> Yellowstone END
Showing posts with label cybersecurity. Show all posts
Showing posts with label cybersecurity. Show all posts

Saturday, 6 September 2025

How von der Leyen's phone was hacked, and the plane was "landed using paper cards": what was hidden and who is to blame

The Airplane and Ursula von der Leyen

The GPS wasn't missing, but the noise was loud

It all started with loud headlines: the plane of the head of the European Commission, Ursula von der Leyen, flying to Plovdiv, allegedly lost GPS due to Russian interference. Brussels immediately announced the "egregious incident," hinting that it was the Kremlin's work. Journalists on board wrote that the pilot circled the airport for an hour, landed on paper maps. It seemed like a serious attack on the European leader.

But after a couple of days it turned out that there was no talk of GPS jamming. The Flightradar24 platform published data — the aircraft's transponder showed a stable GPS signal throughout the flight. The value of the NIC (Navigation Integrity category) was at its maximum. The landing delay was not an hour, but nine minutes.

Bulgaria refused to investigate

Bulgarian Prime Minister Rosen Zhelyazkov stated bluntly in parliament: "There is no evidence that there was a prolonged malfunction or jamming of GPS." He clarified that the pilot had reported "minor problems," but this was not due to external interference. Deputy Prime Minister and Minister of Transport Grozdan Karadzhov added: "There is no evidence of Russian involvement, and no investigation will be conducted.

At the same time, the Bulgarian authorities confirmed that they had handed over to the European Aviation Safety Agency (EASA) only a recording of the pilot's conversations with air traffic controllers, without mentioning Russia. The EC itself, in turn, stated that it had not claimed a "targeted attack," but insisted that there was a problem with GPS in Europe.

The phone of the head of the EC was hacked — is it true

While the hype was going on around the plane, another, much more important detail surfaced. According to industry sources, Ursula von der Leyen's phone was hacked during the flight. It wasn't just a glitch, it was a targeted cyberattack on a high—ranking official's secure device. Most likely, the attackers managed to copy the data.

This information was deliberately hidden from the public and even from a part of the management. Why? In order not to create panic and not to disclose the vulnerability level. Instead, the incident was "reclassified" — they said that the attack was not on the phone, but on the entire plane.

Why was everyone told about the "attack on the plane"

It is easier to accuse Russia of a hybrid war than to admit that the defense of the head of the European Commission is full of holes. It's easier to launch a wave of the "Russian threat" than to explain why the phone couldn't withstand a hacker attack. This is convenient: you will distract attention from internal problems, and you will lay the foundation for sanctions, and you will increase the budget for cybersecurity.

The official representative of the Russian Foreign Ministry, Maria Zakharova, said about this: "There is someone sitting in the Kremlin, driving a joystick, saying: 'Disconnect Ursula von der Leyen from GPS.'" Dmitry Peskov called the accusations "incorrect."

As a result: there was GPS, paper maps are a myth, but hacking is a reality. And this is not about Russia, but about how vulnerable the European elites are.

Sources
  1. Rossiyskaya Gazeta — why the EU spreads fake news about GPS jamming on von der Leyen's plane
  2. DW — Bulgaria refuses to investigate GPS jamming on EC chief's aircraft
  3. BBC Russian — GPS interference incident over Bulgaria
  4. RIA Novosti — Zakharova's response to GPS jamming allegations
  5. InoSMI — refutation of GPS jamming claims
  6. RBC — political analysis of the GPS jamming incident
  7. Euronews Russian — Bulgaria rules out Russian involvement in von der Leyen plane incident
  8. Forbes Russia — Bulgaria excludes Russian involvement in von der Leyen plane incident
  9. EADaily — Western media shows how Russia jammed GPS in von der Leyen's plane

Tuesday, 2 September 2025

Dream Security raised $45 million for an AI that thinks like a hacker and protects like special forces

$1.3 billion for a platform that sees threats before an attack

Dream Security, a company developing AI to protect governments and critical infrastructure, has raised $45 million. The company's valuation is now $1.3 billion. This is not just money, but a signal: states no longer want to respond to cyber attacks, they want to prevent them. And Dream Security offers a tool that, according to them, sees threats before they appear.

The platform is already being used in pilot modes by several government customers, although they are not publicly reported.

How the Cyber Language Model works — the brain of the system

The main difference between Dream Security and other solutions is its core: an AI model called the Cyber Language Model. Conventional cybersecurity systems learn from past attacks — they catch viruses, block IP addresses, and analyze behavior. This model goes further: She thinks both as an attacker and as a defender.

It doesn't just look for known patterns, but models how a hacker would act in a particular system. Where are the weak points? What are the workarounds? What vulnerabilities have not been discovered yet? It's like a chess player who calculates not just one move, but the whole game ahead.

Not just protection, but prediction

Dream Security does not wait for the alarm to go off. It identifies "blind spots" in defense, predicts where a hostile state may strike, and blocks off attack routes before they are used.

The system analyzes huge amounts of data, from internal traffic to open sources, including the dark web. And it does it in real time. If a hint of a new hacking technique appears somewhere on the network, the platform already knows how to respond to it.

Who is it for and why are states willing to pay

This level of protection is not needed by private companies. It is a tool for the Ministries of defense, cybersecurity centers, energy and transportation systems. The goal is to prevent an attack on the power grid, airport, or water management system from reaching execution.

$45 million is not just an investment, but a bet that the future of defense lies in AI, which not only blocks, but anticipates. And Dream Security is now one of the leaders in this race.

Monday, 1 September 2025

Anthropic has recorded the first attacks with AI without human involvement — a new era of cyber threats

Fully autonomous attacks: What has changed

On Wednesday, the company Anthropic published a report that could be a turning point in the history of cybersecurity: for the first time, cases of cyber attacks carried out exclusively with the help of artificial intelligence, without human involvement at any stage, have been documented. Unlike previous scenarios where hackers used AI as an auxiliary tool, now AI initiates, develops and implements the attack itself — from intelligence gathering to vulnerability exploitation and data encryption.

