Archiv: electronic warfare ("cyber security" / etc)


12:09 [ Wired ]

Army Yanks ‚Voice-To-Skull Devices‘ Site

(09.05.2009)

The Army’s very strange webpage on „Voice-to-Skull“ weapons has been removed. It was strange it was there, and it’s even stranger it’s gone.

12:06 [ US Army / Federation of American Scientists ]

voice to skull devices

Nonlethal weapon which includes (1) a neuro-electromagnetic device which uses microwave transmission of sound into the skull of persons or animals by way of pulse-modulated microwave radiation; and (2) a silent sound device which can transmit sound into the skull of person or animals. NOTE: The sound modulation may be voice or audio subliminal messages. One application of V2K is use as an electronic scarecrow to frighten birds in the vicinity of airports.

05:00 [ NCSC / Twitter ]

Foreign actors & cybercriminals likely to spread disinfo on 2020 election results, per @FBI , @CISAgov . They could create new websites, change existing ones, create or share social media content to spread false info to discredit process.

04:38 [ International Telecommunication Union ]

The ITU 2020 Global CyberDrill, September-November 2020

The main objectives of this CyberDrill are as follows:

– Provide situational awareness to key public and private sector participants who lead their firms, organizations, or jurisdictions during a cyber disruption;- Bring the CERT/CIRT/CSIRT community together in a unified exercise to build global response and recovery capabilities;
– Test operational resiliency key concepts across CSIRT/CIRT/CERT community;
– Identify, exercise, and foster the improvement of processes, procedures, interactions and information sharing mechanisms that exist or should exist among CERTs/CSIRTs, SOCs, agencies, public bodies, and across regional organizations responsible for crisis management and regulatory bodies;
– Exercise coordination mechanisms, information sharing efforts, the development of shared situation awareness, and decision-making procedures of the cybersecurity community during cyber events; and,
– Raise awareness of other cyber exercise initiatives.​

04:30 [ Nigerian Army Resource Centre / Twitter ]

Happening now at the Nigerian Army Resource Centre is CYBER drill by Organization Of Islamic Conference and Computer Emergency Response Team ( OIC CERT) . The Drill is aimed at intimating the ICT Department of the Center on the need to be Cyber security conscious.

04:30 [ Oman News Center / Youtube ]

The Sultanate hosts the 8th Arab Regional & OIC-CERT Cyber Drill

The Sultanate hosts the 8th Arab Regional & OIC-CERT Cyber Drill
Report: Saleh bin Khalfan Al RahbiThe Sultanate hosts the 8th Arab Regional & OIC-CERT Cyber Drill
´

04:16 [ mcit.gov.eg ]

Egypt Partakes in ITU 2020 Global CyberDrill- Arab Regional Dialogue

Egypt, represented by the Egyptian Computer Emergency Response Team (EG-CERT), is participating in the “CyberDrill 2020 – Arab Region Regional Dialogue: CIRTs and lessons learned from COVID-19 crisis,” organized by the International Telecommunication Union (ITU), online, on September 22.

The Global CyberDrill is a capacity building event which aims to enhance the communication and incident response capabilities of participating teams and promote collective efforts by national Computer Incident Response Teams (CIRTs) and Computer Security Incident Response Teams (CSIRTs).

11.09.2020 - 14:42 [ alumni.cornell.edu / web.archive.org ]

SPOTLIGHT ON: BARBARA RIGGS

(Frühjahr / spring 2006)

„Once the first plane hit, we implemented emergency evacuation plans for our field office located in World Trade Center #7. All these individuals were in the process of being evacuated when the second plane hit. While the Secret Service law enforcement personnel assisted NYPD and NYFD evacuate the towers, the administrative staff and temporary personnel were escorted to safety. Secret Service Special Officer Craig Miller was killed while assisting in the evacuation of one of the towers. Later that day, the USSS New York Field Office was lost as World Trade Center #7 collapsed.

Thru monitoring radar and activating an open line with the FAA, the Secret Service was able to receive real time information about other hijacked aircraft. We were tracking two hijacked aircraft as they approached Washington, D.C. and our assumption was that the White House was a target. While the White House was evacuated, the Secret Service prepared to defend the facility.“

11.09.2020 - 14:33 [ Michael C. Ruppert / Weebly.com ]

Crossing the Rubicon

(2004)

It has never been disputed that at all times Cheney was able to communicate with the Pentagon. Nor has it ever been disputed that the Secret Service was always in Cheney’s immediate presence. This is where the entire explanation of who knew what and when offered by the Kean Commission irretrievably falls apart. Below Clarke’s description of the unfolding of a key moment on the morning of 9/11 falls between two time-certain events. We can clearly place the time of this moment atapproximately 9:40 a.m., or one minute before the impact on the Pentagon.

„During the pause [as people in the White House Situation Roompaused to watch President Bush’s first televised remarks at 9:30 a.m.], I noticed that Brian Stafford, Director of the Secret Service, was now in the room. He pulled me aside ….

Stafford slipped me a note. “Radar shows aircraft headed this way.” Secret Service had a system that allowed them to see what FAA’s radar was seeing. “I’m going to empty out the complex.” He was ordering the evacuation of the White House.
Ralph Seigler stuck his head into the room, “There has been an explosion at the Pentagon parking lot, maybe a car bomb.” “

“Secret Service had a system that allowed them to see what FAA’s radar was seeing”?

