Trending News

Cyber

Cyber attacks as big a threat to warships as missiles and torpedoes, Navies developing cyber security measures and technologies

Royal Navy Type 45 destroyer HMS Diamond is pictured turning at speed during Exercise Joint Warrior off the coast of Scotland. Exercise Joint Warrior is taking place during April 13-29 in the waters off, skies above and soil of Scotland. More than a dozen Royal Navy (RN) warships and submarines are committed to the annual war game. British warships are joined by more than 30 visiting warships, 40 fixed-wing aircraft and 30 helicopters. Alongside RN, RAF and Army personnel taking part in Joint Warrior, forces from the Netherlands, Canada, France, Denmark, Belgium, Norway, Poland, Sweden and German are involved – nearly 12,000 military personnel in all. Embarked onboard HMS Illustrious are Royal Marines from 42 Commando, Seakings from 845 Naval Air Squadron (NAS), a Merlin from 820 NAS, Chinooks from 27 Squadron RAF and Lynx helicopters from 659 Squadron Army Air Corps. The scenario will cover a broad range of circumstances including evolving crisis and conflict situations which cover disputed territory, conventional and non-conventional maritime and amphibious threats such as counter-piracy and terrorist activity. The scenarios will develop over two weeks, increasing in tension and uncertainty into stimulated operations and potential state on state hostilities.

US  Navy considers that it  faces threats from adversary nations like  Russia, China, Iran, and North Korea, which have developed significant  information warfare capabilities and interested  in exploiting the Navy’s networks to conduct espionage operations, either by stealing information and technical data on fleet operations or preventing the Navy from taking advantage.   …

Read More »

US, China and Russia developing new cyber capabilities and technologies like Secure Internets to protect against Cyber Warfare

cyberwarfare

Cyber warfare has developed into a more sophisticated type of combat between countries, where you can destroy critical infrastructure such as power, telecommunications or banking by damaging the computer systems that control those infrastructures. It’s widely acknowledged that offensive cyberattacks will be a necessary component of any future military campaign, …

Read More »

Militaries developing Joint Cyber, Space, EW, Signals intelligence and Communications operations and technologies for future battlefield

integCWEW

A simulated tank assault was deterred using cyber weapons and electronic warfare technology during a training exercise, according to Defense Systems. Trainers stopped a simulated assault by targeting the tank crew’s radio and communication systems during the exercise at the Army’s National Training Center in Fort Irwin, California. “These tanks had …

Read More »

Defeating complex, sophisticated and stealthy long-term cyber security threats (APT) needs Transparent Computing, says DARPA

ce11944b98d0742eead2b016a253afd2

An advanced persistent threat (APT) refer to complex, sophisticated and stealthy techniques of using software, hardware or social engineering tools to continuously monitor and extract data from targets such as organizations and/or nations for business or political motives. One of the examples can be the Stuxnet computer worm, which targeted …

Read More »

Military plans to employ Blockchain, the virtual currencies technology, for creating tamper-proof military computer systems defeating stealthy APT threats and secure messaging

blockchain

Blockchain is a transformative technology for the two billion people in the world currently underserved by financial institutions. The technology has the potential to enhance privacy, security and freedom of conveyance of data. Blockchain is based on open, global infrastructure, decentralized public ledger of transactions that no one person or …

Read More »

New cyber security technologies Dispersing data packets over Multiple Network Paths and Continuously Scrambling Code

b1d237aad44a95e3871fc116e6241517

“United States adversaries are launching increasingly sophisticated cyberattacks on the complicated web of networked systems upon which our military relies,” explained Robert W. Twitchell, Jr., President and CEO of Dispersive Technologies. “These attacks impair connectivity, degrade mission effectiveness and threaten lives. “While the means of cyber attacks vary, the pattern …

Read More »
image_pdfimage_print
error: Content is protected !!