Cybersecurity & Technology

Cybercom Establishes AI Task Force
Cybersecurity & Technology, Cybersecurity

Cybercom Establishes AI Task Force

  By José Carlos Palma* In a strategic move aimed at enhancing cybersecurity capabilities, U.S. Cyber Command (Cybercom) has launched an artificial intelligence task force dedicated to identifying and implementing cutting-edge technologies. The initiative stems from an AI roadmap developed by Cybercom in response to a mandate from Congress, as part of the fiscal 2023 annual defense policy bill. This legislation tasked Cybercom, along with key stakeholders such as the Department of Defense chief information officer and the director of the Defense Advanced Research Projects Agency (DARPA), to devise a comprehensive five-year plan for the rapid adoption and acquisition of AI systems for cyber operations forces.   "U.S. Cybercom has developed an AI roadmap and is working to ...
CYBER THREATS: AN EVOLVING AND PERNICIOUS GLOBAL THREAT
Contributors, Cybersecurity, Dr. Vassilios Damiras, Vassilios Damiras – Pax Americana

CYBER THREATS: AN EVOLVING AND PERNICIOUS GLOBAL THREAT

By Dr. Vassilios Damiras * Cyber threats are the new security dilemma of the twenty-first century. These kinds of high-tech attacks threaten to destroy or severely damage critical global economic interests and undermine worldwide security stability. The growing dependency on information technology (IT) makes cybersecurity a vital component of the U.S. national security infrastructure. Data collection, processing, storage, transmission capabilities, mobile, wireless, and cloud computing are increasing rapidly, making cyberattacks quickly. The evolution of cyberterrorism is identified in incidents and the range of actors and targets. In the last few years, American intelligence has observed increased breadth and high sophistication of computer network operations (CNO) by non-state and stat...
Geopolitical risk: raw materials and technological dependence
Future Technology, Technology and Innovation

Geopolitical risk: raw materials and technological dependence

By *Raquel Jorge Ricart Raw materials are the great overlooked in the global technological competition. In 1992 the father of China’s economic revolution, Deng Xiaoping, said that ‘the Middle East has the oil, but China has the rare earths’. Rare earths, and critical raw materials in general, have been the great forgotten commodities in the geopolitical competition of recent years, which has largely focused on which country dominates certain technologies –artificial intelligence, semiconductors and so many others– and not so much on what means were necessary to achieve dominance. China controls 36.7% of global rare earth reserves. Brazil and Vietnam, the next countries on the list, together stockpile as much as China does alone (18.3% each). They are followed by Russia, with 10% of ...
Russian Warplane Hits American Drone Over Black Sea, U.S. Says
Intelligence, Surveillance, and Privacy, Military Technology

Russian Warplane Hits American Drone Over Black Sea, U.S. Says

The incident was the first known physical contact between the two militaries since the war in Ukraine began last year. WASHINGTON — A Russian warplane struck a U.S. surveillance drone over the Black Sea on Tuesday, hitting the drone’s propeller and causing its American operators to bring it down in international waters, according to the Pentagon, in the first known physical contact between the Russian and American militaries since the war in Ukraine started last February. The downing of the MQ-9 Reaper, a workhorse of the American military’s airborne reconnaissance fleet, immediately escalated tensions between the White House and the Kremlin as U.S. officials accused the Russian forces involved in the incident of behaving dangerously. American military officials said the unarmed Reaper ...
Think Like a Spy: How Open Source Intelligence Can Give You a Competitive Advantage
Intelligence, Surveillance, and Privacy

Think Like a Spy: How Open Source Intelligence Can Give You a Competitive Advantage

The realm of Open Source Intelligence (OSINT) is a labyrinth of information and insights that organizations can delve into to fortify their digital frontiers while keeping a close eye on the activities of their competitors. This is achieved by harvesting a cornucopia of publicly accessible data from the World Wide Web, social media platforms and other publicly accessible records. By synergizing these various sources of information, organizations can gain an unprecedented perspective of the trends, patterns and perils in the digital domain. OSINT is not just a tool for information gathering but is a tool that provides organizations with a powerful vantage point to identify potential risks, track the movements of competitors and even uncover illicit activities. It also affords organizations...
HAARP: Weather Control Is the HAARP Project a Weather Control Weapon?
Conspiracy theories, Military Technology, Topics

HAARP: Weather Control Is the HAARP Project a Weather Control Weapon?

