Britain prepared to use air strikes or send in troops as retaliation against future cyber attack

A strike on UK systems “could invite a response from any domain – air, land, sea or cyberspace”, said the Defence Secretary

 

Britain could launch military retaliation such as air strikes against a future cyber attack, the Defence Secretary has suggested.

Sir Michael Fallon warned potential attackers that a strike on UK systems “could invite a response from any domain – air, land, sea or cyberspace”.

The Defence Secretary said the UK’s ability to carry out its own cyber attacks against Islamic State in Iraq and Levant (Isil), also known as Daesh, had saved lives during the battle for Mosul in Iraq and the capability was also being used in the fight for Raqqa in Syria. Continue reading

London on standby for multiple terror strikes

POLICE and special forces troops have been told to prepare for up to 10 simultaneous terror attacks on the streets of London.

The National Crime Agency has been ordered to make a crackdown on firearms a priority amid fears of a Paris-style attack by terrorists returning from Syria. Continue reading

Delta Force: Speed, Surprise and Violence of Action

130808-F-TF218-957

The most secretive of all the Special Operations forces, Delta Force, like the Air Force Special Ops shown here, often works under cover of darkness. STAFF SGT. EMERSON NUÑEZ/U.S. AIR FORCE. INSET: U.S. ARMY

 

Detachment Delta. The CAG—Combat Application Group. ACE—the Army Compartmented Element. Or simply “The Unit.” No matter what you call Delta Force, the U.S. Army’s first and most effective counterterrorism force has been silently protecting America and its allies since the late 1970s, when an upswing in terrorist activity such as bombings and hijackings led the military to create its own elite task force based on the British Special Air Service (SAS). Continue reading

Close military encounters between Russia and the west ‘at cold war levels’

Report lists 40 cases of ‘brinkmanship’, including near-collision between Russian spy plane and passenger jet, in past eight months

Close military encounters between Russia and the west have jumped to cold war levels, with 40 dangerous or sensitive incidents recorded in the past eight months alone, according to a new report published on Monday.

The report, Dangerous Brinkmanship by the European Leadership Network, logs a series of “highly-disturbing” incidents since the Ukrainian crisis began earlier this year, including an alarming near-collision between a Russian reconnaissance plane and a passenger plane taking off from Denmark in March with 132 passengers on board.

What made the incident especially dangerous was that the Russian plane did not have on its transponders, the usual method of signalling its presence to other aircraft.

The encounters have taken place mainly around the Baltic Sea but also in the Black Sea and along the US and Canadian borders. Continue reading

Princess Diana assassination plot claim soldier spoke to wife of ‘hit’ after SAS gave Prince William driving lessons

Other related articles of interest:

EXCLUSIVE: SAS’s lamping unit ‘used laser to dazzle Princess Diana’s driver’

DONAL MACINTYRE INVESTIGATION: ‘Spies taped Diana’s crash and bugged her phone’

A face encounter with Prince William prompted an SAS soldier to make the extraordinary claim that Princess Diana was murdered by a member of the elite unit.

After taking William on an SAS advanced ­driving course in 2008, the former sniper, known only as Soldier N, went home and confided to his wife that Diana was assassinated in an alleged plot.

He calmly told his wife that she was killed when a bright light was shone into the Paris tunnel ­moments before the crash. Continue reading

SAS hunting Syrian missiles as Allies prepare for bombing blitz

British special forces were last night hunting Syrian missiles in readiness for Allied strikes which could start as early as tomorrow night.

Cruise missile attacks and RAF raids are expected in response to the Assad regime’s use of chemical weapons. Continue reading

This Is Not a Test: Emergency Broadcast Systems Proved Hackable

As was written in a book ahead of it’s time (1987), “Spetsnaz. The Story Behind the Soviet SAS”, has now come to fruition.

The following is a sample from the book:

I do not know how or when World War Three will start. I do not know exactly how the Soviet high command plans to make use of spetsnaz in that war: the first world war in which spetsnaz will be a major contributor. I do not wish to predict the future. In this chapter I shall describe how spetsnaz will be used at the beginning of that war as I imagine it. It is not my task to describe what will happen. But I can describe what might happen.

The last month of peace, as in other wars, has an almost palpable air of crisis about it. Incidents, accidents, small disasters add to the tension. Two trains collide on a railway bridge in Cologne because the signalling system is out of order. The bridge is seriously damaged and there can be no traffic over it for the next two months.

On 12 August, at 0558 local time, a van comes to a halt on the vast empty parking lot in front of a supermarket in Washington. Three men open the doors of the van, roll out the fuselage of a light aircraft and attach its wings. A minute later its motor bursts into life. The plane takes off and disappears into the sky. It has no pilot. It is controlled by radio with the aid of very simple instruments, only slightly more complicated than those used by model aircraft enthusiasts. The plane climbs to about 200 metres and immediately begins to descend in the direction of the White House. A minute later a mighty explosion shakes the capital of the United States. The screaming of sirens on police cars, fire engines and ambulances fills the city.

Three minutes later a second plane sweeps across the centre of the city and there is a second explosion in the place where the White House once stood. The second plane has taken off from a section of highway under construction, and has a quite different control system. Two cars with radio beacons in them have been left earlier in the middle of the city. The beacons have switched on automatically a few seconds before the plane’s take-off. The automatic pilot is guided by the two beacons and starts to descend according to a previously worked-out trajectory. The second plane has been sent off by a second group operating independently of the first one.

It was a simple plan: if the first plane did not destroy the White House the second would. If the first plane did destroy the White House then a few minutes later all the heads of the Washington police would be near where the explosion had taken place. The second plane would kill many of them.

At 0606 all radio and television channels interrupt their normal programmes and report the destruction of the White House and the possible death of the President of the United States.

At 0613 the programme known as Good Morning America is interrupted and the Vice-President of the USA appears. He announces a staggering piece of news: there has been an attempt to seize power in the country on the part of the leaders of the armed forces. The President of the United States has been killed. The Vice-President appeals to everyone in the armed forces to remain where they are and not to carry out any orders from senior officers for the next twenty-four hours, because the orders would be issued by traitors shortly to be removed from their posts and arrested.

Soon afterwards many television channels across the country cease transmitting….

Article:

Several models of Emergency Alert System decoders, used to break into TV and radio broadcasts to announce public safety warnings, have vulnerabilities that would allow hackers to hijack them and deliver fake messages to the public, according to an announcement by a security firm on Monday.

The vulnerabilities included a private root SSH key that was distributed in publicly available firmware images that would have allowed an attacker with SSH access to a device to log in with root privileges and issue fake alerts or disable the system. Continue reading