11.09.2020 - 13:34 [ Federation of American Scientists - fas.org ]

CRITICAL FOUNDATIONS: PROTECTING AMERICA’S INFRASTRUCTURES – The Report of the President’s Commission on Critical Infrastructure Protection

(13.10.1997)

Existing Information Sharing Efforts

(…) We also found a great deal of information sharing already underway. Trade associations, consortia, and other groups exchange information among their members and, in some cases, directly with government. Many federal, state and local government agencies have existing relationships with infrastructure owners and operators. Within all the infrastructure sectors, at least some portions are subject to regulatory control by government agencies, and information is shared, albeit sometimes within carefully defined constraints. Several federal agencies provide information to infrastructure owners and operators. The FBI’s Awareness of National Security Issues and Response (ANSIR) program gives over 25,000 industry members information that provides threat and vulnerability insights. More narrowly focused programs are the Department of Transportation’s terrorist threat notification to the civil aviation industry and the National Security Agency’s INFOSEC Vulnerability Assessment Program, which provides information systems-related data to private sector partners. The Comptroller of the Currency operates another system providing advisories on information integrity and security risks to financial institutions.

(…)

The third and least predictable threat to the infrastructure comes from deliberate attack. Depending on their objectives, attackers may seek to steal, modify, or destroy data stored in information systems or moving over networks, or to degrade the operation of the systems and net-works themselves, denying service to their users. Attackers include national intelligence organizations, information warriors, terrorists, criminals, industrial competitors, hackers, and aggrieved or disloyal insiders. While insiders constitute the single largest known security threat to information and information systems, controlled testing indicates that large numbers of computer based attacks go undetected, and that the unknown component of the threat may exceed the known component by orders of magnitude.

(…)

The air traffic control system of the FAA is based on decades old technology. The replacement system, while doubtless more efficient, will be more vulnerable unless special security measures are incorporated.

(…)

The Commission recommends the Secretary of Transportation:

1) Fully evaluate actual and potential sources of interference to, and vulnerabilities of, GPS before a final decision is reached to eliminate all other radiovnavigation and aircraft landing guidance systems.

2) Sponsor a risk assessment for GPS-based systems used by the civilian sector, projected from now through the year 2010.

3) Base decisions regarding the proper federal navigation systems mix and the final architecture of the NAS on the results of that assessment. The DOT and FAA must develop a better understanding of interference and other vulnerabilities of GPS before a final decision is reached concerning the status of all other radionavigation and landing guidance systems. A federally sponsored thorough, integrated risk assessment would lay a sound foundation for decisions on future courses of action.

The National Airspace System

The Commission recommends the FAA act immediately to develop, establish, fund, and implement a comprehensive National Airspace System Security Program to protect the modernized NAS from information-based and other disruptions, intrusions and attack. Program implementation should be guided by the recommendations found in the Vulnerability Assessment of the NAS Architecture, prepared for the Commission. The Vulnerability Assessment included the following recommendations: (…)

3) The FAA should consider the implementation of full “trusted” hardware and software security capabilities for only the FAA’s most vulnerable future subsystems, since the software cost for embedded applications, together with full audit, tracking, and monitoring, may be too great if applied to all subsystems. Relaxation of the full capabilities, such as less rapid revalidation (e.g., a slower fifteen minutes down time) and less constant vigilance of data integrity, should be considered on a case-by-case basis for less critical subsystems, particularly in situations where existing air traffic control recovery procedures exist.

4) The FAA should conduct a comprehensive investment analysis of NAS INFOSEC in order to determine the degree of security protection that is needed

(…)

Transportation: A critical infrastructure characterized by the physical distribution system critical to supporting the national security and economic well-being of this nation, including the national airspace system, airlines and aircraft, and airports; roads and highways,trucking and personal vehicles; ports and waterways and the vessels operating thereon; mass transit, both rail and bus; pipelines, including natural gas, petroleum, and other hazardous materials; freight and long haul passenger rail; and delivery services.

03.09.2020 - 20:53 [ Haaretz ]

Cellphone Hacking and Millions in Gulf Deals: Inner Workings of Top Secret Israeli Cyberattack Firm Revealed

NSO’s specialty is hacking smartphones. Up till now, little was known about Candiru. TheMarker has revealed that the firm offers hacking tools used to break into computers and servers, and now, for the first time, has confirmed it also has technology for breaking into mobile devices.

According to a document signed by an unnamed vice president for Candiru, they also offer a “high-end cyber intelligence platform dedicated to infiltrate PC computers, networks, mobile handsets, by using explosions and disseminations operations.“

03.09.2020 - 06:45 [ Informationsstelle Militarisierung (IMI) ]

Gegen das digitale Wettrüsten: Rede beim Antikriegstag 2020 in Tübingen

Liebe Freundinnen und Freunde,

wir wissen mittlerweile, dass auch Forschung im Cyber Valley von den US-Geheimdiensten finanziert wird. Zwei Tübinger Unternehmen wurden dabei als „verbundene Startups“ angegeben, nach öffentlicher Berichterstattung aber schnell von der Homepage genommen. Dort findet sich aber bis heute das Startup eines ehemaligen MPI-Forschers, der nun in den USA am selben IARPA-Forschungsprojekt beteiligt ist, wie seine ehemaligen Kolleginnen am Max-Planck-Institut für biologische Kybernetik. Dieses Startup implementiert mit Anschubfinanzierung des Pentagons Software für Datenverarbeitung auf Servern von Amazon Web Services.

27.08.2020 - 23:16 [ Mint Press ]

Cyber Command Gets New Surveillance Powers Under Guise of Battling Election Meddling

Domestically, the potential targeting of American citizens as foreign actors or agents was moved forward by Bill Barr’s Justice Department in June, in response to the Minneapolis riots, Barr released a statement naming “Antifa and other similar groups” as possible targets of its 56 regional FBI Joint Terrorism Task Forces (JTTF) offices. In the same statement the top prosecutor invoked the National Guard, which would be “deployed on the streets to reestablish law and order” if necessary.

17.07.2020 - 09:52 [ Max Blumenthal / Twitter ]

The CIA can now target/attack media outfits, charities, etc based on paranoid suspicion of ties to designated enemies and little to no hard evidence. Presumably this means US-based organizations are fair game as well.

