Pentagon says WikiLeaks has not contacted them for help
The Pentagon on Wednesday said it had not received any request from the WikiLeaks group to help delete the names of Afghan informants in the 15,000 leaked documents still awaiting publication.
The Pentagon on Wednesday said it had not received any request from the WikiLeaks group to help delete the names of Afghan informants in the 15,000 leaked documents still awaiting publication.
Internet
Aug 4, 2010
1
0
The massive release of secret Pentagon documents by Wikileaks highlights the security challenges of the digital age, when gigabytes of stolen data can be shared in one click, analysts said Monday.
Internet
Jul 26, 2010
0
0
(AP) -- Senators said Thursday they will move cautiously on a new military command to tackle cyberthreats, citing questions about how the U.S. would conduct electronic warfare.
Internet
Apr 15, 2010
1
0
The Air Force says a high-powered laser has destroyed a missile in flight during a test of a national defense system off the California coast.
Engineering
Feb 14, 2010
18
0
A day after the Pentagon acknowledged that Iraqi militants had used cheap software to intercept US drone feeds, a new report on Friday said senior military officials had dismissed that risk in 2004.
Other
Dec 18, 2009
0
0
A team from the Massachusetts Institute of Technology (MIT) has won a 40,000-dollar prize for using social networking tools to identify the locations of 10 large weather balloons in a contest sponsored by the Pentagon's ...
Other
Dec 7, 2009
0
0
Robots in the sky and on the ground are transforming warfare, and the US military is rushing to recruit the new warriors that never sleep and never bleed.
Robotics
Aug 13, 2009
46
0
(AP) -- As the Pentagon warns of the security risks posed by social networking sites, newly released government documents show the military also uses these Internet tools to monitor and react to coverage of high-profile ...
Internet
Aug 10, 2009
0
0
(AP) -- The Pentagon is reviewing the use of Facebook and other social networking sites on its computers with an eye toward setting rules on how to protect against possible security risks.
Internet
Aug 5, 2009
0
0