Defence and Aerospace


  • Revealed: Pentagon Push to Hack Nuke Missiles Before They Launch

    May 22, 2018

    The Pentagon has embraced a controversial policy of destroying enemy nuclear missiles before they launch, an internal policy document from May 2017 shows. It’s an effort that appears to include executing cyberattacks against missile control systems or components. The Pentagon document does not name adversaries. But experts who reviewed it for The Daily Beast considered it ...

  • Pentagon Wants Cloud Secure Enough to Hold Nuke Secrets

    May 15, 2018

    The Pentagon’s JEDI cloud will be designed to store the military’s most sensitive classified information. The Defense Department’s Joint Enterprise Defense Infrastructure cloud will be designed to host the government’s most sensitive classified data, including critical nuclear weapon design information and other nuclear secrets. Read more… Source: DefenseOne  

  • Cyber Dam Busters could give Australia’s military an asymmetric edge

    April 9, 2018

    The Australian Defence Force (ADF) has a “distinct battlefield edge” because it has fully integrated its military offensive capability into ADF operations. But a “modest” additional investment would give it “an asymmetric capability against future adversaries”, according to the International Cyber Policy Centre (ICPC) at the Australian Strategic Policy Institute (ASPI). “Having synchronised operations with traditional ...

  • U.S. DoD Hopes To Stamp Out Threats With Bug Bounty Program

    April 2, 2018

    The U.S. Department of Defense is doubling down on routing out vulnerabilities in its massive government systems. On Monday, the DoD announced it was expanding its bug bounty program to include the agency’s massive Defense Travel System. The “Hack the DTS” program launched in partnership with bug bounty firm HackerOne. It targets potential threats found in a ...

  • DoD Studying Implications of Wearable Devices Giving Too Much Info

    January 30, 2018

    Defense Department officials are studying security issues raised by physical conditioning trackers that also can be used to track service members’ whereabouts, a Pentagon spokesman told reporters today. The concern comes from a “heat map” posted by Strava — the makers of a fitness tracking application that shows the routes service members run or cycle in ...

  • British 15-year-old gained access to intelligence operations in Afghanistan and Iran by pretending to be head of CIA, court hears

    January 19, 2018

    A 15-year-old gained access to plans for intelligence operations in Afghanistan and Iran by pretending to be the head of the CIA to gain access to his computers, a court has heard. From the bedroom of the Leicestershire home he shared with his mother, Kane Gamble used “social engineering” – where a person builds up a ...

  • Brace yourselves for the ‘terabyte (sic) of death’, warns US army IT boss

    January 12, 2018

    The outgoing head of the Defense Information Systems Agency, which handles computer security for the US Department of Defense, has warned a massive cyber-attack is “looming” at the American military’s door. Over lunch on Thursday, Army Lieutenant General Alan Lynn, who retires in a few months, told the Armed Forces Communications and Electronics Association’s Washington chapter ...

  • GCHQ ‘Over-Achieved’ its Development of Offensive Cyber Capabilities

    December 21, 2017

    A new report from the Intelligence and Security Committee claims that the GCHQ has substantially increased its hacking abilities over the past few years. So much so that the Committee claims the spy organisation has “over-achieved”. How much is over-achieved? Apparently the agency has doubled the number of offensive cyber-capabilities, including the ability to attack other countries’ communications, ...

  • Massive US military social media spying archive left wide open in AWS S3 buckets

    November 17, 2017

    Three misconfigured AWS S3 buckets have been discovered wide open on the public internet containing “dozens of terabytes” of social media posts and similar pages – all scraped from around the world by the US military to identify and profile persons of interest. The archives were found by UpGuard’s veteran security-breach hunterChris Vickery during a routine scan of open ...

  • DHS, FBI describe North Korea’s use of FALLCHILL malware

    November 14, 2017

    The North Korean government has likely been using the malware since 2016 to target the aerospace, telecommunications, and finance industries, the US government says. The federal government on Tuesday issued an alert detailing the North Korean government’s use of malware known as FALLCHILL, warning that North Korea has likely been using the malware since 2016 to target the ...

