Introduction U.S. Army officials are considering an innovative approach to bolster their cybersecurity measures in the realm of artificial intelligence (AI). The Army is exploring the implementation of an Artificial Intelligence Bill of Materials (AI BOM) to gain transparency into AI algorithms, understand their provenance, and identify potential cybersecurity vulnerabilities. …
Read More »Photonic Blockchains: More Energy-Efficient and Scalable Than Traditional Blockchains
Cryptocurrencies are digital currencies created using encryption algorithms. These alternative currencies require a blockchain — a type of digital ledger that records information such as transactions in a way that is difficult or impossible to change or hack. Blockchain is a decentralized and distributed ledger technology that allows multiple participants …
Read More »DARPA Business Process Logic (BPL) Program: Enhancing Business System Security
In today’s interconnected world, business systems play a critical role in managing and controlling various workflows, including manufacturing, infrastructure, and logistics. These systems, known as Business Logic (BL), automate and streamline operations for governments and businesses globally. However, these BL systems are not immune to logic faults and vulnerabilities, which …
Read More »The Dark Side of the Space Race: Cyber Attacks on Satellites and Low Earth Orbit Constellations.
The space race is back on. In recent years, there has been a renewed interest in space exploration, with private companies like SpaceX and Blue Origin vying to send humans back to the moon and beyond. But while the space race is often seen as a competition for technological superiority, …
Read More »Defending Space Assets: Cyber Security for Satellites and Low Earth Orbit Constellations
In recent years, there has been a growing interest in the use of satellites for a variety of applications, including communications, navigation, and Earth observation. This has led to the development of large constellations of satellites in low Earth orbit (LEO). While these constellations offer a number of advantages, they …
Read More »How Military or Battlefield Internet of Things(MIoT /BIoT) Will Provide Information Dominance
The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. The number of devices that use it to …
Read More »Revolutionizing Cybersecurity for the Military: DARPA’s FIRE Program and the Future of Protecting Complex Cyber-Physical Systems
The military relies heavily on complex cyber-physical systems for a range of applications, including unmanned aerial vehicles (UAVs), weapon systems, communication networks, control systems, and surveillance systems. These systems incorporate both hardware and software components and are uniquely designed and composed, making them potentially more susceptible to cyber-attacks. UAVs or …
Read More »Hiding Messages in Plain Sight: Exploring the Art of Steganography
Steganography is the art of concealing a message or information within another seemingly innocent message. The word “steganography” comes from the Greek words “steganos,” meaning “covered,” and “graphein,” meaning “to write.” In other words, steganography is the art of hiding a message in plain sight. Steganography differs from cryptography because …
Read More »The Growing Threat of Smartphone Security to National Security
Smartphones are ubiquitous in modern society, and their use has become increasingly prevalent in government agencies and other sensitive settings. However, this increasing reliance on mobile technology has also raised significant concerns regarding national security. Research indicates that smartphones pose a significant security threat to government agencies and other organizations …
Read More »Hidden Dangers: The Rising Threat of Steganography and Stegware Cyber Attacks
Steganography is the art of concealing a message or information within another seemingly innocent message. The word “steganography” comes from the Greek words “steganos,” meaning “covered,” and “graphein,” meaning “to write.” In other words, steganography is the art of hiding a message in plain sight. In digital steganography, electronic …
Read More »
International Defense Security & Technology Your trusted Source for News, Research and Analysis