Category Cyber & Information Warfare

SpaceChain deploys Internet of blockchains , other Countries also plan Blockchain space technology,

spacechain

Historically, there was a necessity for a third party that demanded a payment to perform transactions or submit information to ensure the accuracy of transactions and create a reliable history. Blockchain eradicates the need for an intermediary through creating a…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA Media forensics to detect fake photos and videos on social media to support National Security

MediFoe

In recent years consumer imaging technology (digital cameras, mobile phones, etc.) has become ubiquitous, allowing people the world over to take and share images and video instantaneously. Mirroring this rise in digital imagery is the associated ability for even relatively…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Blockchain technology of decentralized digital currency to enhance security of additive manufacturing in Internet of Things to Military 3D printing

Vantage Points 1

Blockchain is based on open, global infrastructure, decentralized public ledger of transactions that no one person or company owns or controls, ensures security of transfer of funds through public and private cryptology and third parties to verify that they shook,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Quantum Cryptography emerging alternative to secure Military Internet of things (MIOT) from cyber attacks even in post Quantum Computer Era

IoTQKD

The Internet of things (IoT) is the network of physical devices, vehicles, home appliances and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data. Each thing is uniquely identifiable through its…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Hacking of Electronic Voting Machines is a threat to Democracy, DARPA Is Building a Open Source, Secure Voting System

securevoting

The introduction of the electronic voting machines in India at the turn of the century  had aided in  reducing instances of capturing of polling stations and stuffing of ballot boxes by mobs hired by political parties. Using data from state elections,…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

DARPA’s RACE developing Secure Messaging Platform to provide WhatsApp like communication for troops on ground

RACE anonymous communication DARPA

Military is integrating Smartphones and tablets into their military operations, to enhance situational awareness and as backup communication in denied situations. Marines are considering airborne operations with tablets, Air Force looks at maintenance efficiencies, they have also widely used for…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Attacking ISIS by Cyber warfare and dropping cyber bombs was new strategy implemented by US, UK & Australia

cyber attackISIS

United States opened a new line of combat against the Islamic State, directing the military’s eight-year-old Cyber Command for the first time to mount computer-network attacks that are now being used alongside more traditional weapons. In 2009, US established, USCYBERCOM for…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Cyber criminals favouring stealthier attacks like Cryptojacking to make free money

Enisa cryptojacking

Cyber criminals are switching away from ransomware to stealthier attacks as the main sources of generating revenue, according to analysis by British artificial intelligence (AI)-based cyber security firm Darktrace. Cryptojacking is the unauthorized use of someone else’s computer to mine…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

Future Global Quantum internet could be brought down by Quantum terrorists

quantuminternet

Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. A unique aspect of quantum cryptography is that Heisenberg’s uncertainty principle ensures that if…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here

USAF Offensive Cyberspace Operations (OCO) program developed Cyber Mission Platforms, Cyber Weapons Platform & Command and Control Mission System

usafcyberdefence

The Department of Defense (DOD) defines cyberspace as a global domain within the information environment consisting of the interdependent network of information technology infrastructures and resident data, including the internet, telecommunications networks, computer systems, and embedded processors and controllers. The…...

IDST Monthly Access Membership Required

You must be a IDST Monthly Access member to access this content.

Join Now

Already a member? Log in here