A lot of these negative attitudes come from fictional representations of future space travel, which feature a lot of combat. That may be the case during the development of space travel but currently it is more efficient to put satellites into orbit and defend them with robotic systems. It is currently too expensive and dangerous… Read More Analysis: The US Space Force and Rise of Satellite Hacking Systems
The U.S. believes they have spotted a new Chinese ASAT (anti-satellite) system in orbit. This one, Shijian-17, has a grappling arm that enables the ASAT to maneuver into position and grab another satellite for closer examination or to put it in another orbit that will cause it to plunge earthward and burn up in the… Read More News Monitors – Explanation About the New Chinese ASAT (anti-satellite) system in orbit
The U.S. Air Force indicates the importance of little-known equipment and aircraft by the amount of money it devotes to maintaining and expanding their capabilities. One of the best examples of this is the BACN (Battlefield Airborne Communications Node) technology and the aircraft used to carry it aloft. The air force recently spent $3.6 billion… Read More BACN (Battlefield Airborne Communications Node) technology and the aircraft used to carry it aloft.
In early 2021 the Israeli military announced that it was the prime backer of the new Advanced Navigation Technology Center. This new division of state-owned IAI (Israel Aerospace Industries) will develop and manufacture a new generation of INS (Inertial Navigation System) technology to complement or replace satellite (GPS) guidance. IAI did not provide any more… Read More New generation of INS (Inertial Navigation System) technology to complement or replace satellite (GPS) guidance.
In late 2020 a growing number of Iranians in the capital (Tehran) were openly complaining of an odd problem with the GPS on their cellphones. At seemingly random times the GPS indicated another location than the one the user knew they were at. After months of complaints to the city government were ignored, one frustrated… Read More From China To Iran: A In-Depth Look At GPS Spoofing Technology
In late 2020 someone carried a major hacking attack on Israeli supply and logistics firms. Worse, it wasn’t a ransomware attack demanding money but simply to obtain information, and this series of attacks was very successful. The attackers first penetrated Amital Data, an Israeli software developer that supplies specialized software to firms that distribute goods.… Read More Analysis: On the Fallout from the Amital Cyber Attack. Tracking Bitcoin Payments Back to Iran
News Monitors/Strategy Page – Yet another North Korean Cyber War attack on South Korea was recently discovered. This one involved a successful effort to hack an Android bus navigation app used in four South Korean cities. The malware, once on the phone, sent back all information found on the phone that included matching one of… Read More Information Warfare: North Korean Sith Incentives
In terms of understanding and engaging customers, the video game industry has gone through a massive transformation in recent years. Before this transformation, video games were physical products that could be purchased over the counter, with little to no understanding of player retention or behavioral analysis for the people who sold them. That all… Read More Data Mining and Video Games: Drawing in a New Generation of Players to Soldiers and Fight
Three misconfigured AWS S3 buckets have been discovered wide open on the public internet containing “dozens of terabytes” of social media posts and similar pages – all scraped from around the world by the US military to identify and profile persons of interest. The archives were found by UpGuard’s veteran security-breach hunterChris Vickery during a routine scan of… Read More News Monitors Inc. explains 2017’s Massive US military social media spying archive left wide open in AWS S3 buckets
News Monitors – Abstract The Darknet has become a hub for hacking communities, offering cyber criminals the ability to freely discuss and sell unknown and emerging exploits. This paper focuses its attention on studying the effectiveness of machine learning for providing cyber threat intelligence from Darknet hacking forums. Developing a functioning system for extracting information from… Read More Cyber Threat Intelligence: Applying Machine Learning, Data Mining and Text Feature Extraction to the Darknet