Lockheed Martin Unveils US Cyber Command’s Top Acquisition Priority: Cyber War-Fighting Platform “Henosis”

Lockheed Martin Unveils US Cyber Command’s Top Acquisition Priority: Cyber War-Fighting Platform “Henosis”

Lockheed Martin this week unveiled its offering for a program that has been commonly thought of as Cyber Command’s top acquisition priority this year. The unified platform has been described as a “cyber carrier,” which cyber warriors can use to coordinate plans, house tools and launch attacks. Lockheed Martin’s prototype for the program is a…

US DISA Approves Sharing Mission Critical Information Via The Cloud

US DISA Approves Sharing Mission Critical Information Via The Cloud

The Defense Information Systems Agency (DISA) has granted authorization to connect unclassified national security data and mission critical information to the cloud. The provisional authorization granted by the Department of Defense will allow Impact Level 5 data be to stored using milCloud 2.0 from CSRA, a government information technology company. MilCloud 2.0 is the DoD’s…

New Electronic Warfare Program Tops US Army Intel Wishlist

New Electronic Warfare Program Tops US Army Intel Wishlist

The Army is working to develop a single platform that can do electronic attack and intelligence gathering. (Photo by Staff Sgt. Armando Limon/U.S. Army)   The Department of Defense under Secretary of Defense James Mattis has begun to prioritize great power competition over terrorism for the first time in nearly 20 years. This has had…

After 250,000 Injured Troops: New Shock-Absorbing Technology To Save Soldiers From Traumatic Blast Brain Injury (TBI)

After 250,000 Injured Troops: New Shock-Absorbing Technology To Save Soldiers From Traumatic Blast Brain Injury (TBI)

“innovative discoveries are increasingly coming from the collaboration between disciplines, such as medicine and engineering”   This post is also available in: עברית (Hebrew)   Researchers from the University of Maryland School of Medicine (UMSOM) and the University of Maryland School of Engineering have developed a new military vehicle shock absorbing device that may protect…

Blockwart: Fundamentally Vulnerable? Ethereum’s Casper Tech Takes Criticism By Distributed Systems Expert

Blockwart: Fundamentally Vulnerable? Ethereum’s Casper Tech Takes Criticism By Distributed Systems Expert

Blockwart “I think Proof-of-Stake is fundamentally vulnerable.” – Dahlia Malkhi [ … for whatever it is worth, I agree with her – TJACK]   Is ethereum’s biggest future upgrade “fundamentally vulnerable?” That was the claim put forward by distributed systems expert and founding VMware researcher Dahlia Malkhi on Friday, who used those exact words to…

US Cyber Command Granted New, Expanded Authorities: Full Combatant Command To Move Forces Across Military, Allied Or Private-Sector Networks

US Cyber Command Granted New, Expanded Authorities: Full Combatant Command To Move Forces Across Military, Allied Or Private-Sector Networks

Under a new plan put in place late last year, the head of U.S. Cyber Command received expanded authorities, but Fifth Domain has learned Congress and the Department of Defense have considered further extending those powers. The discussion, which included members of the Joint Staff, comes as Cyber Command is expected to become a full…

Hacker drangen in deutsches Regierungsnetz IVBB ein: “ein Super-GAU”

Hacker drangen in deutsches Regierungsnetz IVBB ein: “ein Super-GAU”

Experten befürchten einen umfangreichen Datendiebstahl: Russische Hacker sollen möglicherweise ein Jahr lang das gesicherte Netzwerk des Bundes infiltriert haben. 28. Februar 2018 Quelle: ZEIT ONLINE, dpa, rv, fo, kb, kpm Ausländische Hacker sind in das als sicher geltende Datennetzwerk des Bundes und der Sicherheitsbehörden eingedrungen. Das berichteten übereinstimmend die dpa und die Süddeutsche Zeitung. Offenbar…

US ‘Not Doing Enough’ To Stop Russian Meddling In 2018, Adm. Rogers Tells Senate Armed Services Committee (SASC)

US ‘Not Doing Enough’ To Stop Russian Meddling In 2018, Adm. Rogers Tells Senate Armed Services Committee (SASC)

“Life cycle of a successful spearphishing operation” (Department of Homeland Security graphic)   WASHINGTON: Under relentless grilling from Democratic senators, the four-star officer who heads both Cyber Command and the NSA said the US government is “not doing enough” to prevent Russia from meddling in the 2018 elections. Could the US keep the Russians from…

US To Procure Jam-Resistant GPS Satellites

US To Procure Jam-Resistant GPS Satellites

This post is also available in: עברית (Hebrew) The U.S. Air Force wants 22 new GPS satellites that are built to resist jamming and electronic interference. The service expects to spend $2 billion on the new satellites for the GPS 3 constellation in the next five years. The production of all 22 satellites is expected…

US Army: Machine Gun Added To Robotic Humvee

US Army: Machine Gun Added To Robotic Humvee

This post is also available in: עברית (Hebrew) The U.S. Army is now sending a robotic Humvee to the gun range to see if an autonomous vehicle can accurately engage targets with its remote-controlled machine gun. The armed Hummer is part of the “Wingman” program to develop vehicles that can tag along with U.S. Army…

US Air Force Special Operations Command (AFSOC) Adds Artificial Intelligence To Armory; Still Eyes Lasers

US Air Force Special Operations Command (AFSOC) Adds Artificial Intelligence To Armory; Still Eyes Lasers

AFA ORLANDO: Air Force Special Operations Command (AFSOC) doesn’t speak much in public, for obvious reasons. The commander pretty much appears once a year here to speak with reporters, and for the last three years, mounting lasers on AC-130 gunships  has been a top topic. The former AFSOC commander, Lt. Gen. Bradley Heithold, first announced…

The Terrifying Future of Malicious Artificial Iintelligence on Digital, Physical, Political Security

The Terrifying Future of Malicious Artificial Iintelligence on Digital, Physical, Political Security

A new report from a series of national security and technology research organizations, including Elon Musk’s OpenAI, details the potential security threats posed by misuses of artificial intelligence. The report, titled “The Malicious Use of Artificial Intelligence: Forecasting, Prevention and Mitigation,” echoes the sentiments voiced by European leaders gathered at the Munich Security Conference last…