Info Défense Sécurité 4

Facebook Twitter

Washington’s Blog. SpyTalk - Intelligence for thinking people. Bruxelles2 - Europe de la défense et de la sécurité. Les Yeux du Monde : le site d'actualité et de géopolitique. ELP Defens(c)e Blog. The InsideDefense NewsStand. STRATFOR - Geopolitical intelligence, economic, political, and m.

Lexington Institute. Ares Homepage. Géopolitique. Maintenant que les négociations sont bien lancées sur le dossier nucléaire iranien, le jeu diplomatique avec Téhéran s'ouvre.

Géopolitique

Si un accord est loin d'être acquis, la perspective d'un compromis a suffi à ouvrir les vannes. Les Occidentaux et leurs concurrents se bousculent pour bénéficier de l'accès escompté à un marché de près de 80 millions d'habitants dans un pays qui sera pour longtemps l'une des premières puissances pétrolières, avec des besoins d'investissements considérables. Print - Hypersonic Cruise Missile: America's New Global Strike W. A tip sets the plan in motion--a whispered warning of a North Korean nuclear launch, or of a shipment of biotoxins bound for a Hezbollah stronghold in Lebanon.

Print - Hypersonic Cruise Missile: America's New Global Strike W

Word races through the American intelligence network until it reaches U.S. Strategic Command headquarters, the Pentagon and, eventually, the White House. In the Pacific, a nuclear-powered Ohio class submarine surfaces, ready for the president's command to launch. When the order comes, the sub shoots a 65-ton Trident II ballistic missile into the sky. Within 2 minutes, the missile is traveling at more than 20,000 ft. per second. If Pentagon strategists get their way, there will be no place on the planet to hide from such an assault. The question is whether such an attack can be deployed without triggering World War III: Those tungsten-armed Tridents look, and fly, exactly like the deadliest weapons in the American nuclear arsenal. Sneak Attack First, there's the matter of intelligence. Congress is decidedly less blasé. Booby-trapping PDF files: A new how-to. High performance access to file storage Updated A security researcher has demonstrated a mechanism that exploits PDF files without taking advantage of any particular vulnerabilities.

Booby-trapping PDF files: A new how-to

Didier Stevens' proof of concept exploit relies on running an executable embedded in a PDF file - something that ought to be blocked - by launching a command that ultimately runs an executable. In the case of Adobe Reader, such attempted launches generate a pop-up dialog box asking users if they want to proceed. However, this is not necessarily a major hurdle because Stevens was also able to manipulate the text displayed by the pop-up in a way that might easily fool most users. "With Adobe Reader, the only thing preventing execution is a warning," Stevens explains. The Price of Assassination - Opinionator Blog. I wouldn’t have believed you if you’d told me 20 years ago that America would someday be routinely firing missiles into countries it’s not at war with.

The Price of Assassination - Opinionator Blog

For that matter, I wouldn’t have believed you if you’d told me a few months ago that America would soon be plotting the assassination of an American citizen who lives abroad. Shows you how much I know. President Obama, who during his first year in office oversaw more drone strikes in Pakistan than occurred during the entire Bush presidency, last week surpassed his predecessor in a second respect: he authorized the assassination of an American — Anwar al-Awlaki, the radical Imam who after 9/11 moved from Virginia to Yemen, a base from which he inspires such people as the Fort Hood shooter and the would-be underwear bomber.

I’m not qualified to answer these questions, and, besides, it doesn’t really matter what the correct answers are. Of course the usual caveat applies: It’s hard to disentangle cause and effect. Prospective U.S. Cyber Commander Talks Terms of Digital Warfare. For years, the military has worried about the vulnerability of the United States to cyberattack — and how and when to return fire in digital warfare.

Prospective U.S. Cyber Commander Talks Terms of Digital Warfare

Now, the issue is taking center stage, as the Senate considers the nomination of an Army general to head the military’s first four-star Cyber Command. In a hearing this morning, the Senate Armed Services Committee will review the nomination of Army Lt. Gen. Keith Alexander to be the head of the Pentagon’s new Cyber Command. It’s a chance to get a closer look at the kind of capabilities for waging network warfare the Pentagon thinks it needs.

Last year, Secretary of Defense Robert Gates ordered the creation of U.S. But Alexander will also have to answer questions about how the United States might retaliate if it comes under online attack. Danger Room. Accueil. 28 février 2014 : Le Sri Lanka a violé deux résolutions successives du Conseil des droits de l’homme (CDH) des Nations unies.

Accueil

Plusieurs tendances en témoignent : l’absence de responsabilité et de poursuites pour les crimes de guerre et crimes contre l’humanité commis lors de la phase finale de la guerre civile, mais également l’absence de décentralisation du pouvoir, la militarisation du Nord et de l’Est du pays, et la dérive autoritaire du régime en place. Sahel Intelligence, l'information stratégique sur le Sahel. CWC_SR2-2009-10-01.pdf (Objet application/pdf)