News Monitors: On 5G vulnerabilities and The Billions Spent on Experiments

WASHINGTON — A group of top U.S. national security agencies warned Monday in a report that adversarial nations’ influence on 5G standards is a major threat to securing advanced communications networks of the future. Standard-setting bodies for 5G technology are vulnerable to “undue influence” from adversarial nations that want to boost proprietary technologies and limit future interoperability… Read More News Monitors: On 5G vulnerabilities and The Billions Spent on Experiments

BACN (Battlefield Airborne Communications Node) technology and the aircraft used to carry it aloft.

The U.S. Air Force indicates the importance of little-known equipment and aircraft by the amount of money it devotes to maintaining and expanding their capabilities. One of the best examples of this is the BACN (Battlefield Airborne Communications Node) technology and the aircraft used to carry it aloft. The air force recently spent $3.6 billion… Read More BACN (Battlefield Airborne Communications Node) technology and the aircraft used to carry it aloft.

New generation of INS (Inertial Navigation System) technology to complement or replace satellite (GPS) guidance.

In early 2021 the Israeli military announced that it was the prime backer of the new Advanced Navigation Technology Center. This new division of state-owned IAI (Israel Aerospace Industries) will develop and manufacture a new generation of INS (Inertial Navigation System) technology to complement or replace satellite (GPS) guidance. IAI did not provide any more… Read More New generation of INS (Inertial Navigation System) technology to complement or replace satellite (GPS) guidance.

From China To Iran: A In-Depth Look At GPS Spoofing Technology

In late 2020 a growing number of Iranians in the capital (Tehran) were openly complaining of an odd problem with the GPS on their cellphones. At seemingly random times the GPS indicated another location than the one the user knew they were at. After months of complaints to the city government were ignored, one frustrated… Read More From China To Iran: A In-Depth Look At GPS Spoofing Technology

Information Warfare: North Korean Sith Incentives

News Monitors/Strategy Page – Yet another North Korean Cyber War attack on South Korea was recently discovered. This one involved a successful effort to hack an Android bus navigation app used in four South Korean cities. The malware, once on the phone, sent back all information found on the phone that included matching one of… Read More Information Warfare: North Korean Sith Incentives

Data Mining and Video Games: Drawing in a New Generation of Players to Soldiers and Fight

   In terms of understanding and engaging customers, the video game industry has gone through a massive transformation in recent years. Before this transformation, video games were physical products that could be purchased over the counter, with little to no understanding of player retention or behavioral analysis for the people who sold them. That all… Read More Data Mining and Video Games: Drawing in a New Generation of Players to Soldiers and Fight

News Monitors Inc. explains 2017’s Massive US military social media spying archive left wide open in AWS S3 buckets

Three misconfigured AWS S3 buckets have been discovered wide open on the public internet containing “dozens of terabytes” of social media posts and similar pages – all scraped from around the world by the US military to identify and profile persons of interest. The archives were found by UpGuard’s veteran security-breach hunterChris Vickery during a routine scan of… Read More News Monitors Inc. explains 2017’s Massive US military social media spying archive left wide open in AWS S3 buckets

Cyber Threat Intelligence: Applying Machine Learning, Data Mining and Text Feature Extraction to the Darknet

News Monitors – Abstract The Darknet has become a hub for hacking communities, offering cyber criminals the ability to freely discuss and sell unknown and emerging exploits. This paper focuses its attention on studying the effectiveness of machine learning for providing cyber threat intelligence from Darknet hacking forums. Developing a functioning system for extracting information from… Read More Cyber Threat Intelligence: Applying Machine Learning, Data Mining and Text Feature Extraction to the Darknet

India-Pakistan: Power Without Responsibility

December 29, 2017: Pakistan fears the United States and India will carry out more unauthorized attacks inside Pakistan against Islamic terrorist targets. Pakistan is particularly concerned with protecting the Haqqani Network, an Afghan led group that has prospered under Pakistani protection and is now believed to control the leadership of the Afghan Taliban, Pakistan has… Read More India-Pakistan: Power Without Responsibility

Taliban

The extra American ground powers sent to Afghanistan this year are focusing on Taliban coordinations and that implies assaults on the medication pack foundation. There are thirteen medication groups in Afghanistan and most depend on Helmand for something. A large portion of these groups have a noteworthy piece of their heroin generation in Helmand and… Read More Taliban