NATO military command center should be fully operational in 2023

Security Affairs

The NATO military command center should be fully operational in 2023, every member states will contribute with its cyber capabilities to the military hub. NATO alliance is aware of growing threats in the cyberspace and the new NATO military command center aims to respond them.

Report Outlines Military Health Facility Security Weaknesses

Data Breach Today

Watchdog Agency: Problems Put Patient Data at Risk Some military health facilities haven't consistently implemented security controls, putting patient data at risk, according to a new watchdog agency report.

Locating Secret Military Bases via Fitness Data

Schneier on Security

Over this weekend, someone realized that it could be used to locate secret military bases: just look for repeated fitness activity in the middle of nowhere. datacollection geolocation military secrecy

U.S. Military Members Catfished and Hooked for Thousands of Dollars

Threatpost

MilitaryPrisoners in South Carolina posed convincingly as beautiful women on social media platforms. Mobile Security Web Security catfish enforcement action ncis prisoners sextortion scam South Carolina U.S.

How the US Military Can Better Keep Hackers

Schneier on Security

Interesting commentary : The military is an impossible place for hackers thanks to antiquated career management, forced time away from technical positions, lack of mission, non-technical mid- and senior-level leadership, and staggering pay gaps, among other issues.

Program Looks to Tap Military Vets for Cyber-Jobs

Threatpost

Government Cisco cybersecurity workforce cybervets usa job training Maryland military veterans netapp public private partnership shortage skills gap transitionThe training and job-matching effort is a public-private partnership to address a growing workforce gap.

Polar Fitness App Exposes Location of ‘Spies’ and Military Personnel

Threatpost

The fitness app Polar Flow exposes the whereabouts of some of its high-profile users, including “spies” and those with sensitive positions in the military. Hacks Mobile Security Privacy Fitness tracker geolocation data IoT military personnel polar polar fitness Polar Flow spies

Their War Too: U.S. Women in the Military During WWII. Part I

Unwritten Record

This year, we are focusing on the role women played in the United States Military during World War II in a two-part blog post. They were recruited for service in the United States military for the first time. They served in each branch of the military in separate units.

Military justice

InfoGovNuggets

A Brigadier General in charge defending the accused at Guantanamo was arrested on the order of a military judge. Do military judges have more power than either they think they have or that they should? A new oxymoron. The General’s crime: allowing other civilian defense attorneys to resign after it was discovered the Government had bugged the room where the attorneys met with their clients. “Gitmo General Is Released,” The Wall Street Journal , November 4, 2017 A5.

Strava Data Heat Maps Expose Military Base Locations Around the World

WIRED Threat Level

The US military is reexamining security policies after fitness tracker data shared on social media revealed bases and patrol routes. Security

Their War Too: U.S. Women in the Military During WWII. Part II

Unwritten Record

In part I of this two-part series, we discussed the role women played in the military during World War II by highlighting those who served in the Women’s Army Corps (WAC), the Coast Guard Women’s Reserve (SPARS), and the Women Air Force Service Pilots (WASP) during World War II.

GoScanSSH Malware Targets SSH Servers, But Avoids Military and.GOV Systems

Threatpost

Researchers identify a new malware family called GoScanSSH that avoids servers linked to government and military IP addresses. . Cloud Security Government Hacks Malware ARM GoScanSSH GoScanSSH Malware SSH SSH Servers x86 x86_64

Military documents about MQ-9 Reaper drone leaked on dark web

The Security Ledger

Hackers have put up for sale on the dark web sensitive military documents, some associated with the U.S. military’s MQ-9 Reaper drone aircraft, one of its most lethal and technologically advanced drones, security research firm Recorded Future recently discovered. » Related Stories Fitness apps: Good for your health, not so much for military security Evasive new botnet can take over enterprise devices to steal data, spread ransomware U.S.

The Military Should Teach Artificial Intelligence to Watch Drone Footage

WIRED Threat Level

Opinion: The Pentagon collects so much surveillance footage that humans can’t watch all of it. It’s time to deploy AI. Security Opinion

Fitness apps: Good for your health, not so much for military security

The Security Ledger

Fitness apps are proving to be a lot less beneficial to military security than they are for military fitness. That after researchers in the Netherlands discovered that data from the Polar fitness app revealed the homes and habits of those exercising in clandestine locations around the world, including intelligence agencies, military bases, nuclear.

White House: Russian Military Behind NotPetya Attacks

Dark Reading

Trump administration statement comes on the heels of UK government calling out Russia for the cyberattacks that spread through Europe and elsewhere

Google renounces AI weapons; Will still work with military

Information Management Resources

The company said it will keep working with the defense department in other areas, giving its cloud business the chance to pursue future lucrative government deals. Artificial intelligence Machine learning Google

Military, Government Users Just as Bad About Password Hygiene as Civilians

Dark Reading

New report comes out just as group of US senators chastise Secretary of State Mike Pompeo for not using multifactor authentication

DoD Travel System Breach Exposed Data of 30K Civilian, Military Employees

Dark Reading

Defense Dept. says contractor that handles travel management services was hacked

CIA: Russian Military Hackers Behind NotPetya Attack

Dark Reading

Cyberattack last June aimed to disrupt Ukraine's financial system

History of the US Army Security Agency

Schneier on Security

historyofsecurity intelligence militaryInteresting history of the US Army Security Agency in the early years of Cold War Germany.

