Cyber warfare gets real for satellite operators

source: spacenews.com  |  image: pixabay.com

Recent network attacks in Ukraine have been ‘an eye opener for everybody’

WASHINGTON — The U.S. government on March 17 advised satellite operators to put their guard up in the wake of a cyberattack that disrupted internet services in Europe provided by Viasat’s KA-SAT.

“Given the current geopolitical situation, the Cybersecurity and Infrastructure Security Agency requests that all organizations significantly lower their threshold for reporting and sharing indications of malicious cyber activity,” said CISA, an organization within the Department of Homeland Security. 

Following CISA’s advisory, the Satellite Industry Association on March 18 issued a statement of “commitment to cybersecurity best practices” and expressed concern about “evolving attacks by criminals, terrorists, and nation states.”

Continue reading “Cyber warfare gets real for satellite operators”

DoD Identity Awareness, Protection, and Management (IAPM) Guide

 

Click the image above to view this amazing guide & resource

 

HOW TO USE THIS GUIDE The Identity Awareness, Protection, and Management (IAPM) Guide is a comprehensive resource to help you protect your privacy and secure your identity data online. The IAPM Guide is divided into chapters detailing key privacy considerations on popular online services, mobile apps, and consumer devices available in the market today. Each section provides you with tools, recommendations, and step-by-step guides to implement settings that maximize your security. The guide is updated periodically. While some of the chapters in the IAPM Guide deal with technical issues, they do not require a technical background to follow. The U.S. Department of Defense creates this guide to provide recommendations for readers to keep their identities private and secure online. Please note the information presented here is subject to change.

A 140-Years-Old Battery Technology Might Change Everything We Know About Energy Storage

source: autoevolution.com  |  image: pixabay.com

Li-Ion batteries power everything today, from tiny gadgets to cars and even airplanes. But for all the benefits that Li-Ion batteries bring to the table, there are tons of problems. These range from the costly and difficult to source materials to safety problems and the damage they cause to the environment. Scientists think they found an alternative that could change everything we know about batteries.

The idea comes from a 140-year-old battery technology, known as the metal-air type. The first metal-air batteries were designed in 1878, using atmospheric oxygen as a cathode (electron receiver) and a metal anode (electron giver). The anode can be made out of cheap and abundantly-available metals such as aluminum, zinc, or iron.
Continue reading “A 140-Years-Old Battery Technology Might Change Everything We Know…”

The Birth of Spy Tech: From the ‘Detectifone’ to a Bugged Martini

source: wired.com  |  image: pixabay.com

The urge to snoop is as old as time—and by the 1950s, the electronic listening invasion had begun.

 

This is excerpted from The Listeners: A History of Wiretapping in the United States by Brian Hochman published by Harvard University Press.

EAVESDROPPING TECHNOLOGIES OF various sorts have been around for centuries. Prior to the invention of recorded sound, the vast majority of listening devices were extensions of the built environment. Perhaps nodding to the origins of the practice (listening under the eaves of someone else’s home, where rain drops from the roof to the ground), early modern architects designed buildings with structural features that amplified private speech. The Jesuit polymath Athanasius Kircher devised cone-shaped ventilation ducts for palaces and courts that allowed the curious to overhear conversations. Catherine de’ Medici is said to have installed similar structures in the Louvre to keep tabs on individuals who might have plotted against her. Architectural listening systems weren’t always a product of intentional design. Domes in St. Paul’s Cathedral in London and the US Capitol building are inadvertent “whispering galleries” that enable people to hear conversations held on the other side of the room. Archaeologists have discovered acoustical arrangements like these dating back to 3000 BC. Many were used for eavesdropping.

Continue reading “The Birth of Spy Tech: From the ‘Detectifone’ to a Bugged Martini”

Could we engineer a vehicle with a nearly limitless power source?

source: interestingengineering.com  |  image: pixabay.com

 

Iron ore company Fortescue had a vision of such a vehicle.

Imagine a mass-transport vehicle with a nearly limitless power source. It would solve almost all transportation-related problems.

But what would it look like and how would it operate? 

First of all, it would need to have a sizeable cargo capacity. Second, it would need to be fast. Lastly, it would need to be highly efficient. That means it would need to be cheap to operate and maintain, otherwise, it would be an impractical option for most.

Iron ore company Fortescue had a vision of such a vehicle in order to significantly cut down the operational cost of their mining business. They imagined a self-charging battery-powered train.

They even came up with an ambitious name for this new vehicle: the Infinity Train. With this, they could ferry iron ore from their mines at a minimal cost.

This Infinity train would run on gravity batteries and Fortescue’s plan is to build railways from their mines to receiving areas below, where the ore can be shipped out to customers.

Can the firm’s vision come true? Will we see a future where infinity vehicles will exist? How will they be engineered and how will they be made to be safe? This video answers all these questions and more.

CLICK HERE TO WATCH THE VIDEO AT INTERESTINGENGINEERING.COM

 

Firewall: Definition, technology and facts

source: livescience.com  |  image: pexels.com

 

Learn how a firewall filters out cyber-threats, while still letting you access everything you want to look at online.

 

A firewall is a  online security measure to protect your computer from viruses and other malicious attacks. You can use the internet to communicate with around 4.9 billion people worldwide, according to the International Telecommunication Union, and access more knowledge than at any other time in history. 

