Germany and the Netherlands agreded to build TEN, the first ever joint military internet

Security Affairs

The governments of Germany and The Netherlands agreed to build the first-ever joint military Internet, so-called TEN (Tactical Edge Networking). “The name of this new Dutch-German military internet is the Tactical Edge Networking, or TEN, for short.”

The Myth of Consumer-Grade Security

Schneier on Security

Barr repeated a common fallacy about a difference between military-grade encryption and consumer encryption: "After all, we are not talking about protecting the nation's nuclear launch codes. The thing is, that distinction between military and consumer products largely doesn't exist.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Court Denies Criminal Defendant’s Motion to Suppress Evidence Obtained via Warrantless Search: eDiscovery Case Law

eDiscovery Daily

The defendant was also subject to the Oregon National Guard’s acceptable use policy and Employees of the Oregon National Guard, including the defendant, were required to sign the policy before they received computer access. Case Law Electronic Discovery Email Privacy

Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It?

Krebs on Security

based tech firm to secretly embed tiny computer chips into electronic devices purchased and used by almost 30 different companies. The chips were alleged to have spied on users of the devices and sent unspecified data back to the Chinese military.

IT 285

DHS report – Voting systems in North Carolina county in 2016 were not hacked

Security Affairs

Computer faults that disrupted voting in a North Carolina county in 2016 were not caused by cyber attacks, a federal investigation states. The investigation involved 21 laptops used for the voters’ identification and experts performed a forensic exam of the seized computers.

2019 eDiscovery Case Law Year in Review, Part 3

eDiscovery Daily

Used by legal and business customers worldwide including more than 50 of the top 250 Am Law firms and many of the world’s leading corporations, CloudNine’s eDiscovery automation software and services help customers gain insight and intelligence on electronic data.

US Army stopped using floppy disks as storage for SACCS system that manages nuclear weapons arsenal

Security Affairs

The news is quite curious, the US military will no longer use 8-inch floppy disks in an antiquated computer (SACCS) to manage nuclear weapons arsenal. This system runs on an IBM Series/1 Computer—a 1970s computing system— and uses 8-inch floppy disks.”

MY TAKE: Why security innovations paving the way for driverless cars will make IoT much safer

The Last Watchdog

Intelligent computing systems have been insinuating themselves into our homes and public gathering places for a while now. Driverless autos, trucks and military transport vehicles are on a fast track for wide deployment in the next five years. military and intelligence agencies. Our smartphones and laptop computers generally become obsolete and get replaced by more secure versions every 24 months.

IoT 113

The evolutions of APT28 attacks

Security Affairs

APT28 is a well known Russian cyber espionage group attributed, with a medium level of confidence, to Russian military intelligence agency GRU (by CrowdStrike). I am a computer security scientist with an intensive hacking background.

MartyMcFly Malware: new Cyber-Espionage Campaign targeting Italian Naval Industry

Security Affairs

The victim was one of the most important leaders in the field of security and defensive military grade Naval ecosystem in Italy. I am a computer security scientist with an intensive hacking background.

Cyber is Cyber is Cyber

Lenny Zeltser

Computer security, perhaps? This might be because the industry continues to embrace the lexicon used in government and military circles, where cyber reigns supreme. If you’re in the business of safeguarding data and the systems that process it, what do you call your profession?

Y2K: The New Year’s Disaster That Wasn’t

Unwritten Record

Governments and businesses around the world proactively prepared their computer systems to seamlessly to the year 2000 rather than travel back to 1900. The Air Force has many Military Working Dogs.

Capturing Paper Documents - Best Practices and Common Questions


To a greater or lesser degree, most significant information management initiatives will involve a scanning capability to capture hard copy paper documents as electronic images. To build a scanning capability as part of your implementation, you will need to understand and balance the benefits of capturing paper documents as electronic documents compared to dealing with the ‘paper legacy’. What are the costs of scanning and capturing paper electronically? What is Capture?

Episode 103: On the Voice-Controlled Internet, How Will We Authenticate?

The Security Ledger

» Related Stories Episode 100: Estonia’s Former CIO talks about engineering a secure electronic vote Fitness apps: Good for your health, not so much for military security Episode 101: The Dystopian IoT looks a lot like the Printer Ink Aisle and City of Atlanta Employees phished on Rogue Wi-Fi. Voice makes interacting with e-commerce sites like Amazon frictionless, which is why companies like Amazon love them and see them as the future of computing.

Profile: The EPIC quest to build privacy rights on a foundation of integrity

Privacy Surgeon

In the first of an occasional series on the world’s leading privacy organisations, Simon Davies looks at the Washington DC-based Electronic Privacy Information Center (EPIC). Quite a few of those supporters congregated at the annual Computers, Freedom & Privacy (CFP) conference.


Amid Growing Threats, White House Dismantles Top Cybersecurity Post

Data Matters

should understand that “the costs to them… will be so high that they will simply consign all their cyberwarfare plans to their computer memories to gather electronic dust.”. Consistent with his background in arms control and military affairs, this op-ed reflects a focus on the national security aspects of cybersecurity. On May 15, 2018, various media outlets reported that the Trump administration decided to eliminate the position of White House Cybersecurity Coordinator.

On Open Platforms, Wifi, Home Automation, and Kitty Litter

John Battelle's Searchblog

Another wonderful example is the Global Positioning System (GPS), once the realm only of the United States military, but now the driver of countless commercial opportunities around the globe (again thanks to decisions made during the Clinton administration).