article thumbnail

GUEST ESSAY: Rising global tensions put us a few lines of code away from a significant cyber event

The Last Watchdog

History shows how a small event built on daisy-chained circumstances can kick off a catastrophe, or even a shooting war. Cyberattack campaigns make strategic military sense since they are designed to impact communications, impact energy, cripple a population, military readiness, or make any number of dire situations worse. We must face the threat that we are only a few lines of code away from a very significant event.

Military 197
article thumbnail

Apply Military Strategy to Cybersecurity at Black Hat Trainings Virginia

Dark Reading

This special October event in Alexandria, Virginia offers unique, practical courses in everything from data breach response to military strategy for cybersecurity

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

The Last Watchdog

Here are five notable historical events that influenced cybersecurity assessment and transformed it into what it is today: The Battle of Midway (1942). military officials hired data analysts to crack the Japanese secret code known as JN-25. military and the analysts who worked to gather intelligence and relay these critical, decoded messages to prevent further attack.

Military 123
article thumbnail

Non-Military Photographs of Native Americans Within the Records of the Chief Signal Officer

Unwritten Record

In this blog post I will highlight some of the late 19th and early 20th century photographs that are located in the series 111-SC, Photographs of American Military Activities, ca. 1918-1981 whether your research involves military activities or not

article thumbnail

Recent events at the Innovation Hub

Archives Blogs

The Innovation Hub accomplishes an important part of NARA’s mission to make access happen through digitization, and also serves as an important event space to bring together both internal and external stakeholders for collaborative activities and cooperative learning.

article thumbnail

The Art of War

Unwritten Record

However, the US military also uses more traditional forms of artwork to document their operations and daily lives. Several films in our holdings feature military artists at work. The military artist program started during World War I when the U.S.

article thumbnail

Poland to establish Cyberspace Defence Force by 2024

Security Affairs

“We’re well aware that in today’s world it’s possible to influence the situation in states by using these methods ( cyberwar ),” Mariusz Blaszczak told to local media at a military cyber training centre in Zegrze. The HackYeah hackathon is one of the most important hacking events in Europe and according to the Polish government, it will attract the many talents and will incentive youngsters in a new profession.

article thumbnail

A Wartime Wedding at Versailles

Unwritten Record

3 Margaret Chick, the bridesmaid, all wore their military uniforms. Now, 78 years later, the Still Picture Branch at the National Archives houses photographs of this event within the Army Signal Corps photographic records ( 111-SC ). Army women in the military World War II

article thumbnail

Highlights from the War Department Map Collection

Unwritten Record

Maps within the collection typically date to the late 19th century and early 20th century, although some maps are copies of earlier maps or depict earlier military history events, such as battles. Outline Military Map of the United States.

article thumbnail

Gov and Basketball

Unwritten Record

Event: Disability Awareness Wheelchair Basketball Event Subject Description: HUD-sponsored wheelchair basketball game to promote disability awareness, outside HUD Headquarters. What a beautiful time of the year for basketball.

article thumbnail

RG 117: Drawings for the National WWII Memorial Design Competition

Unwritten Record

Each concept involved a journey, of sorts, through various events or stages of the war, seemingly with the idea in mind that a war is not made up of a single event, but rather a series of events that are all connected together, as noted in the “Narrative” of the drawing above.

article thumbnail

Why We Fight: Prelude to War, America’s Crash History Lesson

Unwritten Record

Many of these events seen in the film were documented by newsreel companies. ” Military World War IIWhy We Fight stands among the most ambitious and successful film projects ever undertaken by the United States government.

article thumbnail

Spotlight: The Last Footage Shot by Medal of Honor Recipient Marine Cpl. Perkins

Unwritten Record

Finding footage shot by a specific combat photographer can be tricky and sometimes impossible depending on what branch of the military created the films. Each film has paper records identifying its item number, dates, location, events, and photographer. Combat cameramen like Perkins oftentimes face front line action and intense fighting in order to collect a record of events. Archives Combat Cameramen Films Military Motion Pictures U.S.