17.07.2020 - 09:50 [ Yahoo.com ]

Exclusive: Secret Trump order gives CIA more powers to launch cyberattacks

The secret authorization, known as a presidential finding, gives the spy agency more freedom in both the kinds of operations it conducts and who it targets, undoing many restrictions that had been in place under prior administrations. The finding allows the CIA to more easily authorize its own covert cyber operations, rather than requiring the agency to get approval from the White House.

16.07.2020 - 10:49 [ theHill.com ]

Twitter accounts of Obama, Biden, Musk and others compromised

The attack is likely the largest ever on Twitter’s security system and may have already cost users ten of thousands of dollars.

The accounts – which included other tech CEO’s including Amazon’s Jeff Bezos, celebrities such as Kanye West, and other political figures like former New York City Mayor Michael Bloomberg – posted similar messages offering to double bitcoin payments sent to an address during a set period of time.

11.07.2020 - 16:38 [ New York Times ]

Long-Planned and Bigger Than Thought: Strike on Iran’s Nuclear Program

In addition, some American and Israeli officials, and international security analysts, say that Iran may believe that President Trump will lose the November election and that his presumptive Democratic rival, Joseph R. Biden Jr., will want to resurrect some form of the negotiated settlement that the Obama administration reached with Tehran five years ago next week.

11.07.2020 - 16:33 [ Haaretz ]

Israel, U.S Developing Shared Strategy to Harm Iran’s Nuclear Facilities, Officials Tell NYT

The Times also said that U.S. Secretary of State Mike Pompeo maintains a close relationship with Mossad chief Yossi Cohen, making it unlikely that Pompeo was unaware of the plan to attack the Natanz nuclear facility – if it was indeed an Israeli-engineered operation.

19.06.2020 - 11:16 [ ABC.net.au ]

‚Cyber attacks‘ point to China’s spy agency, Ministry of State Security, as Huawei payback, say former Australian officials

In August 2018, the Australian Government banned Huawei and other companies from involvement in Australia’s 5G network.

The ABC spoke to two former Australian officials who confirmed that the Huawei ban sparked the malicious cyber campaign. Both spoke on condition of anonymity given the sensitive nature of the story.

10.06.2020 - 13:23 [ Cracked.com ]

5 Realities About The World’s Scariest Police Department

(19.06.2017)

5. The NYPD Now Has Offices All Over The World

Through the International Liaison Program, NYPD detectives are now stationed in 13 cities around the globe, from Paris to Amman to Sydney. If you’re surprised that New York City would have flatfoots permanently operating on the majority of Earth’s continents, you aren’t alone. When bombs went off in Bali in 2005, Indonesian police were understandably „astonished and irritated that the NYPD showed up.“

10.06.2020 - 12:39 [ Salon.com ]

Nine terrifying facts about America’s biggest police force

(28.09.2012)

When asked for details at a press conference, Mayor Bloomberg basically told reporters to fuck off, saying, „The NYPD has lots of capabilities that you don’t know about and you won’t know about.“

The New York Times has reported that the department’s Harbor unit has 6 submarine drones; four cost $75,000 and the two others cost $120,000, according to the Times. They are developing a portable radar that can see under clothes in order to search for weapons. Militaristic „Hercules teams,“ are deployed to random parts of the city armed with automatic weapons and body armor. Their explicitly stated role is to terrify people.

10.06.2020 - 11:49 [ NYPD - nyc.gov ]

NYPD: Intelligence and Counterterrorism

The Deputy Commissioner oversees both the Intelligence Bureau, which is responsible for intelligence collection and analysis; and the NYPD’s Counterterrorism Bureau operations, including the partnership with the FBI/NYPD Joint Terrorism Task Force, the first and largest of its kind in the nation.

New York City is home to more than 8 million people and hosts over 58 million visitors from all over the world annually. The Intelligence and Counterterrorism Bureaus provide some of the most highly trained and best equipped officers to patrol the city, collect and analyze data, and collaborate with partner agencies.

10.06.2020 - 11:41 [ NYPD - nyc.gov ]

NYPD: Counterterrorism

The CT Bureau reviews possible terrorist targets and develops innovative, forward-thinking policies and procedures to guard against attacks, training first responders and specialized units and developing intelligence capabilities for detecting and preventing terrorist attacks. The bureau coordinates with federal, state, and other law enforcement agencies in intelligence gathering and sharing, and plays an integral role in the FBI’s Joint Terrorist Task Force.

Critical Response Command (CRC) is one of the Department’s first lines of defense against a terrorist-related attack. A permanent cadre of hand-selected police officers devoted to counterterrorism, CRC members are trained to respond swiftly, with sufficient expertise and force, to the most highly organized and heavily armed attacks. All CRC team members are trained in special weapons and long-range guns, explosive trace detection, radiological and nuclear awareness, biological and chemical weapons awareness, and are equipped with the skills to detect an impending attack and utilize the best possible response to an emerging situation. The team conducts daily counterterrorism deployments to critical infrastructure sites throughout New York City, saturating strategic locations with a uniform presence to disrupt and deter terrorist planning and hostile surveillance operations.

(…)

Domain Awareness System (DAS) is a powerful counterterrorism and policing tool jointly developed and built by the NYPD and Microsoft. As a central platform, DAS is used to aggregate data from internal and external closed-circuit television cameras, license plate readers, and environmental sensors, as well as 911 calls and other NYPD databases. DAS uses an interactive dashboard interface to display real-time alerts whenever a 911 call is received or a sensor is triggered.

10.06.2020 - 11:22 [ NYPD - nyc.gov ]

NYPD: Information Technology

The Information Technology Bureau (ITB) plays an integral role in establishing the NYPD as one of the leading counterterrorism and crime-fighting forces in the nation, developing and implementing cutting-edge technology to support strategies, programs, and procedures that promote safety, efficiency, and effectiveness.

The bureau provides the department with state-of-the-art technological support, building a leading IT and telecommunications infrastructure. ITB comprises six divisions, each with its own specialized directive, which report directly to the Deputy Commissioner, Information Technology. The six divisions are:

25.05.2020 - 15:29 [ New York Times ]

By Air and Sea, Mercenaries Landed in Libya. But the Plan Went South.