  • New EU framework allows members to consider cyber-attacks acts of war

    October 31, 2017

    A forthcoming policy framework from the European Union will declare that cyber-attacks from hostile actors can be considered an act of war that under the most serious of circumstances justifies a response with conventional weapons. The Framework on a Joint EU Diplomatic Response to Malicious Cyber Activities is intended to be a strong measure of deterrence ...

  • Defence data hack puts cyber security in the spotlight

    October 12, 2017

    Defence Industry Minister Christopher Pyne has warned firms they face losing government contracts if they do not have strong levels of protection against cyber attacks in place after a massive hack of secret data involving Australia’s new fleet of Joint Strike Fighter aircraft, spy planes and warships. As cyber security experts backed the minister’s call, Mr Pyne deflected ...

  • HP Enterprise let Russia review the Pentagon’s security software

    October 5, 2017

    Last year, Hewlett Packard Enterprise (HPE) allowed a Russian defense agency to analyze the source code of a cybersecurity software used by the Pentagon, Reuters reports. The software, a product called ArcSight, is an important piece of cyber defense for the Army, Air Force and Navy and works by alerting users to suspicious activity — such as a ...

  • Cyber alert – EU ministers test responses in first computer war game

    September 7, 2017

    European Union defence ministers tested their ability to respond to a potential attack by computer hackers in their first cyber war game on Thursday, based on a simulated attack on one of the bloc’s military missions abroad. In the simulation, hackers sabotaged the EU’s naval mission in the Mediterranean and launched a campaign on social media ...

  • Russian cybersecurity firm Kaspersky Lab a ‘danger’ to US security, senator warns

    September 5, 2017

    Prominent cybersecurity firm Kaspersky Lab poses a danger to U.S. security, warns Sen. Jeanne Shaheen, D-N.H., who is pushing to prohibit the federal government from using the Moscow-based company’s products. In a New York Times column, Shaheen alleges that the company has “extensive” ties to Russian intelligence, noting that the firm’s founder Eugene Kaspersky graduated from the ...

  • Military Contractor’s Vendor Leaks Resumes in Misconfigured AWS S3

    September 5, 2017

    Thousands of resumes and job applications containing the personal information of U.S. veterans, many with top secret clearances, and law enforcement officers were left exposed in an Amazon Web Services S3 bucket, continuing a trend where poorly configured cloud-storage services are putting people at risk. The applicants were seeking employment with a private military contractor from ...

  • Former Military Cybersecurity Platform to Be Applied in Money Services Business (MSB) Sector

    August 13, 2017

    Recent cyber attacks have increased awareness security on the net. The cyber security market is one of the fastest growing industries in the past few years, due to the increasing penetration of the internet and growing adoption of cloud computing. The global cyber security market is expected to reach $181.77 billion in 2021, according to a report ...

  • Experts Unveil Cyber Espionage Attacks by CopyKittens Hackers

    July 25, 2017

    Security researchers have discovered a new, massive cyber espionage campaign that mainly targets people working in government, defence and academic organisations in various countries. The campaign is being conducted by an Iran-linked threat group, whose activities, attack methods, and targets have been released in a joint, detailed report published by researchers at Trend Micro and Israeli ...

  • Sweden data leak ‘a disaster’, says PM

    July 24, 2017

    The Swedish government has admitted to a huge data leak made by one of its own departments during an IT outsourcing procedure in 2015. Sweden’s prime minister said it was “a disaster”, Swedish media reported. Reports say that confidential data about military personnel, along with defence plans and witness protection details, were exposed by the Transport Agency. They ...

  • Defence minister opens £3m cyber security centre in Gloucester

    July 14, 2017

    UK minister for defence procurement has opened Lockheed Martin’s job-creating cyber security centre aimed at boosting UK cyber defence capability and skills A new facility designed to help tackle cyber crime in the UK has opened in Gloucester as part of a £3m investment by Lockheed Martin. The Cyber Works centre, which employs 90 people, will enable Lockheed Martin ...