US Air Force sets up Cyber Command
The move comes amid concerns over the vulnerability of the US communications and computer networks to cyber attack in a …
The move comes amid concerns over the vulnerability of the US communications and computer networks to cyber attack in a …
President Vladimir Putin has dissolved the Russian government on the request of the prime minister, the Kremlin said Wednesday, a …
Chuck Simpson at AboveTopSecret.com has an analysis of the Barksdale nuke incident in which he speculates that, “Someone, operating under …
Continue reading Barksdale Missile Number Six: The Stolen Nuclear Weapon
from Nancy Gibbs, for Time Magazine Some people fear complacency; others fear forgetting. Others have only limited space in memory, …
from Eric Lichtblau, for the New York Times September 9, 2007 In terrorism investigations, the F.B.I. obtained data not only …
Continue reading F.B.I. Data Mining Reached Beyond Initial Targets
BISMARCK, N.D. – An Air Force squadron commander has been relieved of his command after five nuclear weapons were mistakenly …
Continue reading Air Force official rapped after U.S. nuclear flyover
Here’s a guy who really embodied the essence of the inventor; someone who makes fact from fiction, and creates real, …
Continue reading Aviation inventor Paul MacCready dies at 81
There’s something about watching the test-firing of a new rocket engine that really starts the day off right. Since it …
An excellent article in Wired, by Ryan Singel The FBI has quietly built a sophisticated, point-and-click surveillance system that performs …
Continue reading Point, Click … Eavesdrop: How the FBI Wiretap Net Operates
You’re seeing the cameras everywhere, right? On the corner, over the intersection, in stores and public places, and a lot …
Continue reading U.S. domestic surveillance grid goes orbital
Note to maverick presidential candidates, unannointed by the mainstream media: always stand in the middle at photo-ops. Who knows if …
Security researcher Scott Lunsford recently found that hacking into the SCADA-linked control system of a nuclear power plant was disturbingly …
Continue reading Life imitates art: Hacker uncovers nuke plant vulnerability