The abortive mercenary expedition last summer was organized and financed by a network of secretive companies in the United Arab Emirates, according to a confidential report submitted to the United Nations Security Council in February. The companies are controlled or part-owned by Christiaan Durrant, an Australian businessman and former fighter pilot who is a close associate of Erik Prince, America’s most famous mercenary entrepreneur.

25.05.2020 - 15:12 [ Bloomberg ]

Western Team Went to Help Moscow’s Man in Libya, UN Finds

Opus and Lancaster 6 financed and directed an operation to provide Haftar’s forces with helicopters, drones and cyber capabilities through a complex web of shell companies, according to two diplomats who briefed Bloomberg on the contents of the UN Panel of Experts report shared with the Security Council’s sanctions committee in February. The diplomats also shared excerpts of the report with Bloomberg.

19.05.2020 - 18:10 [ i24News.tv ]

Report: Suspected Israeli cyberattack wreaks havoc at Iranian port

US officials believe that Israel was behind a „highly accurate“ recent cyberattack targeting Iran’s largest cargo port, the Washington Post reported Monday, adding that the attack caused way more damage than Tehran acknowledged.

On May 9, Iran’s Shahid Rajaee port supposedly came under a sustained cyberattack.

16.05.2020 - 23:40 [ Informationsstelle Miitarisierung (IMI) ]

Cyber Valley, MPI und US-Geheimdienste

Ein militärisch-forschungsindustrieller Komplex?

03.05.2020 - 23:44 [ The Hill ]

Military at the polls in the election? Only as a last resort in this country

What is their role? What cybersecurity expertise does the National Guard have that cannot be provided by civilians? What kind of access is the National Guard given to voter registration and voting systems in order to assist states and the Homeland Security Department?

27.04.2020 - 11:23 [ Haaretz ]

Israeli Government Is Invading Our Privacy Under the Guise of Battling Coronavirus

Two weeks ago, the council had already discussed the possibility of a popular revolt and how the government could prevent an uprising against the authorities. Among other things, it considered how the state “could forestall dangers that could lead to widespread social unrest” that might spark protests against the government and state institutions.

It turns out that soldiers and officers from one of Military Intelligence’s classified intelligence gathering units gathered data and analyzed it for the task force that the National Security Council appointed for this purpose.

01.04.2020 - 09:40 [ Haaretz ]

Too Big a Brother

Under the cover of the spreading coronavirus, the government is deepening its invasion of the lives of this country’s citizens. Defense Minister Naftali Bennett continues to use his temporary authority in order to promote plans that run roughshod over the right to privacy, while demolishing the distinction, so vital in a democracy, between the army and civil society.

01.04.2020 - 09:21 [ Kopenhagen Post ]

Denmark wary of foreign powers during pandemic

In co-operation with other Nordic intelligence services, the defence minister, Trine Bramsen, has warned that foreign powers are willing to use to the coronavirus crisis to cause damage to Denmark.

In an interview with Jyllands-Posten newspaper, Bramsen said that the pandemic makes Denmark more vulnerable, and there are already examples of negative-impact campaigns being aimed at the Danes.

30.03.2020 - 17:31 [ BBC ]

MI5: Ken McCallum appointed new boss

Currently deputy director general, he has worked there for nearly 25 years, a statement said. He succeeds Sir Andrew Parker, who retires in April after seven years.

23.03.2020 - 08:49 [ Pentagon ]

Northcom Commander Calls for 21st Century Tools to Defeat Current Threats

(11.03.2020)

The command will continue to partner with the U.S. defense and commercial industries a „to transform rapidly evolving scientific information into leading-edge digital age technology,“ he said.

The command is building a SHIELD — the Strategic Home and Integrated Ecosystem for Layered Defense — to defend the homeland.

„Our layered defense needs to establish awareness in all domains; from below the oceans to the highest levels of space, including the unseen cyber domain, which are all at risk,“ he said.

19.03.2020 - 07:31 [ Haaretz ]

LISTEN: Will Israel’s Cyber Spies Let Bibi Use Coronavirus to Kill Democracy?

Israel, paralyzed by the global COVID-19 crisis and by permanent political crisis, has passed a series of worrying measures to stem the spread of the virus. LISTEN FREE.

12.03.2020 - 15:09 [ Fiorella Isabel / Twitter ]

In case we didn’t see this look at these numbers. And the time stamp. This is reminiscent of 2016. If they can do this without any sort of accountability, guess what? They’ll keep doing it. It’s long been time to call for recounts and investigations. #ElectionIntegrity

Note also how at the bottom they go from 1,344,469 vote totals to 1,072,844. Which is obviously not possible. @MichiganDems you’ve been exposed.

12.03.2020 - 13:41 [ New York Times ]

Trial of Programmer Accused in C.I.A. Leak Ends in Hung Jury

Prosecutors were careful to avoid details about specific operations. During cross-examination, Ms. Shroff asked one C.I.A. witness: “Do you recall a time when the C.I.A. covertly tried to read Angela Merkel’s emails?” referring to the German chancellor.

The government objected, and the judge stopped the witness from answering.

16.02.2020 - 15:12 [ theIntercept.com ]

Mike Bloomberg in 2014: “We Should Hope” the NSA Is “Reading Every Email”

“Look, if you don’t want it to be in the public domain, don’t take that picture, don’t write it down. In this day and age, you’ve got to be pretty naive to believe that the NSA isn’t listening to everything and reading every email,” Bloomberg said. “And incidentally, given how dangerous the world is, we should hope they are, because this is really serious, what’s going on in the world.”

16.02.2020 - 14:14 [ John Panzer, Silicon Valley & California native / Twitter ]

“The DNC ordered and paid for a security audit of the software, which was completed by NCC Group, a Britain-based cybersecurity firm.

