Dubbed Content-Based Mobile Edge Networking, ostensibly provisions an 'alternative approach to the top down
focus of most military networks, which provide content over a common
operating environment from the strategic to tactical level'... A DOD Dropbox with C2 components, if you will...
Robert Zager (Attorney and Security Researcher at Iconix, Inc.) and John Zager's (Undergraduate at Hofstra University, Hempstead, N.Y. - soon to be matriculating with a degree in Industrial and Organizational Psychology ) outstanding piece on combat-wise identification in cyberspace is todays' MustRead. In which, the good authors, writing in Small Wars Journal, regales us with a tour de force in military focused computational methodology.
Fascinating piece on prosecuting peace through autonomous weapons systems, and thereby breaking Dr. Isaac Asimov'sLaw of Robotics [at least one, that is]. Ladies and Gentlemen, Girls and Boys, this is not a fanciful scenario...
via IEEE'sSpecturm Magazine's Davey Alba comes this interesting story of the Cyborg Cockroach, aka as an arthropoda sensor node. The signals intelligence possibilities are fascinating, yet so apropos for the cringe susceptible amongst us.
'This week, the Navy will commemorate the 71st anniversary of the Battle of Midway.
The battle, which took place June 4 to 7, 1942, changed the course of
the war in the Pacific and highlighted naval aviation’s vast
capabilities.' - via Navy Live'sJason Kelly
Fascinating, well- researched and targeted - what more do you need in a scholarly paper asking that age old interrogatory: Are Cyber-Weapons Effective? Via Ivanka Barzashka and published by the Royal United Services Institute for Defence & Security Studies [RUSI]. Deemed today's must read commentary. Enjoy.
Reports indicae, commercial banking institutions in the United States are peeved with the federal response to data security related attacks (evidence fingers Iranian sources for the specific attacks under scrutiny)...
via FocusTaiwan's Wen Kuei-hsiang and Elizabeth Hsu, the Taiwanese National Security Bureau (NSB) claims PRCPLA electronic warfare groups have temporarily modified their attack targets from government intrusions to private sector institutions within the only truly Chinese democratic society. Astounding.
Well crafted and researched thought piece via CSO'sJ eff Bardin, detailing Maskirovka [Маскировка] [also known as deception utilized as a military stratagem]. The post focuses on scenarios with certain, not necessarily quantifiable, linkage to current events in Massachusetts. Read Mr. Bardin'spost and you will be intrigued.
Reportedly, evidence, detailing intrusions into a United States National Aeronautics and Space Administration [NASA] database management system has forced the Agency to subsequently terminate external connectivity to the system, pending a thorough investigation.
Hard to believe team construction hasn't been going on since day-one, noting the Commands' highly motivated and deeply experienced leadership... Notwithstanding the source [I read it in The Washington Post]... Apparently, the Department of DefenseCyber Command is creating new teams to target [offensively] electronic computational attacks.
Failures in big data land just keep piling up... Flawed analysis - when brought to bear on large scale data collection activities, and the resultant artifact monikered 'Big Data' - is fundamentally as damaging as electonic warfare intrusions into those same systems. Not what we should expect to see. Read it and weep.
News, via Wired's irrepressible Kim Zetter, details the latest discovery relative to Stuxnet. Evidence uncovered by researchers show a recently unearthed variant predates the current release by five years. Absolutely outstanding reportage, and deemed today's' Must Read, especially if you are in the SCADA and ICS realms.
'The new variant was designed for a different kind of attack against
centrifuges used in Iran’s uranium enrichment program than later
versions that were released, according to Symantec, the U.S-based
computer security firm that reverse-engineered Stuxnet in 2010 and also found the latest variant.' - Wired'sKim Zetter
News, via the New York Times'David E. Sanger, focusing on evidence of the current political will to engage PRC's PLA cyberwar units has come to light, as it were. Politicians, who grow a pair, after the fact, never cease to astonish even the jaded amongst us...
In an absolutely outstanding piece, detailing an ISACAsurvey's interesting connections to the latest news of PRC infiltration via APT artifacts, Steve Ragan [via InfosecIsland] leads us on a tour de force targeting those same vectored threat. Today's Must Read.
"Sandia’s cyber R&D capabilities are rooted in our [nuclear weapons]
mission, and specifically weapons use-control engineering and
adversarial threat assessment,” said Ben Cook, a senior manager for
Sandia’s research and development science and engineering group..." - Nextgov.com's Aliya Sternstein