Leaky AWS Storage Bucket Spills Military Secrets, Again

Threatpost

For the second time in ten days, researchers at UpGuard released sensitive data belonging to the United States Defense Department that was stored insecurely online. Cloud Security Government Privacy Web Security AWS AWS Storage Bucket Chris Vickery Leaky AWS Storage Bucket Linux misconfigured servers National Security Agency NOFORN NSA Red Disk top secret United States Defense Department

Pentagon Travel Provider Data Breach Counts 30,000 Victims

Data Breach Today

Department of Defense Has Begun Notifying Military and Civilian Breach Victims The Pentagon is warning that a data breach at a third-party travel management service provider exposed records for an estimated 30,000 civilian and military personnel.

Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers

Dark Reading

GRU hackers used bitcoin to fund US computer network infrastructure supporting and hiding the operation

Hacker Exploits 2-Year Old Router Issue To Steal Sensitive US Military Data

Dark Reading

A moderately skilled hacker managed to steal export-restricted data pertaining to the Reaper drone and Abrams tank from computers belonging to two US Army officials

Google builds military ties for AI cloud business as staff quit

Information Management Resources

Almost 4,000 company employees, out of an Alphabet total of 85,000, signed a letter asking Google CEO Sundar Pichai to nix the Project Maven contract and halt all work in 'the business of war.'. Artificial intelligence Machine learning Google

Feds Indict 7 Russians for Hacking and Disinformation

Data Breach Today

Russian Military Intelligence Team Allegedly Conducted Close-Access Operations The U.S.

Google engineers refused to build security tool to win military contracts

Information Management Resources

Internal disputes are common at the firm, which gives employees ample space to air grievances. But dissent is on the rise (as it is at other tech companies). Hardware and software Artificial intelligence Machine learning Google

Will Apple Serve Our Veterans, Or Expose Them to Fraud?

Adam Levin

The Wall Street Journal (subscription required) reported a potential new partnership between Apple and the Department of Veterans Affairs that would give military veterans access to portable electronic health records. Data Security Government Technology featured military

Hy Rothman – Searching for Nazis on the Greenland Patrol

Unwritten Record

Harry is a former Navy photographer himself and came across this story while researching military photographers. During WWII the Office of the Chief of Naval Operations interviewed over 600 servicemen from all branches of the military on their activities and experiences in the war.

Pentagon Data Breach Exposed 30,000 Travel Records

Data Breach Today

Department of Defense Has Begun Notifying Military and Civilian Breach Victims The Pentagon is warning that a data breach at a third-party travel management service provider exposed an estimated 30,000 civilian and military personnel records.

Captured on Film: Armistice Day 1918

Unwritten Record

More than 350,00 African Americans served in segregated units in the United States military during World War I. “Our Wings of Victory,” the Manufacture of Military Aeroplanes During WWI. African American History Digitization Films Military Motion Pictures U.S.

Newly Digitized Series : Initial Burial Plats for World War I American Soldiers

Unwritten Record

Plan Showing Location of Graves in American Expeditionary Forces Cemetery 388: Plot in French Military Cemetery Chateau Thierry, Aisne. November 11 marks the 100th anniversary of the conclusion of World War I.

Cloud Security Fail: Classified U.S. Military Data Exposed in Amazon S3 Bucket

eSecurity Planet

The exposed data includes information on the Army's Distributed Common Ground System and its cloud component, Red Disk

Anthem, Apple and the Pentagon: A Data-Breach Cornucopia

Threatpost

Breach Critical Infrastructure Government Hacks Privacy Vulnerabilities 000 victims 30 Anthem apple Apple ID credit card breach data breach Department of Defense goa report military personnel payment fraud Pentagon record fine travel office weapons vulnerabilitiesA record fine and two new compromises kick off the autumn compromise season.

The Panama Canal: Riots, Treaties, Elections, and a Little Military Madness

Archives Blogs

and Panamanian foreign relations: The Panama Canal: Riots, Treaties, Elections, and a Little Military Madness, 1959 – 1973. Learn more and view images from this project on our website: The Panama Canal: Riots, Treaties, Elections, and a little Military Madness, 1959­-1973. The National Declassification Center’s newest special project release concerns U.S.

Supply-Chain Security

Schneier on Security

Earlier this month, the Pentagon stopped selling phones made by the Chinese companies ZTE and Huawei on military bases because they might be used to spy on their users. Members of the military, and everyone else, can still buy the phones. They just can't buy them on US military bases.

Hacker Compromises Air Force Captain to Steal Sensitive Drone Info

Threatpost

Hacks Vulnerabilities Air Force Dark Web Department of Defense hack hacker military drone Recorded Future secrets stolen submarineThe thief also had a second dataset, including the M1 Abrams maintenance manual, a tank platoon training course, a crew survival course and documentation on improvised explosive device (IED) mitigation tactics.

Chinese Cyber Threat: NSA Confirms Attacks Have Escalated

Data Breach Today

Defending Forward' Is New Military Mantra for Defending Government Networks With cyber espionage attacks from China escalating over the past year, the NSA's Rob Joyce says the U.S.

DHS – Russian APT groups are inside US critical infrastructure

Security Affairs

APT Breaking News Cyber warfare Hacking Intelligence Malware critical infrastructure DHS military Pierluigi Paganini Russia Security AffairsThe US Government is warning of continuous intrusions in National critical infrastructure and it is blaming the Kremlin for the cyber attacks.

Report: Guccifer 2.0 Unmasked at Last

Data Breach Today

Pentagon Bans Soldiers from Using GPS Apps and Devices

Threatpost

Uncategorized combat zones Department of Defense fitness apps gps devices location tracking military personnel Pentagon polar stravaThis includes physical fitness aids, applications in phones that track locations, and other devices and apps that could pinpoint and track the location of individuals in active combat zones.

Russia Linked Group Resurfaces With Large-Scale Phishing Campaign

Dark Reading

APT29/Cozy Bear is targeting individuals in military, government, and other sectors via email purporting to be from US State Department