Chinese Military Wants to Develop Custom OS

Schneier on Security

Since these leaks have revealed that the US can hack into almost anything, the Chinese government's plan is to adopt a "security by obscurity" approach and run a custom operating system that will make it harder for foreign threat actors -- mainly the US -- to spy on Chinese military operations.

Russian military plans to replace Windows with Astra Linux

Security Affairs

The Russian military is in the process of replacing the Windows system with the Linux distribution Astra Linux. The post Russian military plans to replace Windows with Astra Linux appeared first on Security Affairs.

NATO military command center should be fully operational in 2023

Security Affairs

The NATO military command center should be fully operational in 2023, every member states will contribute with its cyber capabilities to the military hub. NATO alliance is aware of growing threats in the cyberspace and the new NATO military command center aims to respond them.

Locating Secret Military Bases via Fitness Data

Schneier on Security

Over this weekend, someone realized that it could be used to locate secret military bases: just look for repeated fitness activity in the middle of nowhere. datacollection geolocation military secrecy

Report Outlines Military Health Facility Security Weaknesses

Data Breach Today

Watchdog Agency: Problems Put Patient Data at Risk Some military health facilities haven't consistently implemented security controls, putting patient data at risk, according to a new watchdog agency report.

How the US Military Can Better Keep Hackers

Schneier on Security

Interesting commentary : The military is an impossible place for hackers thanks to antiquated career management, forced time away from technical positions, lack of mission, non-technical mid- and senior-level leadership, and staggering pay gaps, among other issues.

U.S. military to trawl through 350B social media messages

Information Management Resources

military plans to analyze 350 billion social-media posts from around the world to help it track how popular movements evolve. The U.S. Social media Internet Data management

Military Carrier Pigeons in the Era of Electronic Warfare

Schneier on Security

camouflage espionage militaryThey have advantages : Pigeons are certainly no substitute for drones, but they provide a low-visibility option to relay information. Considering the storage capacity of microSD memory cards, a pigeon's organic characteristics provide front line forces a relatively clandestine mean to transport gigabytes of video, voice, or still imagery and documentation over considerable distance with zero electromagnetic emissions or obvious detectability to radar.

Program Looks to Tap Military Vets for Cyber-Jobs

Threatpost

Government Cisco cybersecurity workforce cybervets usa job training Maryland military veterans netapp public private partnership shortage skills gap transitionThe training and job-matching effort is a public-private partnership to address a growing workforce gap.

U.S. Military Members Catfished and Hooked for Thousands of Dollars

Threatpost

MilitaryPrisoners in South Carolina posed convincingly as beautiful women on social media platforms. Mobile Security Web Security catfish enforcement action ncis prisoners sextortion scam South Carolina U.S.

Military justice

InfoGovNuggets

A Brigadier General in charge defending the accused at Guantanamo was arrested on the order of a military judge. Do military judges have more power than either they think they have or that they should? A new oxymoron. The General’s crime: allowing other civilian defense attorneys to resign after it was discovered the Government had bugged the room where the attorneys met with their clients. “Gitmo General Is Released,” The Wall Street Journal , November 4, 2017 A5.

Their War Too: U.S. Women in the Military During WWII. Part I

Unwritten Record

This year, we are focusing on the role women played in the United States Military during World War II in a two-part blog post. They were recruited for service in the United States military for the first time. They served in each branch of the military in separate units.

Report: Chinese Hackers Siphon Off ‘Massive’ Amounts of Undersea Military Data

Threatpost

Critical Infrastructure Cryptography Featured Government Hacks China espionage Hackers military contractor military secrets navy sea dragon submarines underseaThe stolen data included "secret plans to develop a supersonic anti-ship missile for use on U.S. submarines by 2020," American officials said.

Polar Fitness App Exposes Location of ‘Spies’ and Military Personnel

Threatpost

The fitness app Polar Flow exposes the whereabouts of some of its high-profile users, including “spies” and those with sensitive positions in the military. Hacks Mobile Security Privacy Fitness tracker geolocation data IoT military personnel polar polar fitness Polar Flow spies

Strava Data Heat Maps Expose Military Base Locations Around the World

WIRED Threat Level

The US military is reexamining security policies after fitness tracker data shared on social media revealed bases and patrol routes. Security

Their War Too: U.S. Women in the Military During WWII. Part II

Unwritten Record

In part I of this two-part series, we discussed the role women played in the military during World War II by highlighting those who served in the Women’s Army Corps (WAC), the Coast Guard Women’s Reserve (SPARS), and the Women Air Force Service Pilots (WASP) during World War II.

