Trending News

Cyber

Psychological warfare new military strategy from Russia’s Gerasimov doctrine to China’s three Warfares strategy to DARPA’s mind control

chinapsychologicalwarfare

Psychological warfare consists of attempts to make your enemy lose confidence, give up hope, or feel afraid, so that you can win. Psychological warfare involves the planned use of propaganda and other psychological operations to influence the opinions, emotions, motives, reasoning,  attitudes, and behavior of opposition groups. Psychological operations target foreign governments, …

Read More »

NATO recognizes cyber as operational domain of warfare requiring collective response, Atlantic Council proposes cyber framework, doctrine and capabilities

tumblr_inline_n9vvol6Olc1rpqqrk

NATO plans to bolster its ability to respond to cyberattacks and cybercrime by developing tools that can deter attacks on critical military and civilian network infrastructure. NATO has identified a number of key area for improvement. These include developing enhanced processes to detect, evaluate and respond to threats at all levels. …

Read More »

Intelligence agencies and DOD employing Real-time behavioral analytics, for detecting advanced external and internal threats and mental health

4246b121d2dc949b8f082c5f57840a3b

Market research company Forrester report found,”U.S. organisations suffered $40 billion in losses due to employee theft and fraud.” ” 46% of nearly 200 technology decision-makers reported internal incidents as the most common cause of the breaches they experienced in the past year,” writes Chloe Green in Information Age article. The …

Read More »

Cyber attacks as big a threat to warships as missiles and torpedoes, Navies developing cyber security measures and technologies

Royal Navy Type 45 destroyer HMS Diamond is pictured turning at speed during Exercise Joint Warrior off the coast of Scotland. Exercise Joint Warrior is taking place during April 13-29 in the waters off, skies above and soil of Scotland. More than a dozen Royal Navy (RN) warships and submarines are committed to the annual war game. British warships are joined by more than 30 visiting warships, 40 fixed-wing aircraft and 30 helicopters. Alongside RN, RAF and Army personnel taking part in Joint Warrior, forces from the Netherlands, Canada, France, Denmark, Belgium, Norway, Poland, Sweden and German are involved – nearly 12,000 military personnel in all. Embarked onboard HMS Illustrious are Royal Marines from 42 Commando, Seakings from 845 Naval Air Squadron (NAS), a Merlin from 820 NAS, Chinooks from 27 Squadron RAF and Lynx helicopters from 659 Squadron Army Air Corps. The scenario will cover a broad range of circumstances including evolving crisis and conflict situations which cover disputed territory, conventional and non-conventional maritime and amphibious threats such as counter-piracy and terrorist activity. The scenarios will develop over two weeks, increasing in tension and uncertainty into stimulated operations and potential state on state hostilities.

US  Navy considers that it  faces threats from adversary nations like  Russia, China, Iran, and North Korea, which have developed significant  information warfare capabilities and interested  in exploiting the Navy’s networks to conduct espionage operations, either by stealing information and technical data on fleet operations or preventing the Navy from taking advantage.   …

Read More »

US, China and Russia developing new cyber capabilities and technologies like Secure Internets to protect against Cyber Warfare

cyberwarfare

Cyber warfare has developed into a more sophisticated type of combat between countries, where you can destroy critical infrastructure such as power, telecommunications or banking by damaging the computer systems that control those infrastructures. It’s widely acknowledged that offensive cyberattacks will be a necessary component of any future military campaign, …

Read More »

DARPA plans hack resistant hardware to protect military systems from cyber attacks under their System Security Integrated Through Hardware and firmware (SSITH) program

hardware-cpu-2

An internal report produced by the J-2 intelligence directorate stated that cyber security officials are concerned that Lenovo computers and handheld devices could introduce compromised hardware into the Defense Department supply chain, posing cyber espionage risks, said officials familiar with the report. The chairman of the House Judiciary Committee wrote …

Read More »
image_pdfimage_print
error: Content is protected !!