Out of the review, which also involved threat assessment conducted with the national party as well as officials in Iowa… … and Nevada, came directions to guard the name of the vendor, and to take the software live as late as possible to prevent it from getting into the hands of hackers, according to multiple people who participated or had knowledge of the exercises.”

16.02.2020 - 14:09 [ Washington Post ]

How the Iowa caucuses came ‘crashing down,’ under the watchful eye of the DNC

The DNC ordered and paid for a security audit of the software, which was completed by NCC Group, a Britain-based cybersecurity firm. Out of the review, which also involved threat assessment conducted with the national party as well as officials in Iowa and Nevada, came directions to guard the name of the vendor, and to take the software live as late as possible to prevent it from getting into the hands of hackers, according to multiple people who participated or had knowledge of the exercises.

11.02.2020 - 15:19 [ Washington Post ]

‘The intelligence coup of the century’: For decades, the CIA read the encrypted communications of allies and adversaries.

For more than half a century, governments all over the world trusted a single company to keep the communications of their spies, soldiers and diplomats secret.

The company, Crypto AG, got its first break with a contract to build code-making machines for U.S. troops during World War II. Flush with cash, it became a dominant maker of encryption devices for decades, navigating waves of technology from mechanical gears to electronic circuits and, finally, silicon chips and software.

05.02.2020 - 10:23 [ PJmedia.com ]

Hoo Boy: Hillary’s Campaign Manager Was Involved With That Disastrous Iowa Caucus App

As everyone knows by now, the Iowa caucuses on Monday were an unmitigated disaster, thanks to an app that malfunctioned, as the Iowa Democratic Party tells it. As it turns out, Robby Mook, Hillary’s 2016 campaign manager, was tasked with vetting the app that resulted in… well… no results on Monday night. You can’t make this stuff up.

04.02.2020 - 14:46 [ Marc Brammer / Twitter ]

The Democratic chair for Iowa, Troy Price, should resign immediately.

04.02.2020 - 14:26 [ Wikipedia ]

Troy Price

Troy Price is an American political strategist and LGBT rights advocate who has served as the Chair of the Iowa Democratic Party since his election in July 2017. Price worked in the administration of Iowa Governor Chet Culver, and later served as a press aide for Tom Vilsack.[2] Price served as Iowa Director for the Barack Obama 2012 presidential campaignand the Hillary Clinton 2016 presidential campaign.[3]

04.02.2020 - 14:23 [ Des Moines Register ]

Unprecedented cybersecurity measures being taken to safeguard Iowa caucus results

(03.02.2020)

Both parties in Iowa and their app and web development vendors partnered last fall with Harvard’s Defending Digital Democracy Project to develop strategies and systems to protect results and deal with any misinformation that’s reported on caucus night.

They worked with campaign experts Robby Mook and Matt Rhodes — as well as experts in cybersecurity, national security, technology and election administration — and simulated the different ways that things could go wrong on caucus night.

Mook, 2016 campaign manager for Hillary Clinton, and Rhodes, Mitt Romney’s 2012 campaign manager, helped develop a public-service video to alert campaigns to the warning signs of hacking and misinformation.

04.02.2020 - 14:22 [ NPR.org ]

Despite Election Security Fears, Iowa Caucuses Will Use New Smartphone App

(14.01.2020)

Iowa’s Democrats hope the new app lets the party get results out to the public quicker, says Troy Price, the chairman of the state party.

In an interview, Price declined to provide more details about which company or companies designed the app, or about what specific measures have been put in place to guarantee the system’s security.

But security is a priority, he says.

23.01.2020 - 10:24 [ Consortium News ]

Consortium News Sends Libel Notices to Canadian Signals Intelligence Agency and Major Television Network

Consortium News has sent libel notices to the Communications Security Establishment (CSE), Canada’s version of the U.S. National Security Agency, and to a major Canadian television network, Global News, for a report that said Consortium News was “part of a cyber-influence campaign directed by Russia.”

Based on a CSE leak of a secret document, Global News’ website said in a Dec. 10, 2019 article entitled, “‘Canadian eyes only’ intelligence reports say Canadian leaders attacked in cyber campaigns,” that Consortium News led this campaign.

20.01.2020 - 02:14 [ Fox 35 Orlando ]

Military exercise to jam some GPS signals in Florida

The Federal Aviation Authority (FAA) says that some GPS signals in Florida over the next few days will be jammed during military training exercises.

08.01.2020 - 12:52 [ Haaretz ]

How Israel Covers Up Corruption by Its Spies, Soldiers and Arms Dealers

Israel’s security apparatus and its over-collaborative judiciary would do well to look up, then commit to memory, the words of U.S. Supreme Court justice Louis Brandeis: „Publicity is justly commended as a remedy for social and industrial diseases. Sunlight is said to be the best of disinfectants.“

05.12.2019 - 05:49 [ Tagesschau ]

Ende des NATO-Gipfels: „Ein sehr erfolgreiches Treffen“

Erstmals wird in der Londoner Erklärung auch die aufstrebende Militärmacht China als zwar nicht aktuelle, aber mögliche neue Bedrohung erwähnt. Dies war US-Präsident Donald Trump mit Blick auf den Ausbau der Mobilfunknetze 5G wichtig.

04.12.2019 - 14:37 [ devdiscourse.com ]

Don’t take peace for granted, British PM Johnson tells NATO leaders

„History shows that peace cannot be taken for granted and even as we celebrate this anniversary we must ensure our deeds match our words,“ Johnson said. „We must never shy away from discussing new realities, particularly NATO’s response to emerging threats like hybrid warfare and disruptive technologies including space and cyber,“ he said.

22.11.2019 - 01:07 [ German Foreign Policy ]

Digitales Schlachtfeld (I)

Die Bundesregierung investiert mehr als eine Milliarde Euro in die Aufrüstung der deutschen Streitkräfte für die digitale Kriegführung. Der Löwenanteil in Höhe von 700 Millionen Euro fließt an die Bundeswehr-Informationstechnikgesellschaft BWI.