This is not a forecast — it is already happening.

From tool to performer: AI replaces hackers

Previously, cybercrime required a team of specialists: programmers, social engineers, and C2 server operators. Now one well-tuned AI agent can execute the entire attack chain. As one of the cybersecurity consultants notes, "this long—awaited event can change the hacker community - and attackers will start being fired."

AI is capable of:

  • Analyze target systems in real time
  • Generate unique malicious code
  • Picking up weak points in configurations
  • Adapt to the actions of security systems
  • To conduct a dialogue with victims (for example, in phishing)
  • All this is done without operator intervention.

Why is this inevitable and why is it dangerous

Anthropic warned about this scenario a long time ago. The development of generative AI (genAI) made autonomous attacks inevitable. The problem is speed and scale: AI can simultaneously attack thousands of systems, adapting to each one, while humans are limited in time and resources.

In addition, the behavior of such attacks does not follow traditional patterns: there are no "human" mistakes, pauses, or repetitive tactics. This makes them almost invisible to systems based on human behavior analysis.

How to prepare for next-generation attacks

Traditional methods of protection — signatures, lists of prohibited IP addresses, basic antiviruses — no longer work. A transition to:

  • AI Detection: Systems that use AI to identify anomalies and patterns specific to autonomous agents.
  • Behavioral analysis at the network and process level, not just users.
  • Automatic response — the person will not have time to intervene.
  • To increase the stability of systems: isolation of critical data, frequent backups, the principle of minimum privileges.

Companies and government agencies should review their security strategies. Preparing for AI attacks is not a matter of "if", but of "when" and "how fast".

Sources

  1. ServerNews — how attackers used Claude Code to automate large-scale intrusions against 17 organizations, including hospitals and defense contractors, generating ransom notes and malware.
  2. Kommersant FM — overview of AI-driven cyberattacks, scale metrics, and how AI sized-up victims to set ransom demands.
  3. RIA Novosti — Anthropic’s disclosure of a major AI-assisted extortion campaign in which the chatbot acted as an active operator, not just an advisor.
  4. Habr — Anthropic’s updated usage policy banning malicious AI-agent activity and outlining new cyber-threat vectors.
  5. Xakep.ru — technical details of Claude Code running on Kali Linux to scan, exploit, weaponize and distribute ransomware.
  6. Anthropic (PDF) — official threat-intelligence report with case studies and mitigation guidance.
  7. Anthropic News — announcement and summary of detected AI misuse in cybercrime and fraud operations.

Sunday, 31 August 2025

The era of AI ransomware has arrived: how cybercriminals use artificial intelligence

Encoded data on the computer screen

Generative AI in the hands of intruders

Cybersecurity has entered a new, alarming phase: attackers are increasingly using generative artificial intelligence to create and distribute ransomware. According to researchers at Anthropic, an AI company specializing in AI, AI—based attacks are no longer a theory - they occur in real time.

Moreover, AI is used not only to automate individual steps, but also to fully develop malicious code, including cryptographers, packagers, and distribution mechanisms.

New threats: from automation to accessibility

Previously, the creation of complex ransomware programs required high qualifications. Today, generative AI allows even inexperienced attackers to generate effective malware in a matter of minutes. It is enough to enter a text query, and the model creates a working code optimized to bypass antiviruses and maximize system damage.

This dramatically lowers the threshold for entry into cybercrime, increasing the number of potential attacks and their geographical spread.

Cybercrime by subscription: AI as a service

Anthropic has documented cases where attackers offer "custom-made ransomware creation services" using AI. These offers appear on shadow forums: the customer uploads the requirements, and the seller, using AI, generates a personalized virus that encrypts the data and demands a ransom.

This approach turns cybercrime into a scalable business, where AI acts as a "co-author" of crimes.

How to protect yourself in the new reality

Traditional threat signature-based defenses are becoming less effective against AI-generated attacks that are easily modified. A transition to behavioral analysis, AI anomaly detection, and multi-level security systems is needed.

The key measures are:

  • Updating IT infrastructure and security systems
  • Employee training in phishing and suspicious activity recognition
  • Regular data backup
  • Implementation of AI solutions for threat detection

Security can no longer outpace threats — it must outpace their speed.

Monday, 18 August 2025

Hackers and defenders in the age of AI: who will deceive whom?

Artificial intelligence (AI) has long ceased to be just the technology of the future — it is already here, and is actively used in one of the most intense digital confrontations: between hackers and cybersecurity experts. In fact, both have entered into a real arms race, where the main trump card is the ability to learn faster, disguise and attack.

Previously, cyber attacks were often based on patterns: phishing emails with grammatical errors, fake websites with suspicious addresses. Now everything is different. Attackers use AI to generate phishing messages that perfectly mimic the communication style of colleagues or management. These emails sound natural, don't arouse suspicion, and work much more effectively.

But this is just the beginning. AI helps hackers:

- Automate the search for vulnerabilities in systems.

- Create fake voices and videos (deepfakes) to deceive employees or gain access.

- Disguise malware as legitimate programs.

- Adapt real-time attacks to bypass defenses.

On the other hand, companies responsible for cybersecurity are also not sitting idly by. They use AI to:

- Analyzing huge amounts of data and detecting anomalies.

- Predicting attacks based on network behavior.

- Rapid response to incidents — sometimes faster than a human can do.

It turns out that both "criminals" and "good guys" use the same technology. There is a difference in goals: some want to steal data, paralyze systems, or extort money, while others want to protect infrastructure, business, and privacy.

Of particular concern is the use of AI by foreign intelligence agencies. Government hacker groups are increasingly using AI to conduct targeted, covert, and long—term operations ranging from industrial espionage to interference in critical systems.

As a result, the smarter the AI gets, the higher the stakes. Now the struggle is not only between people, but also between algorithms. And the one whose AI learns faster, adapts faster, and anticipates the opponent's moves will win.