The downside is that everybody also has access to you. This includes hackers and viruses that want to steal your data, take control of your computer or even destroy it.

To stop this from happening, a firewall controls the data flowing between your computer and the internet, according to the Canadian Conference on Electrical and Computer Engineering. Think of this like a border guard checking your passport when you go on holiday. A firewall inspects data to make sure it has the right permissions. If it does, it can pass through — if it doesn’t, it’s instantly blocked.

 

FIREWALL SECURITY: YOUR FIRST LINE OF DEFENSE

A firewall works at your computer’s ports. When we’re talking about computer networking, a port isn’t the same as a jack or socket you plug your monitor into. Rather it’s a virtual entry point where your computer exchanges information with other networks. 

Continue reading “Firewall: Definition, technology and facts”

‘Really alarming’: the rise of smart cameras used to catch maskless students in US schools

source: theguardian.com  |  image: pexels.com

 

Schools brought in surveillance cameras to monitor mask compliance and other Covid risks – and while masks are on their way out, the cameras aren’t

 

When students in suburban Atlanta returned to school for in-person classes amid the pandemic, they were required to mask up, like in many places across the US. Yet in this 95,000-student district, officials took mask compliance a step further than most.

Through a network of security cameras, officials harnessed artificial intelligence to identify students whose masks drooped below their noses.

“If they say a picture is worth a thousand words, if I send you a piece of video – it’s probably worth a million,” said Paul Hildreth, the district’s emergency operations coordinator. “You really can’t deny, ‘Oh yeah, that’s me, I took my mask off.’”

The school district in Fulton county had installed the surveillance network, by Motorola-owned Avigilon, years before the pandemic shuttered schools nationwide in 2020. Out of fear of mass school shootings, districts in recent years have increasingly deployed controversial surveillance networks like cameras with facial recognition and gun detection.

Continue reading “‘Really alarming’: the rise of smart cameras used to catch maskless students in US schools”

Russian hackers targeted NATO, eastern European militaries: Google

source: indianexpress.com  |  image: pexels.com

Russia, which is now under heavy Western economic sanctions following its decision to invade Ukraine on Feb. 24, regularly denies accusations of mounting cyber attacks on Western targets.

 

Russian hackers have recently attempted to penetrate the networks of NATO and the militaries of some eastern European countries, Google’s Threat Analysis Group said in a report published on Wednesday.

The report did not say which militaries had been targeted in what Google described as “credential phishing campaigns” launched by a Russian-based group called Coldriver, or Callisto.

“These campaigns were sent using newly created Gmail accounts to non-Google accounts, so the success rate of these campaigns is unknown,” the report said.

NATO was not immediately available for comment on the report.

Russia, which is now under heavy Western economic sanctions following its decision to invade Ukraine on Feb. 24, regularly denies accusations of mounting cyber attacks on Western targets.

In 2019, Finnish cybersecurity firm F-Secure Labs described Callisto as an unidentified and advanced threat actor “interested in intelligence gathering related to foreign and security policy” in Europe.

The group also targeted a NATO Centre of Excellence, Wednesday’s Google report said, without elaborating.

In a statement, the centre did not directly address Google’s report but said: “We see malicious cyber activity on a daily basis.”

Blue, yellow and gray zone: The cyber factor in Ukraine

source: c4isrnet.com  |  image: pexels.com

 

WASHINGTON — As Russia massed troops along its border with Ukraine over the last few months, it was unclear whether Russian President Vladimir Putin would invade. But if he did, experts warned, Russia would bombard the nation with a series of cyberattacks to sow confusion and weaken its resolve.

On Feb. 24, Putin unveiled his plans. Moscow’s war machine rolled into the Eastern European nation. The combined Russian air, land and sea assault was preceded by waves of cyberattacks, the sort of gray-zone meddling analysts and defense officials had foreseen. Websites were hamstrung. Malware coursed through computers. Communications were hampered.

But the full-fledged cyberwar some feared has not materialized. There has been no digital devastation of critical infrastructure, no damning disinformation.

“Apparently, it’s less than we thought would have happened at this point,” said Charles Munns, a retired U.S. Navy vice admiral who has advised the Defense and Energy departments. “It’s more of a 20th century invasion, with tanks and missiles and airplanes.”

A brief cyber history of Ukraine

Both Russia and Ukraine have a history with cyberattacks — the former leveraging the domain to wreak havoc, and the latter often finding itself on the receiving end.

Continue reading “Blue, yellow and gray zone: The cyber factor in Ukraine”

source: tpr.org  |  image:  pixabay.com  |  contributed by Artemus FAN Steve Jones

 

The BBC has resurrected an old school way of broadcasting in order to reach people in the crisis area of Ukraine: Shortwave radio. What is shortwave, and why has the BBC decided to begin using it again?

It’s almost a forgotten technology in the United States, except for some Americans of a certain age, or maybe their parents or grandparents or even great grandparents.

Shortwave was used extensively during World War II and the Cold War. For many years, shortwave broadcasts were spread around the world over Voice of America. Russia had Radio Moscow and other countries had their own shortwave broadcasts.

What exactly is shortwave radio?

Continue reading “BBC World Service resurrects shortwave broadcasts in war-torn Ukraine”