Military technology

  • Chemical, defense companies subject to Chinese Nitro attacks

    More and more chemical and defense companies around the world are victims of Nitro attacks. These attacks, launched by government-backed Chinese hackers, install PoisonIvy, a Remote Access Tool (RAT) stealthily placed on computer systems to steal information. The majority of the computers infected belong to firms in the United States, Bangladesh, and the United Kingdom.

  • National Guard units help states ward off cyberattacks

    Governors across the United States are mobilizing their states’ National Guard units to combat threats from cyberattacks. The state of Washington was the first state to assign the state’s National Guard cybersecurity responsibilities. The state recognized the potential of its National Guard as a cyberforce when it realized that many of its soldiers, who are full-time employees and part-time soldiers, worked for tech employers such as Google, Boeing, Cisco, Verizon, and Microsoft.

  • Barrier technology strengthens protection at Navy ports

    Advanced technology rules the day in modern warfare — yet one very real threat to the U.S. Navy comes from a simple but deadly enemy strategy: small speed boats laden with explosives ramming into ships in harbor. Now a new maritime security barrier, developed with support from the Office of Naval Research (ONR), could provide a quantum leap in existing sea-port protection.

  • “Space cops” to help control traffic in space, prevent satellites from colliding

    Collisions in space of satellites and space debris have become increasingly problematic. A team of scientists are using mini-satellites that work as “space cops” to help control traffic in space. The scientists used a series of six images over a 60-hour period taken from a ground-based satellite to prove that it is possible to refine the orbit of another satellite in low earth orbit.

  • Gaza-based Palestinian hackers compromise Israeli defense ministry computer

    Hackers broke into a computer at the Israeli Ministry of Defense through an e-mail attachment tainted with malicious software. The attachment looked as if it had been sent by the country’s internal security service, the Shin Bet. it was likely that Palestinians were behind the cyberattack, saying that the more recent attacks were similar to cyberattacks against Israeli computers more than a year ago. Those attacks originated in the Hamas-controlled Gaza Strip. The attackers used an e-mail attachment to infect the computers with Xtreme RAT malware, which is a remote access Trojan. The malware allows hackers complete control of an infected machine. They can steal information, load additional malicious software onto the network, or use the invaded computer as a base of operations from which to conduct reconnaissance and attempt to gain deeper access into the network.

  • U.S. weapons shipped to moderate Syrian rebels after secret congressional approval

    U.S. and European sources have confirmed that U.S.-manufactured light arm have been flowing to moderate Syrian rebels in the south of Syria, and that Congress has approved funding to continue the shipments for the next few months. The weapons, which are being delivered to the rebels through Jordan, include both light arms and heavier weapons such as anti-tank rockets. The shipments, however, do not include shoulder-fired anti-aircraft missiles.

  • Israeli jets destroy Hezbollah-bound advanced Russian missiles stored near Latakia

    Large warehouses near the port city of Latakia, where the Assad regime stored advanced Russian missiles before shipping them to Hezbollah, were destroyed by aerial attack late Sunday. Israel has already launched six attacks in 2013 on Syrian arms shipments to Hezbollah — on 30 January, 3 May, 5 May, 5 July, 18 October, and 30 October. The attack on 5 July was on storage facilities in the same Latakia area, where Syria kept a large quantity of advanced P-800 Oniks anti-ship missiles, also called Yakhont missiles. Three weeks after the attack, U.S. sources said that the attack did not succeed in wiping out all of the missiles. “American officials said that further Israeli strikes are likely,” the New York Times reported on 31 July.

  • USAF nuclear-missile officers alleged to have regularly cheated on readiness tests

    Three former U.S. Air Force officers have alleged that USAF officers responsible for operating nuclear-armed missiles at Malmstrom Air Base in Montana have, for many years, been cheating on monthly readiness tests, and were never punished for it. The former officers claim that cheating is the norm and that officers who did otherwise are the exception.The officers who made the allegations added, though, that misconduct on tests did not impair the safety of the nuclear weapons or the Air Force’s ability to launch missiles if ordered.