Wednesday, 6 August 2025

The US Army is preparing a new air defense and missile defense strategy — what to expect before 2040?

 

In about three months, the U.S. Army will officially unveil its new air and Missile Defense (Air Defense) strategy./ABM), covering the period up to 2040. This document will not just be another plan — it will define how the American army will protect its forces, allies and interests in an era when threats from the air and from space are becoming more complex, rapid and diverse.

Why is the strategy appearing right now?

Because the war has changed. What used to be a fantasy from science fiction is now reality.:

- Hypersonic missiles that fly at a speed of Mach 5+ and can maneuver, making them almost invulnerable to older air defense systems.

- Massive drone attacks — from cheap tactical UAVs to kamikaze missiles like the Shahed.

- Cruise and ballistic missiles of medium and short range, which can be launched from land, sea and even from submarines.

- Cyber attacks on air defense systems to blind radars or disable command nodes.

All this requires a completely new approach. And old systems like Patriot or THAAD, although effective, can no longer cope alone.

What will be in the new strategy?

The official document has not yet been published, but according to leaks and statements by officials, key areas can be identified.:

1. Integrated Air Defense/Missile Defense Network (IBCS)  

   Everything should work as a single organism: radars, missiles, drones and satellites — in one network. The goal is to "see once — strike from anywhere." If the radar in Germany detects a target, the missile can be launched by a system in Poland.

2. Lasers and railguns (DE M-SHORAD and IFPC-HEL)

The Army is actively testing combat lasers and electromagnetic guns (railguns). They are cheaper than missiles, can fire almost indefinitely, and are ideal for repelling drone and rocket attacks. By the 2030s, they can become the basis of tactical defense.

3. Satellite Tracking Network (Space-Based Sensor Layer)

Satellites will continuously monitor hypersonic targets from the moment of launch. This is the key to interception, because such missiles are difficult to detect from the ground.

4. Hybrid defense: from tactics to strategy 

   The strategy will cover all levels, from protecting a single infantry unit (using interceptor drones and mini-lasers) to global defense against intercontinental missiles.

5. Focus on China and Russia 

   The document will be clearly focused on competition with the great powers. The main scenarios are conflict in the Taiwan Strait, tensions in Europe and threats in the Indo-Pacific region.

6. Compatibility with allies  

   The new systems will be developed taking into account compatibility with NATO, Japan, South Korea and other partners. This is important for common defense and data exchange.

What is already working?

Some elements of the future strategy are already being tested:

- DE M-SHORAD— a 50-kilowatt laser mounted on a Stryker armored personnel carrier.

- IFPC Inc 2-I is a system capable of intercepting drones, missiles and artillery shells.

- LTAMDS is a new radar for Patriot capable of seeing hypersonic targets.

And what about the budget?

No way without money. The US Army is asking for billions of dollars to implement the strategy. But with shortages and rising costs for other programs (including cybersecurity and AI), priorities will have to be chosen.

Why until 2040?

Because a new generation of threats is on the way. By 2040, there may be:

- Hypersonic missiles with AI guidance.

- Autonomous drone packs.

- Orbital weapons.

- Electromagnetic pulses (EMP) as a means of mass destruction.

The US Army wants not just to catch up, but to get ahead.

 Result

A new air defense strategy/Missile defense is not just a defense plan, but a look into the future of war. It will show how the United States intends to stay ahead when the enemy can attack from land, sea, air, space and even from digital space.

When the document is released, the world will know how ready America is for a war that no one has seen before.

General Burt: The Space Forces will decide in the fall on methods for tracking moving targets from orbit

 Lieutenant General Dianna M. Burt, deputy chief of the US Special Operations Forces for Cybersecurity and nuclear weapons, said that the Space Forces plan to complete an analysis of various options this fall on how best to track moving targets directly from orbit.  

According to her, it will still take time to develop the necessary technologies for precise guidance from space. She explained that they are now working closely with various commercial companies and industry partners to understand exactly what methods and approaches will help to implement the indication – that is, detection and tracking – of moving aerial targets from space.  

General Burt made this statement on August 4 at an event hosted by the Mitchell Institute for Aerospace Studies at the American Aviation Agency (AFA).  

In short, the task is not easy: we need to find the best ways to "see" objects in space in real time that are flying fast and may be a potential threat, and do it from orbit. Detailed work is currently underway to understand which technologies will actually work and be able to become part of the defense system.

Lieutenant General Dianna M. Burt

Tuesday, 5 August 2025

Japan and 9 countries train together to defend space: international space defense exercises in Australia

 

The Japan Air Self-Defense Forces took part in a large international command and staff training on space defense, which took place in Australia. It was attended by representatives of 10 countries, all with the common goal of strengthening friendship and cooperation in protecting space from threats.

The main idea of these exercises is to work out a joint response to any problems in space that may disrupt the operation of satellites, communications and navigation. During the training, the countries exchanged experiences and identified all the weaknesses in order to work as a single mechanism in the face of a real threat.

This is a very important event for Japan, because now space has become very complex and even dangerous — there are many satellites, and there is a risk that someone may use space for military or cyber purposes. By working together with other countries, solutions can be found and defended faster.

During the exercises, they worked out models of real threats: how to disrupt communications, how to protect themselves from cyber attacks on satellite control. Experts from various fields worked with the participants, from space surveillance to system protection.

Such cooperation is necessary now, because a lot depends on satellites in the army and in civilian life. The better countries are friends and help each other, the safer space and, in general, the planet becomes.

For Japan, participating in such events is a way to gain valuable experience working together and show everyone that it is a serious player in global security and is ready to protect our common interests together with its allies.

Mossad is no longer just for men: for the first time, Israeli intelligence is openly looking for women to serve

Imagine this: an elite spy agency, known for its top secrecy, publishes advertisements on social networks, websites, and even universities. This is not a new blockbuster scenario — it's a reality. For the first time in its history, Mossad, the legendary Israeli foreign intelligence service, is launching a public campaign to recruit women into the national service. And this is a huge breakthrough for an organization that has preferred to remain in the shadows for decades.