31.10.2019 - 21:05 [ Anadolu Agency ]

NATO tests electronic defenses in naval exercise

„The 6-day Naval Electro Magnetic Operations — or “NEMO” — trials will test how allied navies can defend themselves against anti-ship cruise and hypersonic missiles using state-of-the-art electronic defences,“ NATO said in a statement.

20.08.2019 - 18:22 [ Haaretz ]

Mysterious Israeli Businessman Behind Mega-deal to Supply Spy Planes to UAE

The fact that there are no diplomatic ties between Israel and the UAE and other Persian Gulf countries has not prevented the shared interests of the countries in the region to forge an extensive unofficial relationship, including in business, military and political spheres. In the case of Israel and the Gulf states, one main shared interest is their mutual enemy: Iran.

20.08.2019 - 18:18 [ Middle East Monitor ]

Israel businessman behind UAE spy plane deal

However, as Haaretz points out, “it is interesting to discover that Israel’s name is totally absent from the hundreds of thousands of words describing the transaction in detail. The only mention of the country is in one document originating in Switzerland that describes the structure of AGT. It mentions in German that Kochavi is an Israeli citizen.”

The Israeli daily also notes that this deal is not Kochavi’s first project on behalf of the UAE, pointing to the installation of thousands of cameras, sensors and license-plate readers in Abu Dhabi in a bid to turn the capital into a “smart city”.

12.07.2019 - 19:04 [ Bundesministerium des Innern, für Bau und Heimat ]

Zweitstandort der Bundesbehörde BSI entsteht in Freital

Das BSI in Freital wird darüber hinaus aber künftig auch Ausgangspunkt für eine enge Kooperation im Bereich der Cyberermittlungen werden. Sachsens Cybercrime Competence Center am Landeskriminalamt, wie auch andere Sicherheitsbehörden werden davon zusätzlich profitieren.“

29.06.2019 - 19:14 [ Wikipedia ]

People’s Liberation Army Strategic Support Force

The People’s Liberation Army Strategic Support Force (PLASSF or SSF ; Chinese: 中国人民解放军战略支援部队) is the cyber-, space-, and electronic-warfare service branch of China’s People’s Liberation Army.[2][3] It was established in December 2015 as part of the first wave of the People’s Republic of China military reform.

28.06.2019 - 01:11 [ German Foreign Policy ]

Offensive Cyber-Kräfte

Ebenso wie die Unterscheidung zwischen defensiven und offensiven Maßnahmen der digitalen Kriegführung ist die Unterscheidung zwischen militärischen und zivilen „Cyber-Fähigkeiten“ für die deutsche Staatsführung offenbar längst obsolet. So heißt es bereits in der „Cyber-Sicherheitsstrategie“ der Bundesregierung aus dem Jahr 2016: „Die Verteidigungsfähigkeiten der Bundeswehr im Cyber-Raum sind … wesentlicher Teil der Cyber-Sicherheitsarchitektur. Sowohl die inhaltliche Übereinstimmung bei der technischen Umsetzung von Schutzmaßnahmen als auch die Nutzung und Mitgestaltung von Strukturen, Prozessen und Meldewesen der Cyber-Abwehr … zeigen die enge Abhängigkeit.“

23.06.2019 - 13:02 [ CNN ]

The Guardian says it was warned of cyber attacks by Saudi Arabia

(20.06.2019)

The Guardian says that it was warned earlier this year about efforts by a cybersecurity unit in Saudi Arabia to „hack“ its computer networks.
The British newspaper published an article on Wednesday that says it was alerted by a source in Riyadh that it was being targeted by the unit following the murder of journalist Jamal Khashoggi.

23.06.2019 - 12:52 [ Middle East Monitor ]

Saudi Arabia buys $300m spyware from Israel

(20.06.2019)

The sources stressed that the Saudi intelligence services have sought to obtain advanced spyware in order to trace the Kingdom’s citizens – both in the country and abroad – amidst increasing criticism of the Saudi royal family.

Saudi Arabia therefore reached out to the Israeli market and struck a deal worth $300m with representatives of Israeli firms, the sources said, adding that both sides met and reached the deal in UK capital London.

16.06.2019 - 13:47 [ Express.co.uk ]

Tensions erupt as US launch cyber attack on Russia but officials don’t tell Trump

The New York Times, the US has increased the number of cyber attacks on Russia’s grid. Moreover, two administration officials had told the newspaper that Donald Trump had not been briefed on the attacks.
Pentagon officials have also described the “broad hesitation” to tell Trump about the details of the operations against Russia.

16.06.2019 - 13:36 [ New York Times ]

U.S. Escalates Online Attacks on Russia’s Power Grid

(15.06.2019)

But in a public appearance on Tuesday, President Trump’s national security adviser, John R. Bolton, said the United States was now taking a broader view of potential digital targets as part of an effort “to say to Russia, or anybody else that’s engaged in cyberoperations against us, ‘You will pay a price.’”

Power grids have been a low-intensity battleground for years.

16.06.2019 - 13:31 [ Wall Street Journal ]

Bolton Says U.S. Is Expanding Offensive Cyber Operations

(11.06.2019)

The U.S. intends to expand offensive operations in cyberspace to counter digital economic espionage and other commercial hacks, White House national security adviser John Bolton said Tuesday, while also dismissing talk of a split with President Trump on North Korea and other hot spots.

01.04.2019 - 06:21 [ Washington Post ]

An Israeli tech firm is selling spy software to dictators, betraying the country’s ideals

(5.12.2018)

Saudi dissident Omar Abdulaziz, who lives in Canada, has filed a lawsuit against an Israeli technology company called the NSO Group accusing it of providing the Saudi government with the surveillance software to spy on him and his friends — including Jamal Khashoggi. The program, known as Pegasus, not only allows the monitoring of all communications from a phone — all texts, all emails, all phone calls — but can also hijack a mobile phone’s microphone and camera to turn it into a surveillance device.

