During the recent Hamas/Israel ten-day war there were ample opportunities to test new Israeli AUD (Anti UAV Defense) systems. Israel is a leader in the development of AUD, mainly because it is the one country that faces the widest variety of UAV (Unmanned Aerial Vehicles) types, and most attacks using UAVs. In preparation for a… Read More Testing of new Israeli AUD (Anti UAV Defense) systems during the Hamas/Israel ten-day war.
Saudi Arabia has a growing problem with Iranian UAVs (Unmanned Aerial Vehicles) used as cruise missiles. For several years Iran has been smuggling in UAV components to northern Yemen where Shia rebels have been trying to take over the entire country since 2014. That offensive was thwarted in 2015 by the intervention of an Arab… Read More In-depth Look: Saudi Arabia’s growing problem with Iranian UAVs used as cruise missiles
Since the 1990s North Korea has been training more and more Internet software engineers and hackers, even though North Korea has limited access to the Internet. They made the best of their situation by having North Korean Internet engineers build an intranet. This is an Internet type network for North Korea that has no access… Read More Information Warfare: An Inside Look On North Korea’s Intranet.
In the latest of a growing number of incidents, a Russian diplomat was caught while Harsharn Singh Tathgar, a Norwegian citizen originally from India, was turning over classified information in a restaurant. The PST (Norwegian Security Police) men who made the arrest did not realize that the Russian involved was a diplomat although that was… Read More Intelligence: Diplomatic Impunity In Norway and Nearby Russia
Iranian efforts to export oil in spite of sanctions have often been successful. That changed in 2020 when HawkEye 360, a new ship tracking service made it much more difficult for ships to conceal their smuggling activities. Since 2015 a growing array of sensors and software to track ships at sea, especially ships that don’t… Read More Intelligence: HawkEye 360, a ship tracking service made it much difficult for Iranian ships to conceal their smuggling activities.
An Indian newsmagazine (India Today) uncovered a Pakistani espionage effort carried out via Android apps aimed at fans of the Indian military and police. This development is interesting for two reasons. One, it is possible for an experienced Internet user to investigate and expose online espionage efforts. Second, this particular Pakistani effort sought to get… Read More Information Warfare: Play Store Pitfalls
In Pakistani army and pro-military Islamic groups have been conducting an online Information War against government opponents as well as media outlets that are critical of the military. Now the military is particularly angry that the Dawn newspaper has been reporting on how the military and Islamic groups have been manipulating messaging apps like Twitter… Read More Pro-military Islamic groups conducting an online Information War against government opponents.
Internet security firms have noted an increase in Cyber War campaigns waged by Indian and Pakistani APTs (Advanced Persistent Threat) operations. APTs are well organized and very active hacker groups that are often created and sustained by governments or major criminal gangs. In this case, six Indian APTs (Lucky Elephant, Donot Team, Patchwork Group, Sidewinder… Read More Information Warfare: South Asian Cyber War
Since the 1990s ancient espionage techniques have become obsolete and 21 st century spies have had to adapt. The old ways have largely been replaced with new methods that take advantage of the new tech; the Internet, cellphones and more powerful and numerous computers along with new software that can do pattern analysis and automatic analysis of… Read More Intelligence: The Tech Revolution In Pattern Analysis of Photo or Video
The U.S. Armed force needs to furnish troops in battle zones with web based life examination instruments that would empower them to naturally assemble data from nearby Internet web-based social networking to perceive what’s going on in the zone they are working. This would be close constant investigation with results accessible in English. This kind… Read More Intelligence Recap – News Monitors: Social Media Data Mining In The Combat Zone