The following was reported by the Reuters news agency, on 05/25/2009: Iran has sent six warships to international waters, including the Gulf of Aden, to show its ability to confront any foreign threats, its naval commander said on Monday. Admiral Habibollah Sayyari, quoted by the ISNA news agency, made the announcement five days after Iran said it test-fired a surface-to-surface missile with a range of 2,000 km (1,200 miles), putting Israel and U.S. bases in the area within reach. Iran said on May 14 it had sent two warships to the Gulf of Aden to protect oil tankers…
Author: John Greenewald
Information warfare is the use and management of information in pursuit of a competitive advantage over an opponent. Information warfare may involve collection of tactical information, assurance(s) that one’s own information is valid, spreading of propaganda or disinformation to demoralize the enemy and the public, undermining the quality of opposing force information and denial of information-collection opportunities to opposing forces. Information warfare is closely linked to psychological warfare. Declassified Documents Relevant Documents Information Warfare Technologies: Survey of Selected Civil Sector Activities, February 1996 [164 Pages, 5.51mb] – This document has been prepared to set forth the results of a technology…
A National Security Letter (NSL) is a form of administrative subpoena used by the United States Federal Bureau of Investigation and reportedly by other U.S. Government Agencies including the Central Intelligence Agency and the Department of Defense. It is a demand letter issued to a particular entity or organization to turn over various record and data pertaining to individuals. They require no probable cause or judicial oversight. They also contain a gag order, preventing the recipient of the letter from disclosing that the letter was ever issued. Declassified Documents Federal Bureau of Investigation (FBI) / Office of the Inspector General…
Under Operation Ghost Dancer the US Army National Guard operates airborne drug interdiction program Reconnaissance and Interdiction Detachments (RAID). The RAID units use the surveillance capabilities of the National Guard’s OH-58 Kiowa helicopters, outfitted with thermal imaging systems, to support local law enforcement agencies in states where drug trafficking is highest. The Guard assists with airborne evidence gathering activities, such as locating and identifying probable marijuana growing operations. Actual law enforcement is handled by local agencies. In one such operation, on 15 December 1992 members of the Oregon National Guard (ORNG) Counterdrug Support Program assisted the DEA, BATF, US marshals,…
The July 2009 cyber attacks were a series of coordinated cyber attacks against major government, news media, and financial websites in South Korea and the United States. The attacks involved the activation of a botnet—a large number of hijacked computers—that maliciously accessed targeted websites with the intention of causing their servers to overload due to the influx of traffic, known as a DDoS attack. Most of the hijacked computers were located in South Korea. The estimated number of the hijacked computers varies widely; around 20,000 according to the South Korean National Intelligence Service, around 50,000 according to Symantec’s Security Technology…