UNTIL THE FBI backed down from its battle with Apple over accessing the iPhone 5c of San Bernardino shooter Syed Rizwan Farook, it seemed the agency had chosen a near-perfect case on which to make its stand against encryption. By refusing to write software to help law enforcement crack Farook’s phone, Apple was made to…
Category: Information Warfare
Cyber-Warfare: Policing The Dark Web and How it Can Effect National Sovereignty
Cops hack into foreign computers to find cyber criminals As crime continues to proliferate on the so-called dark web, law enforcement agencies are sometimes having to work outside of their jurisdiction. When a suspected criminal acts on the dark web, authorities are unlikely to know where in the world he or she is physically located….
The Long History of “Little Green Men” Tactics and How They Were Defeated
In both Crimea and the subsequent fighting in the Donbas region of Ukraine, Russia’s signature tactic has been the use of so-called “Green Men,” soldiers without identifying insignia whose identity as Russian soldiers the Kremlin denied. Ukraine, Georgia, and even NATO members like Estonia now fear that they could be the next target for Russia’s…
Crusader Corner: ISIS Publishes Kill List with Names and Addresses of Minnesota Cops
Just like Great Britian, This is the end-result of a Govt. that pacifies and emboldens Terrorist. With this kind of policy, Nobody is safe anymore. Take Responsibility for you and your family’s safety NOW. -SF “Islamic State hackers post ‘kill list’ of Minnesota cops,” by Kellan Howell, The Washington Times, March 15, 2016: A group…
“Predictive Policing”: The Cyber Version of “Stop and Frisk”
Thanks America! How China’s Newest Software Could Track, Predict, and Crush Dissent Armed with data from spying on its citizens, Beijing could turn ‘predictive policing’ into an AI tool of repression. What if the Communist Party could have predicted Tiananmen Square? The Chinese government is deploying a new tool to keep the population from uprising. Beijing is building…
The Rise of the Hybrid Warriors: From Ukraine to the Middle East
The Iraqi Army defenders of Ramadi had held their dusty, stony ground for over a year and become familiar with the increasing adeptness of their opponents waving black flags. At first, these Iraqi Army units simply faced sprayed rifle fire, but then it was well-placed sniper rounds that forced these weary units to keep under…
STRATFOR Founder Warns: “Be Ready for War”
Interstate warfare is a thankfully unusual occurrence in the present day. State-assisted nonstate groups frequently fight governments, a scenario currently unfolding in Syria, Eastern Ukraine, and a host of other places. But you’d have to go back to the US-led invasion of Saddam Hussein’s Iraq in 2003, or the Eritrea-Ethiopia conflict of the late 1990s for an example…
What the 2016 Presidential Candidates Get Wrong About the Future of War
They fail, they lack, they misunderstand, they pander, they don’t get, and they just don’t know national security – not according to our Future of War roster of experts. “The President shall be Commander in Chief…” This clause that leads Article Two, Section II of the U.S. Constitution is without a doubt the most important of…
Inside “Eligible Receiver”
The NSA’s disturbingly successful hack of the American military Excerpted from Dark Territory: The Secret History of Cyber War by Fred Kaplan. Out now from Simon & Schuster. On Wednesday, March 9, Kaplan will discuss his book in New York; for more information and to RSVP, visit the New America website. On June 9,…
Going Inside the Ukrainian Power Grid Hack
IT WAS 3:30 p.m. last December 23, and residents of the Ivano-Frankivsk region of Western Ukraine were preparing to end their workday and head home through the cold winter streets. Inside the Prykarpattyaoblenergo control center, which distributes power to the region’s residents, operators too were nearing the end of their shift. But just as one…