Report Outlines Military Health Facility Security Weaknesses

Data Breach Today

Watchdog Agency: Problems Put Patient Data at Risk Some military health facilities haven't consistently implemented security controls, putting patient data at risk, according to a new watchdog agency report.

Locating Secret Military Bases via Fitness Data

Schneier on Security

Over this weekend, someone realized that it could be used to locate secret military bases: just look for repeated fitness activity in the middle of nowhere. datacollection geolocation military secrecy

How the US Military Can Better Keep Hackers

Schneier on Security

Interesting commentary : The military is an impossible place for hackers thanks to antiquated career management, forced time away from technical positions, lack of mission, non-technical mid- and senior-level leadership, and staggering pay gaps, among other issues.

Polar Fitness App Exposes Location of ‘Spies’ and Military Personnel

Threatpost

The fitness app Polar Flow exposes the whereabouts of some of its high-profile users, including “spies” and those with sensitive positions in the military. Hacks Mobile Security Privacy Fitness tracker geolocation data IoT military personnel polar polar fitness Polar Flow spies

Report: Chinese Hackers Siphon Off ‘Massive’ Amounts of Undersea Military Data

Threatpost

Critical Infrastructure Cryptography Featured Government Hacks China espionage Hackers military contractor military secrets navy sea dragon submarines underseaThe stolen data included "secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020," American officials said.

Their War Too: U.S. Women in the Military During WWII. Part I

Unwritten Record

This year, we are focusing on the role women played in the United States Military during World War II in a two-part blog post. They were recruited for service in the United States military for the first time. They served in each branch of the military in separate units.

Military justice

InfoGovNuggets

A Brigadier General in charge defending the accused at Guantanamo was arrested on the order of a military judge. Do military judges have more power than either they think they have or that they should? A new oxymoron. The General’s crime: allowing other civilian defense attorneys to resign after it was discovered the Government had bugged the room where the attorneys met with their clients. “Gitmo General Is Released,” The Wall Street Journal , November 4, 2017 A5.

Their War Too: U.S. Women in the Military During WWII. Part II

Unwritten Record

In part I of this two-part series, we discussed the role women played in the military during World War II by highlighting those who served in the Women’s Army Corps (WAC), the Coast Guard Women’s Reserve (SPARS), and the Women Air Force Service Pilots (WASP) during World War II.

GoScanSSH Malware Targets SSH Servers, But Avoids Military and.GOV Systems

Threatpost

Researchers identify a new malware family called GoScanSSH that avoids servers linked to government and military IP addresses. . Cloud Security Government Hacks Malware ARM GoScanSSH GoScanSSH Malware SSH SSH Servers x86 x86_64

Military documents about MQ-9 Reaper drone leaked on dark web

The Security Ledger

Hackers have put up for sale on the dark web sensitive military documents, some associated with the U.S. military’s MQ-9 Reaper drone aircraft, one of its most lethal and technologically advanced drones, security research firm Recorded Future recently discovered. » Related Stories Fitness apps: Good for your health, not so much for military security Evasive new botnet can take over enterprise devices to steal data, spread ransomware U.S.

The Military Should Teach Artificial Intelligence to Watch Drone Footage

WIRED Threat Level

Opinion: The Pentagon collects so much surveillance footage that humans can’t watch all of it. It’s time to deploy AI. Security Opinion

Fitness apps: Good for your health, not so much for military security

The Security Ledger

Fitness apps are proving to be a lot less beneficial to military security than they are for military fitness. That after researchers in the Netherlands discovered that data from the Polar fitness app revealed the homes and habits of those exercising in clandestine locations around the world, including intelligence agencies, military bases, nuclear.

DoD Travel System Breach Exposed Data of 30K Civilian, Military Employees

Dark Reading

Defense Dept. says contractor that handles travel management services was hacked

Pentagon Travel Provider Data Breach Counts 30,000 Victims

Data Breach Today

Department of Defense Has Begun Notifying Military and Civilian Breach Victims The Pentagon is warning that a data breach at a third-party travel management service provider exposed records for an estimated 30,000 civilian and military personnel.

White House: Russian Military Behind NotPetya Attacks

Dark Reading

Trump administration statement comes on the heels of UK government calling out Russia for the cyberattacks that spread through Europe and elsewhere

Military, Government Users Just as Bad About Password Hygiene as Civilians

Dark Reading

New report comes out just as group of US senators chastise Secretary of State Mike Pompeo for not using multifactor authentication

Google renounces AI weapons; Will still work with military

Information Management Resources

The company said it will keep working with the defense department in other areas, giving its cloud business the chance to pursue future lucrative government deals. Artificial intelligence Machine learning Google

History of the US Army Security Agency

Schneier on Security

historyofsecurity intelligence militaryInteresting history of the US Army Security Agency in the early years of Cold War Germany.

Feds Indict 7 Russians for Hacking and Disinformation

Data Breach Today

Russian Military Intelligence Team Allegedly Conducted Close-Access Operations The U.S.

CIA: Russian Military Hackers Behind NotPetya Attack

Dark Reading

Cyberattack last June aimed to disrupt Ukraine's financial system

Leaky AWS Storage Bucket Spills Military Secrets, Again

Threatpost

For the second time in ten days, researchers at UpGuard released sensitive data belonging to the United States Defense Department that was stored insecurely online. Cloud Security Government Privacy Web Security AWS AWS Storage Bucket Chris Vickery Leaky AWS Storage Bucket Linux misconfigured servers National Security Agency NOFORN NSA Red Disk top secret United States Defense Department

Pentagon Data Breach Exposed 30,000 Travel Records

Data Breach Today

Department of Defense Has Begun Notifying Military and Civilian Breach Victims The Pentagon is warning that a data breach at a third-party travel management service provider exposed an estimated 30,000 civilian and military personnel records.

Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers

Dark Reading

GRU hackers used bitcoin to fund US computer network infrastructure supporting and hiding the operation

Hy Rothman – Searching for Nazis on the Greenland Patrol

Unwritten Record

Harry is a former Navy photographer himself and came across this story while researching military photographers. During WWII the Office of the Chief of Naval Operations interviewed over 600 servicemen from all branches of the military on their activities and experiences in the war.

Hacker Exploits 2-Year Old Router Issue To Steal Sensitive US Military Data

Dark Reading

A moderately skilled hacker managed to steal export-restricted data pertaining to the Reaper drone and Abrams tank from computers belonging to two US Army officials

Anthem, Apple and the Pentagon: A Data-Breach Cornucopia

Threatpost

Breach Critical Infrastructure Government Hacks Privacy Vulnerabilities 000 victims 30 Anthem apple Apple ID credit card breach data breach Department of Defense goa report military personnel payment fraud Pentagon record fine travel office weapons vulnerabilitiesA record fine and two new compromises kick off the autumn compromise season.

Google builds military ties for AI cloud business as staff quit

Information Management Resources

Almost 4,000 company employees, out of an Alphabet total of 85,000, signed a letter asking Google CEO Sundar Pichai to nix the Project Maven contract and halt all work in 'the business of war.'. Artificial intelligence Machine learning Google

Google engineers refused to build security tool to win military contracts

Information Management Resources

Internal disputes are common at the firm, which gives employees ample space to air grievances. But dissent is on the rise (as it is at other tech companies). Hardware and software Artificial intelligence Machine learning Google

Supply-Chain Security

Schneier on Security

Earlier this month, the Pentagon stopped selling phones made by the Chinese companies ZTE and Huawei on military bases because they might be used to spy on their users. Members of the military, and everyone else, can still buy the phones. They just can't buy them on US military bases.

Cloud Security Fail: Classified U.S. Military Data Exposed in Amazon S3 Bucket

eSecurity Planet

The exposed data includes information on the Army's Distributed Common Ground System and its cloud component, Red Disk

Hacker Compromises Air Force Captain to Steal Sensitive Drone Info

Threatpost

Hacks Vulnerabilities Air Force Dark Web Department of Defense hack hacker military drone Recorded Future secrets stolen submarineThe thief also had a second dataset, including the M1 Abrams maintenance manual, a tank platoon training course, a crew survival course and documentation on improvised explosive device (IED) mitigation tactics.

DHS – Russian APT groups are inside US critical infrastructure

Security Affairs

APT Breaking News Cyber warfare Hacking Intelligence Malware critical infrastructure DHS military Pierluigi Paganini Russia Security AffairsThe US Government is warning of continuous intrusions in National critical infrastructure and it is blaming the Kremlin for the cyber attacks.

The Panama Canal: Riots, Treaties, Elections, and a Little Military Madness

Archives Blogs

and Panamanian foreign relations: The Panama Canal: Riots, Treaties, Elections, and a Little Military Madness, 1959 – 1973. Learn more and view images from this project on our website: The Panama Canal: Riots, Treaties, Elections, and a little Military Madness, 1959­-1973. The National Declassification Center’s newest special project release concerns U.S.

Pentagon Bans Soldiers from Using GPS Apps and Devices

Threatpost

Uncategorized combat zones Department of Defense fitness apps gps devices location tracking military personnel Pentagon polar stravaThis includes physical fitness aids, applications in phones that track locations, and other devices and apps that could pinpoint and track the location of individuals in active combat zones.

Report: Guccifer 2.0 Unmasked at Last

Data Breach Today

Dutch and British Governments Slam Russia for Cyberattacks

Data Breach Today

Microsoft Uncovers Fresh Russian Attack Infrastructure

Data Breach Today

midterm elections approaching fast, Microsoft says it's seized six domain names tied to "Fancy Bear," a hacking team widely believed to be part of Russia's military intelligence agency, amplifying concerns that Moscow's election interference efforts continue

NotPetya: From Russian Intelligence, With Love

Data Breach Today

CIA Reportedly Believes Russian Military Launched Wiper Disguised as Ransomware The CIA has attributed last year's outbreak of NotPetya wiper malware to Russia's GRU military intelligence unit, The Washington Post reports.

Cyber Espionage Campaign Reuses Code from China's APT1

Dark Reading

US, Canadian organizations in crosshairs of group with apparent links to a Chinese military hacking unit that wreaked havoc several years ago

Spotlight: Hero Dogs

Unwritten Record

Digitization Fun Military Photo of the Week Photographs U.S. They are our sidekicks, our friends, our trusted companions. Protecting us from harm when alerting us to that ferocious looking Girl Scout coming up the front walk.

Remembering the Vietnam War this Veterans Day

Unwritten Record

The images broadcast in America’s living rooms during the war were often captured by military combat photographers. Ceremonies and special events were also captured by military camera crews at home and abroad.

Nation-State Spear Phishing Attacks Remain Alive and Well

Data Breach Today

Russians Tied to Hack Attacks, But 'Two-Factor' No Silver Bullet, Google Warns Spear phishing attacks are in the news again following the Justice Department's indictment of Russian military intelligence officers for alleged attacks against U.S. politicians and county and state election boards. Here's how to play better phishing defense

Building Fort Sumter

Unwritten Record

Architectural and Engineering Drawings Cartographic Records Civil War forts Military Uncategorized Charleston South CarolinaFort Sumter will forever go down in history as the location of the opening shots of the Civil War on April 12, 1861.