- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged espionage
Chinese Hackers Breached Google’s Surveillance Database
Posted by Gary in Comms, News, Threat Watch on 21/May/2013 14:35
From: Threat Level
Hackers Who Breached Google in 2010 Accessed Company’s Surveillance Database
…The database contained years’ worth of information on law enforcement surveillance surveillance orders issued by judges around the country. The hackers were hoping to discover if law enforcement agents were investigating undercover Chinese intelligence operatives who were working out of the U.S.
Syrian Agent Senteced to 18 Months
Posted by Brian in News, Threat Watch on 25/Jul/2012 02:12
Virginia Man Sentenced to 18 Months in Prison for Acting as Unregistered Agent for Syrian Government
July 20, 2012
– Washington
Stuxnet Virus Linked To Flame Virus and U.S.
Posted by Brian in News, Threat Watch on 13/Jun/2012 17:50
From Wired’s Threat Level:
Researchers at Russia-based Kaspersky Lab discovered that a part of the module that allows Flame to spread via USB sticks using the autorun function on a Windows machine contains the same code that was used in a version of Stuxnet that was unleashed on computers in Iran in 2009, reportedly in a joint operation between the United States and Israel. The module, which was known as Resource 207 in Stuxnet, was removed from subsequent versions of Stuxnet, but it served as a platform for what would later develop into the full-fledged Flame malware that is known today.
“Defective” Chips could have caused U.S. military shut down by secret ‘back door’
Posted by Jack Sinclair in Comms, News, Threat Watch, Warrior Tools on 13/Jul/2011 11:03
“Sources have confirmed that the U.S. Department of Defense over recent months purchased 59,000 microchips to use in Navy equipment that control everything from missiles to transponders.
But all of the chips turned out to be cheap knock-offs from China, and they ultimately were not installed, according to sources.
Besides being subject to failure, the chips also were designed with a “back door” which would have allowed the chip, and the device it controlled, to be shut down remotely at any time, sources report.
Had the flaw not been detected, the chips could have shut down U.S. warships, aircraft, advanced weapons systems and encoded transponders that distinguish friendly aircraft from hostile attackers.”