"It isn't just conspiracy theorists who are concerned about HAARP. The European Union called the project a global concern and passed a resolution calling for more information on its health and environmental risks. Despite those concerns, officials at HAARP insist the project is nothing more sinister than a radio science research facility." -- From documentary on HAARP weather control capabilities by Canada's CBC HAARP: What is it? HAARP (High Frequency Active Auroral Research Program) was a little-known, yet critically important U.S. military defense project which generated quite a bit of controversy over its alleged weather control capabilities and much more. The project was shuttered by the military in 2013 after attracting large amounts of negative publicity, though HAARP-like res...
How social networks became a ‘subsidiary’ of the FBI and CIA
Intelligence, Surveillance, and Privacy

How social networks became a ‘subsidiary’ of the FBI and CIA

By Jonathan Cook The Twitter Files have lifted the lid on a secret alliance between Silicon Valley, intelligence agencies and the political establishment. he US Congress last tried to grapple with what the country’s ballooning security services were up to nearly half a century ago. In 1975, the Church Committee managed to take a fleeting, if far from complete, snapshot of the netherworld in which agencies such as the Central Intelligence Agency (CIA), Federal Bureau of Investigations (FBI) and National Security Agency (NSA) operate.  In the aftermath of the Watergate scandal, the congressional committee and other related investigations found that the country’s intelligence services had sweeping surveillance powers and were involved in a raft of illegal or unconstitutional acts.  They ...
U.S. National Cybersecurity Strategy: What we can expect this time around, and what else should be considered
Cybersecurity, Cybersecurity & Technology

U.S. National Cybersecurity Strategy: What we can expect this time around, and what else should be considered

By Todd Moore * It’s often said that the wheels of government move slowly, but the persistent rise in cyberattacks have greased the gears of government to finally move forward with some urgency to address this critical issue. With a National Cybersecurity Strategy anticipated to roll out in the coming weeks, the public and private sectors are eagerly awaiting the outcome. The White House Executive Order on Improving the Nation’s Cybersecurity in May 2021 was the first notable progress marker, outlining steps for the federal government to take towards modernizing the nation’s cybersecurity. This has been furthered by the funding Congress provided to the Cybersecurity and Infrastructure Security Agency, significantly over the requested budget, and Biden’s recent signing of the Quantum Comp...
Russia will unveil the export Sukhoi Su-57E fighter in India
Military Technology, Defense Industry, Acquisition, and Innovation

Russia will unveil the export Sukhoi Su-57E fighter in India

MOSCOW, INDIA — Russia intends to show an export version of its Su-57E Felon fighter jet. Russia’s largest arms trading company, Rosoboronexport, announced the news to reporters. The Su-57E will be displayed in India at the Aero India 2023 International Air Show in Bangalore. The exhibition starts on February 13 and ends on February 17. This is the 14th Aero India Expo. Besides the Su-57E, Rosoboronexport reported that the Su-75 Checkmate will also be displayed in India. It is not clear from the statement of the Russian company whether a working prototype of the Su-75 will be displayed at the exhibition or mockup. Rosoboronexport plans to present 200 samples in India. In the short press release of the Russian commercial company, the Su-57 was called “a promising fifth-generation multi-ro...
Russia’s ‘Killer’ Swarm Drone Project: Russian, Chinese Agencies ‘Partner’ To Attack Ukraine’s Military Infra – British Media Claims
Military Technology, Intelligence, Surveillance, and Privacy

Russia’s ‘Killer’ Swarm Drone Project: Russian, Chinese Agencies ‘Partner’ To Attack Ukraine’s Military Infra – British Media Claims

By Ashish Dangwal In a covert arms agreement with Chinese spies, Russia’s infamous Wagner Group mercenaries are reportedly developing “swarm drones” to target Ukrainian armed forces. The explosive-tipped drones from China would reportedly be used in large numbers against Ukraine. These drones would be capable of wreaking havoc on military targets.  The British media claimed that secret discussions between Chinese cyber experts, the Wagner Group, and spies from both nations have taken place as part of Moscow’s killer swarm project.  The developments contrast Beijing’s claims that it is not engaged in the Ukraine war, morphing into a West-versus-East confrontation.   Over 2,500 DJI Mavic2 drones were shipped from Beijing to Moscow as part of a secret agreement with Russia’s infamous W...