30.03.2019 - 09:12 [ theRegister.co.uk ]

Someone’s spreading an MBR-trashing copy of the Christchurch killer’s ‚manifesto‘ – and we’re OK with this, maybe?

Hacktivists are spreading booby-trapped copies of the New Zealand mass shooter’s Islamophobic rantings, in what is being described as an online „vigilante“ operation.

Security house Blue Hexagon claims it discovered a version of the killer’s manifesto doing the rounds online containing Windows malware that, when executed with the necessary privileges, reboots the system and leaves the user staring at an anti-racist message.

27.03.2019 - 02:40 [ Metro.co.uk ]

Petition to revoke Article 50 rejected after hitting 5,750,000 signatures

The Government has rejected a petition calling for Brexit to be stopped, which has gathered more than 5.75 million signatures.

27.03.2019 - 02:39 [ BBC ]

Why bots probably aren’t gaming the ‚Cancel Brexit‘ petition

The BBC spoke to three cyber-security experts about how likely it is that a number of the 3m signatures gathered so far are not genuine.

They all agreed that the petition’s email validation process would be a deterrent.

24.03.2019 - 09:51 [ New York Times ]

A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments

Before NSO helped the Saudi government track its adversaries outside the kingdom, and helped the Mexican government hunt drug kingpins, and earned hundreds of millions of dollars working for dozens of countries on six continents, the company consisted of two high school friends in northern Israel with one relatively mundane idea.

Using technology developed by graduates of Intelligence Unit 8200 — Israel’s equivalent of the N.S.A.— Shalev Hulio and Omri Lavie started a company in 2008 that allowed cellphone firms to gain remote access to their customers’ devices to perform maintenance.

Word spread to Western spy services, whose operatives spotted an opportunity.

23.03.2019 - 07:24 [ Guido Fawkes ]

‘Revoke Article 50’ Petition Creator Threatened May, Discussed How to Buy “Legal” Guns and Take Them to Commons

Remainers and Leavers alike have been getting a little too excited about the Revoke Article 50 Petition. Yes, you can sign it as many times as you like with made up email addresses and whatever name and country you care to put in. Yes, there are videos online explaining in detail how to use bots to hijack Parliamentary petitions – exactly what happened with the second referendum petition immediately after the referendum. Is it actually going to stop Brexit? No, that will be MPs…

23.03.2019 - 07:17 [ @NorthropGrumma1 / Twitter ]

Replying to @philiphaggis @JuliaHB1: Oh rite So just make millions of email addresses Simple

23.03.2019 - 07:11 [ Metro.co.uk ]

Is the revoke Article 50 petition being hijacked by bots? Unlikely, say experts

Over three million people have signed the petition to revoke Article 50 and cancel Brexit. But are they all real?

In recent years, automated programs known as bots have come to be used for artificially inflating Instagram follower counts, mining bitcoin or swaying online polls.

09.03.2019 - 11:56 [ Marco Rubio, US Senator ‏/ Twitter ]

Tonight the “Baghdad Bob” of #Caracas @jorgerpsuv revealed I caused the nationwide & ongoing electric power outage in #Venezuela. My apologies to people of Venezuela. I must have pressed the wrong thing on the “electronic attack” app I downloaded from Apple. My bad.

(7.3.2019)

09.03.2019 - 11:42 [ telesur ]

Venezuela Denounces US Participation in Electric Sabotage

(8.3.2019) They attacked the automated control of the Guri system that supplies the country with energy, Rodríguez said in his speech. This information was handled by US Senator Marco Rubio shortly after the aggression was executed as he let it be known on his Twitter posts.

‚How did Marco Rubio know that backup generators had failed? At that time, no one knew that,‘ the Bolivarian government official asked.

09.03.2019 - 11:37 [ Marco Rubio, US Senator ‏/ Twitter ]

ALERT: Reports of a complete power outage all across #Venezuela at this moment. 18 of 23 states & the capital district are currently facing complete blackouts. Main airport also without power & backup generators have failed. #MaduroRegime is a complete disaster.

(7.3.2019)

09.03.2019 - 11:34 [ Brad Cabana ‏/ Twitter ]

Venezuela makes an interesting case that Marco Rubio, US Senator, knew backup generators at the main power plant malfunctioned just minutes after the power went out. They claim only perpetuators could know that.. #Venezuela #cdnpoli #politics @UN

03.02.2019 - 00:54 [ Naval Today ]

NATO’s SNMG1 readies for exercise Dynamic Guard

Hosted by Norway, Dynamic Guard is a multi-national exercise, merged with Norwegian led exercise TG 19-1 and aimed at maintaining proficiency in maritime electronic warfare and anti-ship missile defense… SNMG1 is composed of the US flagship guided-missile destroyer USS Gravely (DDG107), the German Navy replenishment tanker FGS Spessart (A1442), and the Polish guided-missile frigate ORP General Kazmierz Pulaski (FrR 272).

28.01.2019 - 23:09 [ Trend.az ]

Investment in Israeli cyber exceeds $1 bln for first time in 2018

The country’s 450 active cybersecurity companies raised a total of $1.19 billion last year, constituting a 47% increase since 2017 and a fourth consecutive record-breaking year of investments. Since 2014, the sector has witnessed a five-fold increase in investments.

24.12.2018 - 18:36 [ pressgazette.co.uk ]

MPs repeat call for ‚Cliff’s Law‘ to stop suspects being named before charge after Gatwick drone front pages

Anna Soubry MP (pictured) said the couple “should not have been named in the media”, adding that a new law was “needed” to make it a criminal offence to name suspects before charge unless it is in the interests of justice.

The pair were pictured on the front pages of the Mail on Sunday, Sunday Telegraph, Sunday Mirror, Sunday Express and Sunday People yesterday morning, as well as on numerous news websites.

