitions, use of integral weapons and demolitions; and Support and Influence (SI), including overseas training tasks. The SBS also provide immediate response Military Counter Terrorism (CT) and Maritime Counter Terrorism (MCT) teams.

Set up your own Pen-testing/Hacking Lab Network using a Single System The only thing to look for is your systems hardware configuration. You should have minimum 2 GB RAM but it is highly recommended to use 3 GB RAM for a 32 bit operating system. We will be using Oracle VirtualBox in this tutorial. You can download virtualbox from this link [Reference 1]. Once you have installed Vbox, the next step is to download the Extensions pack. NZ navy barred from boarding boats in fishing stand-off 14 January 2015Last updated at 03:32 ET The New Zealand navy released what it said was photographic evidence of illegal fishing The New Zealand navy is engaged in a stand-off with two boats thought to be illegally fishing toothfish in the Southern Ocean.

Community Site i know this is a far fetched idear, as it will require a lot of work on SDEs behalf and as far as i know, has been umpopular in the past. but i really want to see what a modern NF game whould look like. using a style similer to the ONF test, (you recive all you need opon logging in) it could be possible to create a Beta game using the same maps, and layout with modern ships and weaponery, eithier as a NF replacement (NO! NO! NO!) or as a new game by SDE. in this article i will lay out my test server ideals. ??

The World Factbook The Office of Public Affairs (OPA) is the single point of contact for all inquiries about the Central Intelligence Agency (CIA). We read every letter, fax, or e-mail we receive, and we will convey your comments to CIA officials outside OPA as appropriate. However, with limited staff and resources, we simply cannot respond to all who write to us. Special Reconnaissance Regiment The Special Reconnaissance Regiment or SRR is a special reconnaissance unit of the British Army. It was established on 6 April 2005 and is part of the United Kingdom Special Forces (UKSF) under the command of Director Special Forces, alongside the Special Air Service (SAS), Special Boat Service (SBS) and the Special Forces Support Group (SFSG).[1] The regiment conducts a wide range of classified activities related to covert surveillance and reconnaissance. The SRR draws its personnel from existing units and can recruit volunteers from any serving male or female member of the British Armed Forces.[2][3]

Windows Tools For Penetration Testing Most penetration testers are using either a Mac or a Linux-based platform in order to perform their penetration testing activities.However it is always a good practice to have and a Windows virtual machine with some tools ready to be used for the engagement.The reason for this is that although Windows cannot be used as a main platform for penetration testing some of the utilities and tools can still help us to extract information from our windows targets.So in this post we will see some of the tools that we can use in our windows system. HashCheck Shell Extension The HashCheck Shell Extension makes it easy for anyone to calculate and verify checksums and hashes from Windows Explorer. In addition to integrating file checksumming functionality into Windows, HashCheck can also create and verify SFV files (and other forms of checksum files, such as .md5 files). Netcat

Related:  Info Défense Sécurité 1Think tanks and NGOsdéfenseDéfense et sécurité