Archive for the ‘DOD’ Category

Drones used missiles with knife warhead to take out single terrorist targets

May 9th, 2019
A see-through model of the original Hellfire missile. Imagine the center replaced with a set of pop-out blades, and you've got the "Flying Ginsu."

Enlarge / A see-through model of the original Hellfire missile. Imagine the center replaced with a set of pop-out blades, and you've got the "Flying Ginsu." (credit: Lockheed Martin)

Drone strikes have been the go-to approach by both the US military and the Central Intelligence Agency to take out terrorists and insurgent leaders over the past decade, and the main weapon in those strikes has been the Lockheed Martin AGM-114 Hellfire II missile—a laser-guided weapon originally developed for use by Army helicopters as a “tank buster.” But as concerns about collateral damage from drone strikes mounted, the DOD and CIA apparently pushed for development of a new Hellfire that takes the term “surgical strike” to a new level, with a version that could be used to take out a single individual.

The Wall Street Journal reports that just such a weapon has been developed and deployed on at least two occasions, based on information provided by multiple current and former defense and intelligence officials. Designated the Hellfire R9X, the missile has no explosive warhead—instead, its payload is more than 100 pounds of metal, including long blades that deploy from the body of the missile just before impact.

“To the targeted person, it is as if a speeding anvil fell from the sky,” according to the WSJ. Some officials referred to the weapon as "the flying Ginsu," because the blades can cut through concrete, sheet metal, and other materials surrounding a target.

Read 2 remaining paragraphs | Comments

Posted in Biz & IT, Central Intelligence Agency, CIA, Defense Department, DOD, drone strikes, drones, Hellfire Missile, Policy | Comments (0)

June 28, 2017 – Hack Naked News #131

June 30th, 2017

DoD networks have been compromised, the Shadow Brokers continue their exploits, a Pennsylvania healthcare system gets hit with Petya, and more. Jason Wood of Paladin Security joins us to discuss nations’ offensive technical strengths and defensive weaknesses on this episode of Hack Naked News! Doug’s Stories: http://thehackernews.com/2017/06/shadowbrokers-nsa-hacker.html — Shadowbrokers continue their exploits by planning to dox […]

The post June 28, 2017 – Hack Naked News #131 appeared first on Security Weekly.

Posted in DOD, Hack Naked News, healthcare, Jason Wood, Paladin Security, Pennsylvania, Petya, shadow brokers | Comments (0)

Report: Feds Mull Bug Bounty Contest for Medical Devices

June 27th, 2016

In-brief: Following the success of the Hack the Pentagon bug bounty program, officials at the U.S. Department of Health and Human Services are considering launching a similar program aimed at medical devices and other healthcare systems.  If imitation is the sincerest form of flattery, then the U.S. Department of Defense should be feeling pretty good about its recently announced “Hack the Pentagon” bug bounty program. Just a few months after the DOD unveiled a bug bounty program that provided financial incentives to security researchers and “white hat” hackers to have at its networks, the Chief Privacy Officer at the Department of Health and Human Services (HHS) has made public statements that suggest HHS is considering a similar program. From the article, over at Federal Times: HHS officials mentioned the DoD’s recently completed pilot program—which paid bounties to hackers who were able to discover cyber vulnerabilities at the agency, also known as ethical hacking—as […]


Definitive Guide to DLP

Posted in bounty, Breaking Security News, Bugcrowd, DOD, Embedded, Government, HackerOne, healthcare, HHS, medical devices, medicine, software development, Top Stories, vulnerabilities | Comments (0)

“Hack the Pentagon” bug bounty program announced

March 7th, 2016

First, we vet you, the US says. Then, keep your hands where we can see them. Now we’re just like the cool tech companies!

Posted in bug bounty, Bug Bounty Program, DOD, Hack the Pentagon, Law & order, Security threats, US Department of Defense, Vulnerability | Comments (0)