Paper 39
article thumbnail

Captured on Film: Armistice Day 1918

Unwritten Record

More than 350,00 African Americans served in segregated units in the United States military during World War I. The Peace Treaty of Versailles was signed in June of 1919 in Versailles exactly five years after the assassination of Archduke Franz Ferdinand , an event seen as the tipping point for the beginning of World War I. “Our Wings of Victory,” the Manufacture of Military Aeroplanes During WWI.

article thumbnail

Remembering the Vietnam War this Veterans Day

Unwritten Record

The Vietnam war brought the front lines of combat to America often mere hours after events occurred creating an increased need for film footage. The images broadcast in America’s living rooms during the war were often captured by military combat photographers. The military increased their production of photographs and moving images and because of this, NARA’s motion picture holdings relating to the Vietnam war are quite expansive.

article thumbnail

Report: Recent 10x Increase in Cyberattacks on Ukraine

Krebs on Security

As their cities suffered more intense bombardment by Russian military forces this week, Ukrainian Internet users came under renewed cyberattacks, with one Internet company providing service there saying they blocked ten times the normal number of phishing and malware attacks targeting Ukrainians.

Military 214
article thumbnail

Celebrating the 150th Anniversary of the Transcontinental Railroad

Unwritten Record

We are recognizing the 150th anniversary of this important event by featuring a few Cartographic records related to the Transcontinental Railroad. Cartographic Records Maps Military railroads U.S. On May 10, 1869, the last spike of the Transcontinental Railroad was ceremoniously driven in at Promontory Summit, Utah, joining the Central Pacific Railroad and the Union Pacific Railroads to form one continuous railroad to connecting the east to the west.

article thumbnail

International Holocaust Remembrance Day

Unwritten Record

A Mother, a Baby, a Name: Identifying One of the Youngest Survivors of the Holocaust Finding Family in Images of Liberation at Buchenwald Our holdings also include footage and audio recordings from military trials held after World War II. military tribunals at Nuremberg, and U.S.

article thumbnail

Gettysburg: Civil War Monuments, Nuclear Arsenals, and Dreams of Peace

Unwritten Record

Part of this three-day event included a 50 th anniversary re-dedication of the Eternal Light Peace Memorial. Two of the twelve audio tapes contain most of Sagan’s 1988 speech as well as recordings of the activities of the three-day event, while three of the eleven film reels contain parts of Sagan’s speech. But, if the event is a continuous speech with little, or no breaks and pauses, we’re unable to faithfully sync the two together.

article thumbnail

Google TAG details cyber activity with regard to the invasion of Ukraine

Security Affairs

The researchers uncovered a phishing campaign conducted by a Russia-linked threat actor tracked as COLDRIVER (aka Calisto ) against a NATO Centre of Excellence and Eastern European militaries. a threat actor impersonated military personnel to extort money for rescuing relatives in Ukraine.

article thumbnail

GUEST ESSAY: 6 steps any healthcare organization can take to help mitigate inevitable cyber attacks

The Last Watchdog

The risks are real, and the impact of cybersecurity events continues to grow. A cyber catastrophe may seem inevitable, but there are basic practices and actionable steps any healthcare organization can take to begin reducing the clear and present risk of being impacted by a cybersecurity event. Those data categories are necessary to protect but most likely not sufficient to keep your organization running smoothly in the event of an outage or cybersecurity crisis.

Passwords 143
article thumbnail

Apr 03 – Apr 09 Ukraine – Russia the silent cyber conflict

Security Affairs

This post provides a timeline of the events related to the Russian invasion of Ukraine from the cyber security perspective. April 5 – Anonymous targets the Russian Military and State Television and Radio propaganda.

article thumbnail

SHARED INTEL: How Russia’s war mongering compromises those holding security clearances

The Last Watchdog

Additionally, providing any aid, including military aid such as logistics, equipment, or fighting for Ukraine in general, while possessing a security clearance poses major security concerns under Guideline C. The events in Ukraine have the potential to change things for security clearance holders in the United States.

Military 158
article thumbnail

DJI drone tracking data exposed in the US

Security Affairs

Used by the military, businesses, and consumers, drones are “fundamentally changing aviation.” On October 5, 2022, the US Defence Department added DJI and a dozen other companies to a list of Chinese entities believed to be connected to the Chinese military.

Military 104
article thumbnail

GUEST ESSAY: Preparing for the dire cybersecurity consequences of Russia’s invasion of Ukraine

The Last Watchdog

These Russian cyber actors are government organizations and include other parties who take their orders from the Russian military or intelligence organizations – while not technically under government control. The Russian government, military, and intelligence service may wish to achieve some operational effect, for example, disrupting the power grid or interfering with telecommunications infrastructure, which may be part of a larger war plan.

article thumbnail

Feb 7- Feb 27 Ukraine – Russia the silent cyber conflict

Security Affairs

This post provides a timeline of the events related to the Russia invasion of Ukraine from the cyber security perspective. February 25 – Ukraine: Belarusian APT group UNC1151 targets military personnel with spear phishing.