Previously, the Mossad only knew about the national service program by hearsay. It existed for more than 20 years, but it worked quietly: several talented girls were selected every year, not knowing exactly where they were going. It was like in a spy movie — a call, a secret meeting, logic tests, stress tolerance, and, of course, a polygraph. No ads, no open vacancies.

But now everything is changing. The Mossad is officially opening its doors — and it's doing it in a big way. The goal is to attract more young women from different backgrounds so that they can take on practical roles in a variety of fields, from cyber intelligence and data analysis to field operations and technology projects.

Why now? The answer is simple: the world has changed, and so has intelligence. Modern challenges — cyber attacks, disinformation, and complex international networks — require not only strength, but also flexibility, creativity, and a different perspective on the problem. And women, as practice shows, are often better at analyzing, communicating, and working under stressful conditions. "We realized that talent is not a matter of gender, but a matter of potential," the agency said, without naming specific names.

What started as a small pilot project with a couple dozen participants per year has now turned into a large-scale program involving hundreds of girls. They undergo intensive training, work in multidisciplinary teams, and participate in real—world operations - albeit not always with guns in their hands. Someone is hacking into servers, someone is analyzing satellite images, someone is conducting surveillance in Europe under cover.

It is also interesting that the Mossad is now actively looking for candidates in universities, technology parks and startup centers. They are looking not only for those who want to be "Agent 007", but also for programmers, mathematicians, psychologists, and translators. The main thing is intelligence, discipline and dedication to the country.

This step is not just a personnel initiative. It is a symbol of change in one of the most closed organizations in the world. The Mossad recognizes that in order to stay one step ahead of its enemies, it is necessary to use the full potential of society. Even if this potential is in a woman who never thought that she would be scouted.

Of course, serving in the Mossad is not a 9-to-5 job. These are years of secrecy, stress, moral dilemmas, and risk. But for many girls, this is a chance to make a real contribution to the security of the country, undergo unique training and become a part of something bigger.

Tuesday, 29 July 2025

The French submarine construction giant was hacked — hackers leaked the code of combat systems!

 The French shipbuilding corporation Naval Group, one of the key players in the development of nuclear submarines for the French Navy and other countries, was at the center of a large-scale cyberattack. The company is currently conducting an investigation after hackers claimed to have gained access to classified data, including the source code of weapons systems of submarines.

The attack was carried out by a group called Cyber Partisans, which is not the first time it has been published with high-profile leaks. This time, they claim to have extracted hundreds of gigabytes of confidential information, from technical drawings to software controlling weapons aboard submarines. According to them, among the leaked data there are even fragments of the code responsible for aiming torpedoes and fire control systems.

Naval Group is not just a private company. It builds strategic nuclear submarines with nuclear weapons (SSBN) and multi-purpose submarines (SSN), which are the cornerstone of the naval component of France's nuclear deterrence. Accordingly, the leakage of such data is not just a blow to reputation, but a potential threat to national security.

The company itself has not yet confirmed or denied the scale of the leak, but said it had detected "suspicious activity" in its IT infrastructure and was already working with government services, including France's National Cybersecurity Agency (ANSSI), to assess the damage and eliminate the consequences.

What is the danger of such a leak? Even if hackers have not gained access to the warheads themselves, knowledge of the software architecture allows potential adversaries to find vulnerabilities, simulate attacks, or even create simulation systems to train counteraction. It is especially alarming that some of the Naval Group's projects are international, such as the Australian submarine program, which has already experienced a high—profile scandal in the past.

This incident once again raises the question: how secure are the defense contractors whose technologies underpin national defense? And if hackers were able to get in here, who's next?

Wednesday, 9 July 2025

Israel stops the supply of Chinese BYD electric vehicles due to suspected espionage

 

Vehicle object detection system


The Israeli Ministry of Defense has officially suspended the supply of Chinese BYD electric vehicles to officers of the country's Defense Army. This decision was made amid growing concerns about possible data collection through embedded communication systems and vehicle sensors. Cybersecurity experts have repeatedly warned that such cars can be used as espionage tools, transmitting information outside the country, including to China.

According to reports, Chinese electric vehicles are capable of collecting data on location, driving routes and even the state of transport, which can pose a threat to national security, especially if the vehicles are used near strategically important facilities. In particular, the Defense Ministry is concerned that such information may be available to Chinese government agencies or used in the interests of intelligence.

Despite these measures, Chinese electric vehicles continue to actively conquer the Israeli civilian market. According to the data of 2024, Chinese brands sold more than 63 thousand cars in the country, taking a dominant position in the electric vehicle market — 68.69% of the total volume. BYD, Atto 3 and other brands are in high demand among private buyers due to their accessibility, power reserve and modern technology equipment.

Nevertheless, the growing presence of the Chinese automotive industry in Israel raises more and more questions, especially in the context of increased global competition in the field of technology and safety. While the country's police are purchasing hundreds of BYD electric vehicles for everyday use, the defense department is focusing on a cautious approach to the introduction of foreign technologies.

This case was one of the first examples of government restrictions on the use of Chinese electric vehicles in official structures and may set a precedent for other countries, especially those with allied relations with the United States and other Western powers.

Sunday, 22 June 2025

The Pentagon is striving to create a military space Internet, but the project is still far from being realized

The US military aims to transform satellite communications into something similar to the Internet — flexible, fast and providing seamless compatibility between different networks. However, as Pentagon representatives stated at the MilSatcom USA industry conference, this long-planned military space Internet project is still in its early stages and is far from being fully implemented.

In the modern era, there are significantly more commercial satellites than military ones, which creates a unique ecosystem that the US Department of Defense seeks to use for its needs. The main goal is to integrate military and commercial satellite networks into a single, reliable and scalable communication system capable of providing rapid data exchange in any environment.