Security Pros Agree Military Should Conduct Offensive Hacking

Dark Reading

But it can't operate in a bubble, a new Washington Post study indicates

GoScanSSH Malware Targets SSH Servers, But Avoids Military and.GOV Systems

Threatpost

Researchers identify a new malware family called GoScanSSH that avoids servers linked to government and military IP addresses. . Cloud Security Government Hacks Malware ARM GoScanSSH GoScanSSH Malware SSH SSH Servers x86 x86_64

The Military Should Teach Artificial Intelligence to Watch Drone Footage

WIRED Threat Level

Opinion: The Pentagon collects so much surveillance footage that humans can’t watch all of it. It’s time to deploy AI. Security Opinion

U.S. military trusted more than Google, Facebook to develop AI

Information Management Resources

Facebook Inc. is among the technology companies leading the race to develop artificial intelligence. But Americans don’t trust it to do so responsibly, a survey from a U.K. think tank has found. Artificial intelligence Machine learning Facebook Google

White House: Russian Military Behind NotPetya Attacks

Dark Reading

Trump administration statement comes on the heels of UK government calling out Russia for the cyberattacks that spread through Europe and elsewhere

Military documents about MQ-9 Reaper drone leaked on dark web

The Security Ledger

Hackers have put up for sale on the dark web sensitive military documents, some associated with the U.S. military’s MQ-9 Reaper drone aircraft, one of its most lethal and technologically advanced drones, security research firm Recorded Future recently discovered. » Related Stories Fitness apps: Good for your health, not so much for military security Evasive new botnet can take over enterprise devices to steal data, spread ransomware U.S.

Google renounces AI weapons; Will still work with military

Information Management Resources

The company said it will keep working with the defense department in other areas, giving its cloud business the chance to pursue future lucrative government deals. Artificial intelligence Machine learning Google

Attacking Soldiers on Social Media

Schneier on Security

A research group at NATO's Strategic Communications Center of Excellence catfished soldiers involved in an European military exercise -- we don't know what country they were from -- to demonstrate the power of the attack technique. china impersonation military socialengineering socialmedia

CIA: Russian Military Hackers Behind NotPetya Attack

Dark Reading

Cyberattack last June aimed to disrupt Ukraine's financial system

Cybercriminals Have a Heyday with WinRAR Bug in Fresh Campaigns

Threatpost

With new attacks on the Israeli military and social-work educators, exploitation of the 19-year-old flaw shows no signs of slowing down. Vulnerabilities Web Security active exploits backdoor campaigns FireEye in the wild israeli military vulnerability WinRAR

History of the US Army Security Agency

Schneier on Security

historyofsecurity intelligence militaryInteresting history of the US Army Security Agency in the early years of Cold War Germany.

Leaky AWS Storage Bucket Spills Military Secrets, Again

Threatpost

For the second time in ten days, researchers at UpGuard released sensitive data belonging to the United States Defense Department that was stored insecurely online. Cloud Security Government Privacy Web Security AWS AWS Storage Bucket Chris Vickery Leaky AWS Storage Bucket Linux misconfigured servers National Security Agency NOFORN NSA Red Disk top secret United States Defense Department

Fitness apps: Good for your health, not so much for military security

The Security Ledger

Fitness apps are proving to be a lot less beneficial to military security than they are for military fitness. That after researchers in the Netherlands discovered that data from the Polar fitness app revealed the homes and habits of those exercising in clandestine locations around the world, including intelligence agencies, military bases, nuclear.

Military, Government Users Just as Bad About Password Hygiene as Civilians

Dark Reading

New report comes out just as group of US senators chastise Secretary of State Mike Pompeo for not using multifactor authentication

DoD Travel System Breach Exposed Data of 30K Civilian, Military Employees

Dark Reading

Defense Dept. says contractor that handles travel management services was hacked

Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers

Dark Reading

GRU hackers used bitcoin to fund US computer network infrastructure supporting and hiding the operation

Google builds military ties for AI cloud business as staff quit

Information Management Resources

Almost 4,000 company employees, out of an Alphabet total of 85,000, signed a letter asking Google CEO Sundar Pichai to nix the Project Maven contract and halt all work in 'the business of war.'. Artificial intelligence Machine learning Google

Google engineers refused to build security tool to win military contracts

Information Management Resources

Internal disputes are common at the firm, which gives employees ample space to air grievances. But dissent is on the rise (as it is at other tech companies). Hardware and software Artificial intelligence Machine learning Google

Pentagon Travel Provider Data Breach Counts 30,000 Victims

Data Breach Today

Department of Defense Has Begun Notifying Military and Civilian Breach Victims The Pentagon is warning that a data breach at a third-party travel management service provider exposed records for an estimated 30,000 civilian and military personnel.

Hacker Exploits 2-Year Old Router Issue To Steal Sensitive US Military Data

Dark Reading

A moderately skilled hacker managed to steal export-restricted data pertaining to the Reaper drone and Abrams tank from computers belonging to two US Army officials

Hy Rothman – Searching for Nazis on the Greenland Patrol

Unwritten Record

Harry is a former Navy photographer himself and came across this story while researching military photographers. During WWII the Office of the Chief of Naval Operations interviewed over 600 servicemen from all branches of the military on their activities and experiences in the war.

Feds Indict 7 Russians for Hacking and Disinformation

Data Breach Today

Russian Military Intelligence Team Allegedly Conducted Close-Access Operations The U.S.

75th Anniversary of D-Day

Unwritten Record

Harry is a former Navy photographer and came across this story while researching military photographers. This film comes from the Navy and is part of the series, Moving Images Relating to Military Activities, ca. militaryThis post was compiled by Harry Kidd.

Cloud Security Fail: Classified U.S. Military Data Exposed in Amazon S3 Bucket

eSecurity Planet

The exposed data includes information on the Army's Distributed Common Ground System and its cloud component, Red Disk