article thumbnail

Reimagining Democracy

Schneier on Security

Limit financial and military power? It was amazing event. Details of the event—emerging themes, notes from the speakers—are in the comments.) Last week, I hosted a two-day workshop on reimagining democracy.

article thumbnail

Amended Colorado Bill Aims to Enhance Data Privacy Laws

Data Protection Report

On Wednesday, February 14, 2018, an amended bill passed unanimously in Colorado’s House Committee on State, Veterans and Military Affairs. The amended bill further expands the definition of “personal information” to include student, military, or passport identification numbers. ” The amended bill also changes the time frame for notifying the state Attorney General’s office of a security event involving 500 or more Colorado residents.

article thumbnail

Making space for Armed Forces life in children?s libraries

CILIP

Some might feel passionately about protecting children from violence and have a personal anti-military stance. I can empathise with these views, but as a veteran, military spouse, mum and founder of a military children?s To the child these events aren?t

article thumbnail

Researchers found alleged sensitive documents of NATO and Turkey

Security Affairs

Researchers from the US-based firm Cyble recently came across a post shared by an unknown threat actor that goes online with the moniker Spectre123, where he has allegedly leaked the sensitive documents of NATO and Havelsan (Turkish Military/defence manufacturer).

Military 112
article thumbnail

Mar 06- Mar 12 Ukraine – Russia the silent cyber conflict

Security Affairs

This post provides a timeline of the events related to the Russia invasion of Ukraine from the cyber security perspective. Google TAG observed Russian, Belarusian, and Chinese threat actors targeting Ukraine and European government and military orgs.

article thumbnail

Preservica - 2022 highlights & momentum looking ahead

Preservica

From academic institutions and government agencies to corporate businesses and the health sector, 2022 was full of world events that will shape our history forever. The economic slowdown added new realities of shifting to digital working, and regional conflicts, like the War in Ukraine, reminded us to record events as history unfolds—no matter how gruelling it is to document.

article thumbnail

Facebook blocked Russia and Belarus threat actors’ activity against Ukraine

Security Affairs

“On March 14, they pivoted back to Poland and created an event in Warsaw calling for a protest against the Polish government. We disabled the account and event that same day.”

article thumbnail

Ukrtelecom, a major mobile service and internet provider in Ukraine, foiled a “massive” cyberattack that hit its infrastructure

Security Affairs

to preserve its network infrastructure and to continue providing services to Ukraine’s Armed Forces and other military formations as well as to the customers, Ukrtelecom has temporarily limited providing its services to the majority of private users and business-clients,” the SSSCIP added.

article thumbnail

306-NT: Photographic File of the Paris Bureau of the New York Times, ca. 1900–ca. 1950

Unwritten Record

The photographs that make up 306-NT were originally part of the New York Times photo morgue for the Paris Bureau of the newspaper. In December 1940, the Paris Bureau of the New York Times was seized by the Nazis and its Library of New Photos was transported to Berlin.

article thumbnail

GUEST ESSAY: Silence on the front lines of strategic cyber assaults belies heightening tensions

The Last Watchdog

It is in these moments, in the last “situation reports” from the military frontlines where a false state of calm and security that belied the coming death of the story’s protagonist. That begins with an understanding that there is always a calm before the storm, before an event; and in today’s climate, we cannot afford the reassuring sense that all is well at any given point in time.

Military 175
article thumbnail

Supply-Chain Security

Schneier on Security

Earlier this month, the Pentagon stopped selling phones made by the Chinese companies ZTE and Huawei on military bases because they might be used to spy on their users. And just as Russia is penetrating the US power grid so they have that capability in the event of hostilities, many countries are almost certainly doing the same thing at the consumer level. Members of the military, and everyone else, can still buy the phones. They just can't buy them on US military bases.

article thumbnail

GUEST ESSAY: Why the hack of South Korea’s weapons, munitions systems was so predictable

The Last Watchdog

The disclosure that malicious intruders hacked the computer systems of the South Korean government agency that oversees weapons and munitions acquisitions for the country’s military forces is not much of a surprise. war plans, including strategies to be implemented in event of collapsing diplomatic relations.

article thumbnail

Inside Ireland’s Public Healthcare Ransomware Scare

Krebs on Security

On May 13, the HSE’s antivirus security provider emailed the HSE’s security operations team, highlighting unhandled threat events dating back to May 7 on at least 16 systems.

article thumbnail

Crooks use software skimmer that pretends to be a security firm

Security Affairs

The skimmer is added to the onclick event of the checkout button and onunload event of the web page. Security experts from Sucuri analyzing a software skimmer that is abusing its brand name in order to evade detection.