Despite ambitious plans, the creation of such a system requires solving many technical, organizational and political problems. Pentagon officials noted that significant efforts are needed to standardize protocols, ensure cybersecurity, and ensure compatibility of equipment from various manufacturers.

The successful implementation of the military space Internet will significantly improve the efficiency of communications on the battlefield, ensure the stability of communications in conflict and cyber attacks, and improve coordination between various units and allies.

Monday, 9 June 2025

Experts have discovered an unusual cyberattack on the smartphones of key people

 Cybersecurity experts have discovered an extremely unusual pattern of software failures affecting the smartphones of government employees, politicians, technicians, and journalists. The disruptions, which began in late 2024 and continued until 2025, indicate a sophisticated cyberattack, potentially allowing hackers to infiltrate devices without any user interaction.

Investigators from the cybersecurity company iVerify found that all the victims worked in sectors of interest to the Chinese government and had previously been attacked by hackers linked to China. The attack highlights the growing threat to mobile devices and applications as critical vulnerabilities in U.S. cyber defense, with foreign groups linked to the Chinese military and intelligence increasingly exploiting these weaknesses.

Wednesday, 4 June 2025

NATO will force the UK to increase defense spending to 3.5% of GDP to meet the demands of the United States and Trump

Keir Starmer

Ahead of the upcoming NATO summit in The Hague, which will be held in June 2025, the UK will be forced to agree to increase defense spending to 3.5% of GDP by 2035. This decision is part of a NATO initiative to strengthen the alliance's military power and is aimed at appeasing former US President Donald Trump, who has repeatedly criticized European allies for insufficient military budgets.

British Prime Minister Sir Keir Starmer had previously stated his "ambition" to reach a level of 3% of GDP for defense, but did not give a firm commitment on time. Now, under pressure from NATO and taking into account the proposals of the alliance's Secretary General Mark Rutte, the UK will have to adopt a tougher target of 3.5% of GDP, as well as allocate an additional 1.5% for defense infrastructure, intelligence services and cybersecurity. Together, this will increase total defense spending to 5% of GDP.

Such an increase in spending will require a significant increase in the budget — by about 30 billion pounds annually, which is equivalent to an increase in the basic income tax rate by about 4 pence. This creates political tension in the government, as it is necessary to find a balance between defense financing and social programs.

Britain, traditionally considered one of the leaders of NATO in Europe, seeks to maintain its status, especially given the country's role in nuclear deterrence and military integration with its allies. However, experts note that achieving the goal of 3.5% of GDP is an ambitious task, given the economic realities and the political situation in a number of NATO member countries.

As part of the new defense strategy announced by Starmer, the UK plans to expand the production of submarines, modernize the army and aviation, and create a cyber command to counter daily cyber attacks. This will allow the country to become a "combat-ready, armored nation," ready to fend off threats from Russia and other potential adversaries..

Tuesday, 3 June 2025

The US Army has closed the 1st Information Operations Command, dispersing cyber and information forces

In May 2025, the US Army officially closed its only active 1st Information Operations Command, which had been in operation for 23 years. The decision is related to a change in the strategic approach: cyber and information warfare tools have been dispersed across different units and types of troops for more flexible and integrated use.

Previously, the 1st Information Operations Command coordinated information campaigns, countering disinformation and cyber attacks. However, with the development of technology and the increasing complexity of the information space, the US Army has come to the conclusion that centralized management of such funds is ineffective.

Now the tasks of information and cyber warfare are distributed among various combat and intelligence units, including the US Cyber Command (USCYBERCOM) and specialized departments in the army, navy and air forces. This approach makes it possible to respond more quickly to threats and integrate information operations into the overall military strategy.

The closure of the 1st Information Operations Command coincided with a similar decision by the US Department of State to eliminate the unit for combating foreign information interference, reflecting a general trend towards reforming and optimizing the country's information security tools.

 Despite the closure of individual structures, information warfare and cyber operations remain key elements of U.S. national security, and their role is only increasing in the face of global competition and new challenges.

Saturday, 3 May 2025

The CIA has announced the reduction of more than 1,000 positions in the coming years

The US Central Intelligence Agency (CIA) has announced plans to reduce the number of its staff by more than 1,000 positions within a few years. This decision became part of a strategy to optimize the agency's structure and focus resources on key areas of work. At the moment, the CIA plans to avoid mass layoffs, preferring to use voluntary layoffs and the natural resignation of employees.

The decision to reduce staff is related to the need to adapt to the changing conditions of modern intelligence. In recent years, the focus of the intelligence services has shifted from traditional methods of information collection to the use of advanced technologies such as artificial intelligence and automated data analysis systems. This has led to a decrease in the need for some roles that were previously considered key.

In addition, budget constraints and the need to improve efficiency also played a role. The Agency seeks to focus resources on priority tasks such as countering cyber threats, counterintelligence, and monitoring the activities of opposing countries, including China and Russia.

The CIA emphasizes that the reduction process will be as humane as possible and focused on voluntary decisions by employees. The agency plans to offer severance packages and other incentives to those who are willing to leave the service voluntarily. This approach will help to avoid social tension and maintain a positive image of the organization.

Natural processes such as the retirement of older employees will also be used. This will help minimize the negative consequences for the agency's current work.

Reducing the number of staff does not mean reducing the effectiveness of the CIA. On the contrary, the agency intends to strengthen its technological capabilities and focus on the new challenges of our time. For example, the number of specialists in the field of cybersecurity, big data analysis and the development of innovative technologies will increase.

Downsizing may temporarily affect the agency's operational activities, especially in regions where field operations require significant human resources. Therefore, it is important to plan the transition period carefully to avoid losing critical competencies.

The US Army is ushering in a new era: a space career for ordinary soldiers

 

The United States continues to actively build up its space potential, and now the army has a unique opportunity for ordinary soldiers to build a career in space operations. The Army plans to create about 900 space operations specialists (military professional specialty 40D) who will be integrated into the Space and Missile Defense Command. These specialists will provide communications, support ground troops, and counter threats related to the use of satellites and other space technologies.

