Saturday, June 13, 2009

Sub collides with sonar array towed by U.S. Navy ship


June 12, 2009 -- Updated 2122 GMT (0522 HKT)



  • STORY HIGHLIGHTS
  • The array was damaged, but the sub and the ship did not collide
  • Navy does not believe it was a deliberate incident of Chinese harassment
  • Navy has complained of Chinese vessels disrupting U.S. naval activities

Complete article here at CNN.com:

Thursday, June 11, 2009

Analysis of the Green Dam Censorware System




Summary We have discovered remotely-exploitable vulnerabilities in Green Dam, the censorship software reportedly mandated by the Chinese government. Any web site a Green Dam user visits can take control of the PC.

According to press reports, China will soon require all PCs sold in the country to include Green Dam. This software monitors web sites visited and other activity on the computer and blocks adult content as well as politically sensitive material.

We examined the Green Dam software and found that it contains serious security vulnerabilities due to programming errors. Once Green Dam is installed, any web site the user visits can exploit these problems to take control of the computer. This could allow malicious sites to steal private data, send spam, or enlist the computer in a botnet. In addition, we found vulnerabilities in the way Green Dam processes blacklist updates that could allow the software makers or others to install malicious code during the update process.

We found these problems with less than 12 hours of testing, and we believe they may be only the tip of the iceberg. Green Dam makes frequent use of unsafe and outdated programming practices that likely introduce numerous other vulnerabilities. Correcting these problems will require extensive changes to the software and careful retesting. In the meantime, we recommend that users protect themselves by uninstalling Green Dam immediately.

Complete article here:

http://www.cse.umich.edu/~jhalderm/pub/gd/

Sunday, June 7, 2009

China: Ruler of the Cyber World



W
hen I was still in high school, our ROTC Commandant loves to crack jokes about the state of the Armed Forces of the Philippines. Our troops are behind in everything; our fighter planes came from donations, our rifles also came from donations, and our troops are underpaid, thus the low morale. If war comes, the Philippines will be instantly crushed without the help of big brother US.

One of his famous joke pertains to China, and how powerful this country is. Even without weapons, Chinese Troops, with their massive population count, can invade the Philippines. Once inside Philippine soil, they can all jump at the same time, a coordinated attack, and the Philippine Islands will shake and crumble. Its a lame joke pertaining to the massive population of China compared to the Philippines, but you have to read between the lines to be able to understand what the joke really means. China is a powerhouse, and 14 years have passed since I heard that joke and China still continues to become a powerhouse.

Currently, China is the King of the Cyber World.

Not even the powerful United States of America, a global police, can keep up with China's advances on offensive, defensive, and reconnaissance tactics inside the Cyber World. It is a well-known fact that on any given day, China can launch a coordinated attack on strategic computer networks in North America and the rest of the world. Numerous coordinated attacks have been already documented in the past, we are all just waiting for the next big one.

So what can we do to check this kind of power and balance things out?

Simple. United States and the rest of the world should start implementing a comprehensive Government-backed "Nation Cyber Security Plan". As early as high school, students should be introduced to the role of individuals in helping secure computer networks.

A Cyber-Security aware student is equivalent to a troop of soldiers in the field. The soldiers on the field are only limited to how many bullets they have with them, a Cyber Security student can plan strategies, deploy logistics and accomplish remote methods of attack. A Cyber Security student can even defend and penetrate enemy networks and cripple enemy communication lines and logistics before everything escalates.

I still have faith in China though. They will be just on the defensive most of the time. They will not use this major advantage to launch something major against US and the rest of the world.

###







Thursday, May 7, 2009

Blackwater, now Xe, era ends in Iraq



C
hairman of Blackwater USA Erik Prince is sworn in prior to testifying before a House Oversight and Government Reform Committee hearing on private security contracting in Iraq in Washington on October 2, 2007. (UPI Photo/Kevin Dietsch)

BAGHDAD, May 7 (UPI) -- The era of Blackwater Worldwide, now called Xe, providing security to U.S. personnel in Iraq is over as another firm took over duties in Baghdad.

Complete details here:


Tuesday, May 5, 2009

Tactical Cameras are making a comeback?

"What do you get when you mount a Nikon D200 with a standard rifle stock? Why a Tactical Camera of course! One that no reporter would be caught with in a war zone or covering any armed action anywhere. What started out as a tongue in cheek project for April Fools wound up being quite the successful demonstration of concept. It features a fully functional trigger; it has controls for operating the shutter and auto focus; and for the patient shots, it has a mounted bipod. Carry sling optional."

Thursday, March 19, 2009

Adams Arms PDW 5.56mm

With new one-piece Bolt Carrier Group it’s a redefined PDW!

Piston System

Time + Temperature + Pressure = Gas. I’m not talking about Super Bowl Sunday here; I’m talking about AR-15s. It’s gas pressure that makes ARs work. Whether it be Direct Impingement (DI) or Piston Systems, ARs are at the mercy of gas. Aren’t we all?

For complete information, go here:
http://www.tactical-life.com/online/guns-and-weapons/adams-arms-pdw-556mm/

Adams Arms website:
http://www.adamsarms.net/

Go grab a copy of this issue, this 5.56mm PDW rocks!

Monday, March 2, 2009


There is a place for a geek like you in the United States Air Force.

A provisional unit is a temporary unit organized to perform a specific task. It's considered temporary because it does not have personnel assigned, rather personnel are attached to the unit from their home stations. The AFCYBER (P) staff will continue to work issues related to the standup of the 24th Air Force under Air Force Space Command for as long as needed.

For complete information, please head to:
http://www.afcyber.af.mil/