Thierry Burkhard, France's military chief of staff, calls « high-intensity war. »
Those efforts included improving his country's ability to swiftly deploy troops and defend against cyber and information warfare.
CCDCOE raised the flags of Canada, the Republic of Korea and Luxembourg to welcome the most recent members of CCDCOE’s multinational family.
The U.S Army is finalizing doctrine setting in place the notion of information advantage.
The concept has 5 main pillars:
More Americans have died of the novel coronavirus than in every conflict the U.S
COVID-19 was the most obvious precursor of the new MAD ( Massive Attacks of Disruption )
Beyond COVID-19 and state and non-state actors, 7 major disruptors can be identified.
The first is failed and failing governments. The other disruptors are climate change, cyber, social media, terrorism, debt and drones.
#government #cyber #climate #kinetic #drones #disruptive #threats #industrial #military #defense #hardware #business #technologies #data #internet #research #software #informatique #covid19 #usa #coronavirus
The Department of Defense's National Defense Strategy, to be published in early 2022, is one of the most important documents the Biden administration will produce.
French gov. allocated to VigiNum an annual budget of 12 million euros, and an in-house expert workforce of 65, mostly comprising data scientists, social media analysts and a few geopolitics experts. Overall, almost a hundred people will contribute to VigiNum's missions, with the help of other ministries. The service will be led by a magistrate with experience in counterterrorism coordination, which indicates that it will act primarily as an interministerial coordination tool.
This model is reminiscent of the U.S.'s Global Engagement Center and of the U.K.'s National Security Communications Team.
France has long conducted psychological operations (PsyOps), and much of the doctrine's content was not a secret for well-informed readers.
When countering disinformation, the French government faces the same questions at home and abroad: where to draw the line and, most importantly, how to walk it.
Emerging Military Technologies
This Congressional Research Service report provides an overview of selected emerging military technologies in the U.S, Chi︀na, and Rus︀sia:
Army General Paul Nakasone, commander of U.S. Cyber Command and director of the NSA, speaks with David Ignatius, a columnist and associate editor for The Washington Post, about the partnership between the NSA and USCYBERCOM and how it helps defend the U.S nation.
The first U.S. National Cyber Director wants the government to take a tougher, more #proactive approach to those who threaten America's networks: degrade their capabilities and demonstrate how they would suffer should they attack.
Inglis didn't say exactly how that degradation of adversarial ransomware and hacking capabilities was « underway » but did say that, like any strategy, this one will take time and persistent implementation before it yields victory.
C︀hine︀se military may have an edge over US on artificial intelligence research.
The C︀hine︀se military capabilities are much greater than that single test. They're expanding rapidly in space, in cyber and then in the traditional domains of land, sea and air. (Mark Milley)
C︀hin︀a has completed hundreds of hypersonic missile tests while the United States has completed less than ten.
The new technology is said to have taken U.S officials by surprise, especially because the system « defies the laws of physics » and appears to be superior to anything in the American arsenal.
Robust Energy Sources for Intelligence Logistics In Extreme, Novel and Challenging Environments (RESILIENCE)
L'accord-cadre conclu avec la filiale Technology Services de Capgemini pour une durée de 6 ans confie l'infogérance du domaine numérique de la DGA à un prestataire unique.
The Secretary of Homeland #Security has issued a new National Terrorism Advisory System (NTAS) Bulletin regarding the current heightened threat environment across the 🇺🇸 United States.
The Homeland continues to face a diverse and challenging threat environment leading up to and following the 20th Anniversary of the September 11, 2001 (#911) attacks as well religious holidays we assess could serve as a catalyst for acts of targeted violence.
These #threats include those posed by domestic terrorists, individuals and groups engaged in grievance-based #violence, and those inspired or motivated by foreign #terrorists and other malign foreign influences. These actors are increasingly exploiting #online forums to influence and spread violent extremist narratives and promote violent activity. Such threats are also exacerbated by impacts of the ongoing global #pandemic, including grievances over public #health safety measures and perceived #government restrictions.
Issued: August 13, 2021 02:00 pm
Expires: November 11, 2021 02:00 pm
Peraton, Inc (
peraton.com) has been awarded a nearly $1 billion task order (TO) to provide the Department of Defense (DoD), U.S. Central Command (USCENTCOM) and its mission partners with operational planning, implementation, and assessment services (OPIAS) to achieve operational advantages in the information space and to counter threats to U.S. national security. The TO is worth up to $979 million over a five-year period. Under OPIAS, Peraton will increase the ability of USCENTCOM and its mission partners to coordinate, collaborate, and fuse information related capabilities (IRC), and information operations (IO) through effective messaging. Peraton will also drive innovation to boost IO capabilities, helping the U.S. extend its competitive advantage to achieve national security objectives.
« Since 2016, Peraton has executed campaigns to promote regional security and stability. Our ability to provide the U.S. government with insight, expertise, and influence helps ensure the safety of Americans, our allies, and the more than 550 million people under USCENTCOM area of responsibility, spanning three continents and 20 nations. » ( Tom Afferton, president, Cyber Mission )
Peraton has supported this work since 2016 under USCENTCOM's Counter Threat Messaging Support Program (CTMSP). OPIAS represents a nearly 100 percent increase over the CTMSP TO in the work scheduled to be executed.
On July 19, 2021, the U.S. Department of Justice (DOJ) unsealed an indictment against four APT40 #cyber actors for their illicit computer network exploitation (CNE) activities via front company Hainan Xiandun #Technology Development Company (Hainan Xiandun).
Hainan Xiandun employee Wu Shurong cooperated with and carried out orders from PRC Ministry of State Security (MSS) Hainan State Security Department (HSSD) intelligence officers Ding Xiaoyang, Zhu Yunmin, and Cheng Qingmin to conduct CNE.
Wu's CNE activities resulted in the theft of trade secrets, intellectual property, and other high-value information from companies and organizations in the United States and abroad, as well as from multiple foreign governments.
These MSS-affiliated actors targeted victims in the following #industries : #academia, #aerospace, #aviation, #biomedical, #defense #industrial base, #education, #government, #healthcare, #manufacturing, #maritime, #research #institutes, and #transportation (#rail and #shipping).
July 19, 2021
Compromise & exploitation of the Microsoft Exchange server undermined the security and integrity of thousands of computers and #networks worldwide, including in the member states and EU institutions.
The #US has long been concerned about the People's Republic of China's (PRC) irresponsible & destabilizing behavior in cyberspace.
The PRC's pattern of irresponsible behavior in cyberspace is inconsistent with its stated objective of being seen as a responsible leader in the world. Today, countries around the world are making it clear that concerns regarding the PRC's malicious cyber activities is bringing them together to call out those activities, promote #network defense and #cybersecurity, and act to disrupt #threats to our #economies and #national #security.
Attributing with a high degree of confidence that malicious cyber actors affiliated with PRC's Ministry of State Security (MSS) conducted #cyber #espionage operations utilizing the zero-day vulnerabilities in #Microsoft #Exchange #Server disclosed in early March 2021.
We are aware that PRC government-affiliated cyber operators have conducted #ransomware operations against private #companies that have included ransom demands of millions of dollars. The PRC's unwillingness to address criminal activity by contract hackers harms governments, businesses, and critical infrastructure operators through billions of dollars in lost intellectual property, proprietary information, ransom payments, and mitigation efforts.
Comme le soleil, les machines ne se couchent jamais.