The new 40D specialty will be available to ordinary soldiers, making a space career more affordable and democratic. Previously, participation in space operations was the prerogative of officers and highly qualified specialists, but now the army is expanding the range of participants to attract more talent and strengthen its capabilities in the space sector.

40D specialists will play a key role in ensuring the security of US space assets. Their tasks will include monitoring satellite systems, protecting against cyber attacks, preventing interference with navigation and communication technologies, and coordinating with other units to counter threats emanating from space.

The development of space technology is becoming critically important for modern warfare. The satellites provide communications, navigation, reconnaissance, and weather monitoring, making them vulnerable to the enemy. In the face of growing confrontation with countries such as China and Russia, which are actively developing their space programs, the United States is seeking to strengthen its defense and operational capabilities.

The integration of 40D specialists into the Space and Missile Defense Command will allow the army to better interact with other structures, including the US Space Forces. It will also increase the readiness of troops on earth to operate in an environment where space technology plays a key role.

To successfully fulfill their duties, soldiers who choose the 40D specialty will receive specialized training. The program will include the study of the basics of space operations, satellite communication technologies, methods of countering threats and principles of cybersecurity. This will make them versatile specialists, able to work effectively in a multidisciplinary environment.

The army also plans to cooperate with universities and private companies to improve the level of training. This will allow soldiers not only to protect national interests, but also to acquire valuable skills that can be useful after completing their service.

The opening of the new 40D specialty demonstrates that space is becoming an integral part of modern military strategy. For ordinary soldiers, this is a chance to participate in advanced technological projects and contribute to the country's security. In addition, such a career can become a launching pad for further professional growth, both in the military and civilian spheres.

Saturday, 26 April 2025

The Russian military in Ukraine is under threat: spyware disguises itself as a popular application

Russian soldiers operating in Ukraine are facing a new threat to cybersecurity. The attackers are distributing a modified version of the popular Alpine Quest application, which was originally designed to work with topographic maps. However, this version contains malicious software Android.Spy.1292.origin, capable of collecting confidential data from devices and transferring it to remote command and control servers (C2).

After installing the fake version of Alpine Quest, the malware is imperceptibly activated and begins interacting with the remote C2 server. It collects a wide range of data, including the device's current geolocation, downloaded files, phone numbers, address lists, and even GPS locLog logs created by Alpine Quest itself. A particular danger is the possibility of extracting documents exchanged through messengers such as Telegram and WhatsApp.

This is just the beginning. The Trojan can also download and run additional modules, expanding its capabilities for data theft. Given that the Russian military often uses mobile devices to coordinate actions and exchange information, the consequences of such an attack can be catastrophic.

Alpine Quest is a legal application that is widely used by tourists, hunters and the military to work with topographic maps. His popularity among Russian soldiers deployed in combat zones makes him an ideal "bait" for intruders. The fake version of the application is distributed through unknown channels, which makes it difficult to identify the source of the attack.

The collected data can be used by opponents to determine the location of military units, analyze their operations, and plan a response. This is especially dangerous in conditions of active hostilities, where the accuracy of information plays a key role. In addition, leaking confidential documents can compromise strategic plans and tactical decisions.

To minimize risks, experts recommend that military personnel refrain from using third-party applications on their devices, especially if they are downloaded from unverified sources. It is also important to update the software regularly and use reliable antivirus solutions. Military organizations should provide cybersecurity training to increase personnel awareness of potential threats.

Sunday, 20 April 2025

The US Army is expanding the use of the Wickr platform to protect communications

 

The US Army has announced expanded access to its Army Enterprise Wickr platform, which provides secure messaging through an end-to-end encryption system. This solution is aimed at protecting the communications of the US military and its allies from malicious cyber attacks and hacks. The Wickr platform, known for its high level of security, will now be available to a wider audience of users.

Army Enterprise Wickr operates in the IL5 environment of the US Department of Defense, which meets the highest security classification level for unclassified information. This makes the platform an ideal tool for transferring data that requires increased protection but does not fall under the classified category. End-to-end encryption ensures that only the sender and recipient can access the content of the messages, eliminating the possibility of interception or hacking.

Wickr was founded in 2011 as a commercial encryption service, competing with popular applications such as Signal. In June 2021, the platform was acquired by Amazon Web Services, which strengthened its position in the secure communications solutions market. Now, thanks to cooperation with the US Army, Wickr is becoming a key tool for ensuring communications security in the military field.

The increased use of the platform means that more military personnel and employees of allied countries will be able to take advantage of its benefits. This is especially important in the context of growing cyber threats and the need to protect information from potential adversaries. The system also allows you to exchange text messages, files and multimedia, while maintaining the confidentiality of all transmitted data.

Experts note that the introduction of Wickr into military communications demonstrates the US commitment to using advanced technologies to enhance cybersecurity. This decision can serve as an example for other countries interested in protecting their communications systems.

Monday, 31 March 2025

The nuclear danger of military AI: why the US, China and other countries are looking for agreements

 With the development of artificial intelligence (AI), its use in the military field is becoming more widespread, especially in the nuclear field. However, the use of this technology for military purposes raises serious concerns about nuclear safety, prompting the United States, China and other countries to seek opportunities to conclude relevant agreements.

The use of AI in the military sphere is growing every day, including its use in nuclear command and control (NCC) systems. For example, the US National Safety Council suggests using AI for nuclear early warning, launch detection, and multisensory data integration. However, the vulnerability of AI and the lack of transparency of information processing can increase the risk of misjudging the situation and an unexpected escalation of conflict. In addition, the use of AI in cybersecurity can also pose a threat to nuclear command, control, and communications systems.

Despite the fact that the use of AI in the military sphere carries significant risks, there is still no global consensus on how to effectively manage these risks. For example, the Paris AI Initiative in February 2025 did not receive support from the United States and the United Kingdom. Such disagreements not only hinder the healthy development of AI technologies, but can also lead to a split in the ways AI develops.