24.12.2018 - 18:29 [ Independent.co.uk ]

Gatwick drone investigation: Former suspects hit out at ‚disgusting‘ accusation in tearful statement

“The way we were initially perceived was disgusting although those who knew us did not doubt us for a second.

We were both released without charge or further action. We are totally overwhelmed by the support we have received from people all over the world and we would like to thank everyone single one who has done that.“

24.12.2018 - 16:58 [ Feedex ‏/ Twitter ]

CNN RSS: Gatwick airport drones investigation focuses on damaged device

via cnnbrk cnn Retweet

24.12.2018 - 16:32 [ theSun.co.uk ]

Gatwick ‘drone’ sighting investigated by cops turns out to be lights on a CRANE

The Surrey Police officers were called to investigate a red light „hovering“ over a bus station in Redhill – around six miles from the airport.
But when they arrived, they found the mysterious beam was just a warning light on top of a crane.

24.12.2018 - 16:19 [ Standard.co.uk ]

Gatwick airport drone chaos: Army deploys tactics used in fight against Isis to tackle drones

(23.12.2018) Transport Secretary Chris Grayling would not give details of what measures had been put in place, but said some of them were “military capabilities”, adding: “There are a range of measures which are there today which should give passengers confidence that they are safe to fly.”

The first departure from Gatwick this morning was a Norwegian flight to the capital of Lapland, Rovaniemi — described as the “official Hometown of Santa Claus” — which left at 6.34am.

20.12.2018 - 20:20 [ theGuardian.com ]

US and UK accuse China of sustained hacking campaign

A US indictment unsealed on Thursday in unison with a series of British statements accused Chinese hackers of obtaining unauthorised access to the computers of at least 45 entities, including commercial and defence technology companies and US government agencies such as Nasa and the US navy.

26.10.2018 - 05:24 [ Haaretz ]

U.S. Attacked Russia’s Syria Base With Drones, Defense Ministry Claims

The minister noted that the drones switched to manual guidance upon encountering Russia’s electronic countermeasures, indicating that they were not controlled by Syrian forces, but a „technologically advanced country that has access to such tools; they cannot be made in the Syrian desert,“ Fomin was cited as saying.

14.10.2018 - 10:02 [ New York Times ]

You Are a Suspect

(14. November 2002) Every purchase you make with a credit card, every magazine subscription you buy and medical prescription you fill, every Web site you visit and e-mail you send or receive, every academic grade you receive, every bank deposit you make, every trip you book and every event you attend — all these transactions and communications will go into what the Defense Department describes as “a virtual, centralized grand database.“

To this computerized dossier on your private life from commercial sources, add every piece of information that government has about you — passport application, driver’s license and bridge toll records, judicial and divorce records, complaints from nosy neighbors to the F.B.I., your lifetime paper trail plus the latest hidden camera surveillance — and you have the supersnoop’s dream: a “Total Information Awareness“ about every U.S. citizen.

14.10.2018 - 10:00 [ Wired.com ]

How the Tech Giants Created What Darpa Couldn’t

(29.5.2018) The William Safire column, „You Are a Suspect,” was published in the Times in 2002—two years before Facebook was created. And Safire isn’t talking about social networks or digital advertising—he’s discussing Total Information Awareness, a US Defense Advanced Research Projects Agency (Darpa) program that proposed mining vast amounts of Americans’ data to identify potential national security threats. The virtual grand database was to belong to the Department of Defense, which would use it to identify behavior patterns that would help to predict emerging terrorist threats.

01.10.2018 - 15:51 [ Brasco_Aad ‏/ Twitter ]

Vladimir Mikheyev of Radioelectronics Technologies about Israeli threats to destroy Syrian S-300: ‚We will deliver Krasukha & Zhitel electronic warfare units to Syria & these systems will place its air defenses under an „electronic umbrella,“ making it hard to spot & attack them.

04.05.2018 - 14:51 [ popularmechanics.com ]

How a Syrian Airstrike Got Help From Space

(24.4.2018) Space electronic warfare Capt. Andrew „Ghost“ Harris and space weapons officer Capt. Ryan „Pippin“ Foster have an urgent task—to make sure the coming allied strike takes full advantage of U.S. satellites in orbit.

“For something of this scale, this is one of—if not the—first time we have had space guys directly involved in the planning, influencing that mission, and developing effects specifically designed to support its execution,” says Morgan. “I’ve been involved in the Air Force for 24 years and I’ve never seen anything like it.”

17.04.2018 - 18:01 [ Business Insider ]

Syria claims to thwart missile attack, later says it fired off defenses in a false alarm

Syrian state news agency SANA cited a military source as saying a number of air defense missiles had been fired but no foreign attack had taken place.
Separately, a commander in the regional military alliance backing the government attributed the malfunction to „a joint electronic attack“ by Israel and the United States targeting the Syrian radar system.

16.04.2018 - 09:17 [ Haaretz ]

How the U.S.-led Airstrikes in Syria Hit Their Targets Before Assad’s Missile Defenses Even Fired

Electronic warfare suppression, a decoy battle group in the Mediterranean and never-before-used stealth missiles were all part of the attack

27.01.2018 - 06:46 [ Matthijs R. Koot´s notebook ]

Dutch Joint Sigint Cyber Unit (JSCU), AIVD-MIVD partnership in practice

(26.2.2015) The February 2015 issue (.pdf, in Dutch) of the Dutch government magazine “Nationale Veiligheid en Crisisbeheersing” contains an article about the Joint Sigint Cyber Unit (JSCU). Here is a translation of that article (hyperlinks are mine): (…)

„Another example of network-oriented cooperation is the cyber cooperation between the AIVD, MIVD, the National Cyber Security Center (NCSC) and the National Police. Under the working title “Cat5″ the partners initiated a pilot for sharing technical and operational information for detecting digital attacks and digital attackers.“