Say it ain’t so! EVER SINCE A Carnegie Mellon talk on cracking the anonymity software Tor was abruptly pulled from the schedule of the Black Hat hacker conference last year, the security community has been left to wonder whether the research was silently handed over to law enforcement agencies seeking to uncloak the internet’s anonymous…
Category: Cyber-Warfare
Tradecraft: Geo-Locating by Photos
They say photos say a 1,000 words; well in the 21st Century they can also tell your exact location. -SF Russian soldiers geolocated by photos in multiple Syria locations, bloggers say By Maria Tsvetkova MOSCOW (Reuters) – Three serving or former Russian soldiers have been geolocated by photographs in Syria, including locations near Hama, Aleppo…
Islam Invasion: Islamic State hackers post phone numbers of heads of the CIA and FBI
ISIS is now in the same league as North Korea, China and Russia when it comes to cyber-threats. Welcome to the Fifth Dimension of Warfare folks.-SF “ISIS ‘cyber caliphate’ hacks 54,000 Twitter accounts and posts phone numbers of heads of the CIA and FBI in revenge for the drone attack that killed a British extremist,”…
The Social Science of Online Radicalization
As Charlie Winter noted recently at War on the Rocks, the Islamic State’s robust social media apparatus has been propagating a remarkably effective, multi-faceted communications strategy that incorporates narratives of statehood, military success, and religious legitimacy. The Islamic State’s success in using social media to disseminateits extremist ideas and mobilize tens of thousands of foreign…
It is Time for the U.S. Military to Innovate like Insurgents
These three Army captains built a gun that kills drones. It took them ten hours and cost $150. What can the Army learn from them? The recently concluded meeting of the Association of the United States Army (AUSA) has become a yearly tradition for senior military leaders, congressional staff, and members of foreign armies to…
Facebook Friend or Terrorist: Who’s in Your Online Social Network?
As a law enforcement officer in Northeast Florida, the arrest of a 19-year-old local man named Shelton Thomas Bell got my attention. In January of this year, Bell was sentenced to twenty years in federal prison for conspiring and attempting to provide material support to terrorists. He burned American flags, recruited support locally, conducted “training…
The Future of Warfare: 5 Coolest Land Warfare Robots
The days when the Army sent in ground troops without robots are long past. At the Association of the U.S. Army’s annual conference, (AUSA) even the trucks were at least partially robotic. As Training and Doctrine Command’s Maj. Gen. Cedric Wins recently said, robot steering offers “advantages that would provide additional protection to forces, or…
U.S. Navy Returns to Celestial Navigation Amid Fears of Computer Hack
Not being DEPENDENT on technology is a skill-set guys; because with one EMP blast, the RESET button gets punched and we are back to the stone age. I will be posting more on this. -SF “I know not with what weapons World War III will be fought, but World War IV will be fought with…
Iran’s Cyber-Espionage Tricks
A group of suspected Iranian hackers are using a sophisticated network of fake LinkedIn profiles to spy on unsuspecting targets worldwide — including the U.S. — according to a new report. The fake personas fell into two groups: one set that were fully developed profiles posing as recruiters for major worldwide government contractors and international…
What @Snowden told me about NSA’s Cyberweapons
By James Bamford Stephen Gerwin, chief of the Howard County Bureau of Utilities, it was “a peculiar project.” His workers were told they needed to get background checks and sign nondisclosure forms before they could begin work on a wastewater pump station in a forested area near the Little Patuxent River. “You sign a document…