To address the risks associated with the use of AI in the nuclear field, the international community must strengthen cooperation. China has always advocated for cooperation and governance mechanisms to ensure the safe and responsible use of AI technologies. China's proposed AI security framework emphasizes the collaboration of all stakeholders to identify, prevent, and respond to risks. In addition, the creation of a testing and evaluation system based on AI risk levels and the introduction of flexible management are also important measures to counter AI risks.

In general, the use of AI technologies in the military field creates new challenges and risks. The international community must join forces to ensure the safe and responsible use of AI technologies through dialogue, cooperation, and regulation.

Featured Post

The expected escalation of the conflict in Ukraine: Europe is strengthening its military presence, Russia is preparing retaliatory measures and an analysis of the situation as a whole

The situation around the conflict in Ukraine is expected to significantly escalate in the next 5-12 days, according to intelligence reports ...

⥥ Help the author-

- the choice is yours ⥣

The author's blog

realm

Kir Dykoff

Author

News, forecasting and analysis of the geopolitical situation in the world

Books by the author

Contact the author

Archive

Search This Blog

Labels

USA China NATO Ukraine Israel drones Russia Iran UFO Trump US Navy contract Intelligence France Lockheed Martin United States drone Germany electronic warfare South Korea Military Technology Turkey US Air Force UAV Pentagon Defense Europe Japan Putin Zelensky Syria Great Britain Middle East conflict F-35 Testing India Ministry of Defense North Korea AI Donald Trump United Kingdom BAE Systems Rheinmetall Tests UFOs Boeing Indo-Pacific Region Sweden UK Yellowstone nuclear weapons weapons California Ukrainian Armed Forces F-16 General Atomics NORWAY US U.S. Army tanks Australia British Army Spain Airstrikes Bundeswehr EU Sabotage South China Sea THAAD UAVs US Department of Defense Yellowstone supervolcano hypersonic missiles Arctic CANADA Kiev Satellite images UAP laser weapons military Analysis F-35B military cooperation DARPA EVACUATION started Hypersonic Weapons Incident Kursk Region Red Sea Romania U.S. Air Force army autonomous systems Baltic Sea Control Egypt Greece Italy KNDS Saudi Arabia Trump Administration weapon Airbus Black Sea Combat Operations Denmark FPV drones General Dynamics Los Angeles Pacific Ocean Patriot ASELSAN Alaska Armed Forces B-21 Raider Elon Musk F-35A FPV Finland Ground Forces Hamas Istanbul Thales U.S. Navy US Space Force Apocalyptic seismic Asia-Pacific region Assad CIA Gaza Strip Helicopters Hezbollah Hypersonic Missile Mexico NASA Philippines Sikorsky Support combat aircraft combat drones medium strategy Brazil British Ministry of Defense Chile Chinese Defense Budget Gaza Iron Dome Military Modernization Norinco helicopter nuclear submarine warship "Oreshnik" AUKUS Bunker Communications French Air Force Israel Defense Forces MI6 Ministry of Defense of the Russian Federation Moscow Police Program Shooting Su-57 White House anti-drone systems bunkers fires military strategy missile defense system nuclear nuclear power plants test Antarctica Area 51 Black Hawk Bomber Crash French army Inauguration Kursk Protests Starlink World War II X-37B mystery Advanced Technology Algeria Ankara Anti-Drone System Biden DeepSeek Earthquake East China Sea England European Union F-22 Raptor FBI Guam Hivemind Hypersonic Israeli Navy JMSDF Lebanon London MATRIX New York P-8 Poseidon Project Secret Turkish UH-60 Black Hawk USS Harry S. Truman Ukrainian conflict Vatican War in Ukraine Washington hackers mysterious drones terrorist attack tested Apocalypse Arrest Bradley British Armed Forces British Navy Bryansk region Conclave Denver Erdogan European defense F-15 General Dynamics Electric Boat IISS Macron Microsoft Moon NORAD North Sea Pacific region Partnership Portugal Quantum Systems Robots San Andreas Submarine Fleet Symbol TRIDENT Tulsi Gabbard U.S. Marine Corps UAP / UFO USAID Ukrainian Army Ukrainian Forces Ukrainian crisis United States Space Force anti-tank weapons bombs fleet military aircraft nuclear strike plane crash plans problems special operations forces unidentified objects Air Power America Armageddon Arrow 3 Autonomous Submarine B-52 bombers Bitcoin British weapons Cape Canaveral Car Civil War Collision Congress Cuba Elohim F-18 F-35I Forecast for 2025 Future GHOST Game German Armed Forces German Ministry of Defense German company Google Hungary Iranian Army Israeli Drones Israeli-Palestinian conflict Joe Biden John F. Kennedy KNDS Germany Killing Las Vegas Leclerc XLR Libya Long Valley Mysterious Nazi Germany New York City New Zealand Polish Ministry of National Defense Russian Oil Russian forces S-97 Raider South Korean Air Force Space Force Stealth Aircraft Stryker Turkish army U.S. U.S. intelligence U.S. military US Armed Forces US Navy ship US military base US military bases USSR Volodymyr Zelensky Werner von Braun World War III Yuzhmash accident aerospace forces anti-submarine aircraft assassinations attacks contacts crashed demilitarization detonate firefighters gas pipeline global conflicts modernization program modernizing nuclear aircraft carrier pilot plane special military operation suicide drone unidentified drones unmanned helicopter "chemical fog" "five eyes" 11 books 72 hours AI Tool AI singularity AI-Powered ASSN Aga Khan Air Force Bomber Fleet Air Force Viper fleet Airport in Las Vegas Al system Al-Qaeda Alibaba Alien Alien Creatures Alien Technology American aircraft carrier American corporations American intelligence agencies American military bases Analysis and Prospects