  • The basis for a permanent deal: deep, verifiable changes to Iran’s nuclear program

    A new study says that only broad and verifiable changes to Iran’s current nuclear program could serve as a basis for a permanent nuclear deal between Iran and the international community. Among the changes: reducing the number of Iran’s uranium-enrichment centrifuges from the current 19,500 to no more than 4,000, and limiting Iran to one enrichment site; converting the heavy-water reactor being built in Araq to a light-water reactor fueled by low-enriched uranium; and imposing a tight, intrusive inspection regime for at least twenty years.

  • House approves $447 for Cyber Command

    The House of Representatives approved a fiscal 2014 stop-gap budget last Monday (it approved to full spending bill on Wednesday), which allocates $447 million to the Defense Department’s Cyber Command. This is more than twice the $191 million budget for Cyber Command in 2013.

  • U.S. conducted bioweapon tests in Japan in early 1960s

    The U.S. Army tested biological weapons in Okinawa, Japan in the early 1960s when the United States ruled the prefecture. U.S documents confirmed that the tests, conducted at least a dozen times occurred between 1961 and 1962. The test involved releasing rice blast fungus over rice paddies in order to measure the agent’s effect on production. With hundreds of millions of people dependent on rice as a staple food, failure of rice production could result in mass starvation. The fungus infects crops naturally, and experts estimate it destroys enough rice to feed sixty million people a year.

  • Surviving a nuclear explosion in your city

    During the cold war, scientists modeled every imaginable consequence of a nuclear explosion. Michael Dillon, a Lawrence Livermore Lab mathematician, found a gap in the sheltering strategies for people far enough from ground zero to survive the initial blast but close enough to face deadly radioactive fallout. Dillon’s model’s addresses the most vulnerable people, those who found shelter from the blast in lightweight buildings, or buildings lacking a basement (these buildings are more easily penetrated by deadly radioactive dust). His recommendations:  if adequate shelter is fifteen minutes away, people should remain in their initial, poor-quality shelter no longer than thirty minutes after detonation. If the better shelter is only five minutes away, however, individuals should move there immediately, leaving the closer but unsafe buildings altogether.

  • Iconic Doomsday Clock remains at five minutes to midnight

    Bulletin of the Atomic Scientists: It is still five minutes to midnight — and much too close to doomsday. The minute hand of the Bulletin’s iconic Doomsday Clock has been at five minutes to midnight since January 2012. In explaining why the hand would remain so close to figurative doomsday, the Bulletin’s science and security experts focused on the failure of world leaders to take action which would reduce the possibility of catastrophe related to nuclear weapons and climate change.

  • B61-11 earth-penetrating weapon tested for first time in seven years

    One of the main purposes of the U.S. nuclear stockpile is deterrence, and one important way to assure deterrence is to have a successful surveillance test that shows that the systems in the stockpile work. Sandia’s annual surveillance program for each weapon type consists of flight tests, lab tests, and component and material tests. On 20 November 2013, researchers conducted a rocket-driven impact test of the nonnuclear components of the B61-11 earth-penetrating weapon, the first such test in seven years. Flight tests subject the weapon to shock, vibration, temperature, rotation, weather, and more. Sandia pulls random units from the stockpile for tests.

  • Military technology outpaces laws of war

    Today’s emerging military technologies — including unmanned aerial vehicles, directed-energy weapons, lethal autonomous robots, and cyber weapons like Stuxnet — raise the prospect of upheavals in military practices so fundamental that they challenge long-established laws of war. Weapons that make their own decisions about targeting and killing humans, for example, have ethical and legal implications obvious and frightening enough to have entered popular culture (for example, in the Terminator films). The current international laws of war were developed over many centuries and long before the current era of fast-paced technological change.