Cyber Weapon Experts: US Air Force Wants You
The US Air Force (USAF) has made a public appeal for tech experts to help design cyber weapons. The call for help comes in a solicitation document, which is a formal request for non-military organizations to submit ideas.
To encourage a response, the Air Force has announced that it could award contracts worth a total of $10 million.
The document asks for ideas that could help the USAF "disrupt, deny, degrade, destroy, or deceive an adversary's ability to use the cyberspace domain to his advantage."
It specifically refers to using cyber technology to weaken an enemy's ability to wage physical, non-virtual warfare. (Source: fbo.gov)
Air Force: Help Us Compromise Enemy Systems
The Air Force is open to all ideas but it's especially interested in tools that could be used to:
- Infiltrate an enemy's computer systems;
- Manipulate enemy data;
- Take offline an enemy's operating systems and other computer resources.
The document also suggests bidders could develop communications tools that provide allies with "near real-time effectiveness feedback" about a military situation.
As you'd expect, the Air Force is warning against sending any ideas by email or fax. Officials suggest bidders send sensitive material by United States Postal Service registered mail.
For now, bidders should supply only an outline of the concept they would like to develop. Officials will review submissions and may ask some bidders to prepare more detailed proposals.
Military Cyber Policy Evolves from Defense to Offense
Previous instances in which the US military has sought out cyber experts have concentrated on defensive rather than offensive cyber technologies. This new solicitation seems to represent a step forward in military thinking about cyberspace.
Military sources have confirmed the US used cyber attacks as part of its military operations in Afghanistan. There have also been credible but unconfirmed reports the US government was behind the Stuxnet virus that caused a malfunction in Iranian nuclear equipment. (Source: computerworld.com)
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.