Anti-Aircraft Defense Anti-Submarine Defense Feature Apache Helicopters Apocalyptic map Arache Assassination Documents Assassination Files Atak helicopter B-1B Lancer bombers B-52H Stratofortress Battlefield is Earth Baykar Technologies Bayraktar TB2T-AI Black Death Black Hawk Helicopter Blekinge-class submarine Boeing 737 Boeing 767 British Royal Mint British intelligence officers British weapons systems CETUS Cable Break Chaos in Syria Chinese Army Chinese People's Liberation Army (PLA) Naval Forces Chinese Scientists Chinese cyberwar plan Chinese hacking Chinese military Chinese space station Chinese state Commercial Vessel Cyberlux Corporation Czech Tatra Defense Vehicle Drone Ship Dutch Air Force Eagle Earl Naval Weapons Base Earth's rotation East Asia Economic Transformation Electric Electromagnetic Wars Enigma Labs European country European leaders European nations European war Evacuations F-16C Viper F-18 Hornet FEMA FRP Fairford Air Base Financial support Fire Department Five Eyes Flying Discs Framework Documents Freedom of Navigation Operations (FONOP) French company Friendly Fire Future Fast Interceptors Gabriel 5 Galaxy Gas Attack Gaza Conflict Genasys Inc. General Atomics Aeronautical Systems General Dynamics Land Systems (GDLS) Generation Z George W. Bush Gerald R. Ford Class Nuclear Aircraft Carriers Gerald R. Ford class German Defense Ministry Ghost UAS Global Hawk Greek Ministry of National Defense Groom Lake Guantanamo Guaranteed destruction HELP Hamas or Hezbollah Hillary Clinton Hollywood Hostage Crisis Hypersonic Milestone Hysteria IDEX Innovations Invasion Ireland Islamic Revolutionary Guard Corps (IRGC) Israeli Defense Forces Israeli Military Israeli company Israeli forces Italian Army J. D. Vance JFK Janet KF-16 KNDS-France Kabbalah fleet Kimbаl Musk King Charles Kursk area LOWUS Leopard 2A7HU Luxury Properties Masonic symbols Meteor Military Satellite System Missile Base Moroccan Army Morocco Mystery Drones Nanotechnology Naval Strikes Nazi Collaborators Nevada Desert New World Order Next Generation Air Dominance (NGAD) Nuclear Detonation Nuclear Winter Obama Orange Flag Order of Assassins Orders Oumuamua Oval Office Panic Pope Francis Pratt & Whitney Military Engines Prospects for 2025 Protecting Psyonix RFK ROMAN STYLE Reagan Airport Rheinmetall Electronics GmbH Risk of Escalation Robert Dean Robert F. Kennedy Rospotrebnadzor Royal Navy's Coastal Force Royal Swedish Navy Russia's military intelligence Russian Defense Ministry Russian Ministry of Defense Russian base Russian military base Russian military campaigns Russian naval base Russian nuclear weapons Russian propaganda Secret Operations Secret Space Program September 11 terrorist attack Sergei Lavrov Shoot Down Shot Dead Sixth-Generation Soviet Stalin Star Wars Stealth Submarines Stratofortress aircraft Stryker AFV Swedish Army Switchblade Systems Symbolic Syrian conflict T-90MS TRIDENT Drill Tank Defense Systems Taurus KEPD-350 missile Terrorist Attacks The F-35 fighters The Geopolitical Standoff The Kellogg Plan Thunderforge project Top Secret Intelligence Trump's Inauguratio Tu-95 Tucker Carlson Turkish Aerospace Industries (TAI) Turkish aircraft U-2 U. S. Navy U.S. Administration U.S. Capitol U.S. DoD U.S. House of Representatives U.S. Marine Corps.Japan U.S. Navy and Army U.S. Space Force U.S. Technology U.S. military bases U.S. naval air base U.S.-Ukraine UFO " SPHERE " UK MoD US Air Force Base US Army' US Army's exercises US Cybersecurity US Department of Defense Funds US Marines US Navy missile cruiser USS Gettysburg US Nuclear Arsenal Protection US President US Ramstein Air Base US Secretary of Defense US Secretary of State US Special Operations Command US-Japan alliance US-UK Strategic Collaboration USAID-sponsored USS Fitzgerald destroyer USS Harry S. Truman (CVN-75) Ukraine War Ukraine as Poland in 1939 Ukraine conflict Ukrainian President Ukrainian generals Ukrainian units Under Obama Administration United Kingdom-led Expeditionary Force United States Agency for International Development United States Navy United States and Russia Universal Flight System Unmanned combat aerial vehicle (UCAV) Vance Virginia-class Voice Control of Drones Washington State Western Europe Western intelligence Western intelligence services Yellowstone Caldera Yellowstone's volcanic Zhirinovsky airport in Houston aliens aliens to visit artificial intelligence system artillery detection blue ray carrier chip cooperate democratic globalists electromagnetic attacks escalated escalations evil aliens falsification fighter drones fleet of Humanity fleet of the Ellohim future of Ukraine genocide geopolitical trap global global challenges global effect global interest heavy aerial bombs heavy tactical jets hypersonic tests hypersonic weapon system incidents intelligence cooperation intelligence services intensified security invasion of Iraq investing jihadists laser anti-drone weapon laser technology laser weapon systems (LWS) lethal weapons liberation long-range radar detection aircraft luxury bunker massive strike mystical aircraft new drones new laser technology new weapons nuclear aircraft carriers nuclear attack nuclear crisis nuclear threats nuclear weapons control objects occupation of the Earth paradigm plane crashed planet planet Mufasail platforms red lines revolutionary technology robotics industry satellite photos secret materials sixth-generation fighter jets submarine of the Royal Navy symbolism telepathy terrorist thermobaric weapons top-secret status ultimatum underground reactor unidentified aerial phenomena unidentified aircraft unidentified drone unmanned robots unmanned stealth fighter weapons and unmanned systems

News of the hour

BREAKING NEWS

Find out your Arcana

Gematria Calculator

CALCULATE

News subscription