Since the 1990s North Korea has been training more and more Internet software engineers and hackers, even though North Korea has limited access to the Internet. They made the best of their situation by having North Korean Internet engineers build an intranet. This is an Internet type network for North Korea that has no access… Read More Information Warfare: An Inside Look On North Korea’s Intranet.
The U.S. Air Force indicates the importance of little-known equipment and aircraft by the amount of money it devotes to maintaining and expanding their capabilities. One of the best examples of this is the BACN (Battlefield Airborne Communications Node) technology and the aircraft used to carry it aloft. The air force recently spent $3.6 billion… Read More BACN (Battlefield Airborne Communications Node) technology and the aircraft used to carry it aloft.
In early 2021 the Israeli military announced that it was the prime backer of the new Advanced Navigation Technology Center. This new division of state-owned IAI (Israel Aerospace Industries) will develop and manufacture a new generation of INS (Inertial Navigation System) technology to complement or replace satellite (GPS) guidance. IAI did not provide any more… Read More New generation of INS (Inertial Navigation System) technology to complement or replace satellite (GPS) guidance.
In late 2020 a growing number of Iranians in the capital (Tehran) were openly complaining of an odd problem with the GPS on their cellphones. At seemingly random times the GPS indicated another location than the one the user knew they were at. After months of complaints to the city government were ignored, one frustrated… Read More From China To Iran: A In-Depth Look At GPS Spoofing Technology
In late 2020 someone carried a major hacking attack on Israeli supply and logistics firms. Worse, it wasn’t a ransomware attack demanding money but simply to obtain information, and this series of attacks was very successful. The attackers first penetrated Amital Data, an Israeli software developer that supplies specialized software to firms that distribute goods.… Read More Analysis: On the Fallout from the Amital Cyber Attack. Tracking Bitcoin Payments Back to Iran
In the latest of a growing number of incidents, a Russian diplomat was caught while Harsharn Singh Tathgar, a Norwegian citizen originally from India, was turning over classified information in a restaurant. The PST (Norwegian Security Police) men who made the arrest did not realize that the Russian involved was a diplomat although that was… Read More Intelligence: Diplomatic Impunity In Norway and Nearby Russia
Iranian efforts to export oil in spite of sanctions have often been successful. That changed in 2020 when HawkEye 360, a new ship tracking service made it much more difficult for ships to conceal their smuggling activities. Since 2015 a growing array of sensors and software to track ships at sea, especially ships that don’t… Read More Intelligence: HawkEye 360, a ship tracking service made it much difficult for Iranian ships to conceal their smuggling activities.
An Indian newsmagazine (India Today) uncovered a Pakistani espionage effort carried out via Android apps aimed at fans of the Indian military and police. This development is interesting for two reasons. One, it is possible for an experienced Internet user to investigate and expose online espionage efforts. Second, this particular Pakistani effort sought to get… Read More Information Warfare: Play Store Pitfalls
In Pakistani army and pro-military Islamic groups have been conducting an online Information War against government opponents as well as media outlets that are critical of the military. Now the military is particularly angry that the Dawn newspaper has been reporting on how the military and Islamic groups have been manipulating messaging apps like Twitter… Read More Pro-military Islamic groups conducting an online Information War against government opponents.
Internet security firms have noted an increase in Cyber War campaigns waged by Indian and Pakistani APTs (Advanced Persistent Threat) operations. APTs are well organized and very active hacker groups that are often created and sustained by governments or major criminal gangs. In this case, six Indian APTs (Lucky Elephant, Donot Team, Patchwork Group, Sidewinder… Read More Information Warfare: South Asian Cyber War