After a string of officer firings in the military, Air Force Chief of Staff Gen. Mark Welsh joked that the process for replacements "would include a Google search." US News and World Report
US Air Force To Strengthen Screening Process – By Doing Google Searches -- The Guardian
Officials say changes have nothing to do with Michael Carey, who was relieved from nuclear command role for 'misbehavior'.
The US air force will more carefully screen future candidates for nuclear commander positions as a result of the recent firing of the two-star general overseeing land-based nuclear missiles, the general in charge of the service said Wednesday.
"We're going to add more rigor," General Mark Welsh, the air force chief of staff, told reporters, including the addition of an internet search of the person's name that could turn up any damaging information.
Welsh said the change has nothing to do with the job performance of Major General Michael Carey, a 35-year veteran who was relieved of command last month for unspecified personal misbehavior that other officials said was related to alcohol use.
Read more ....
Update: Air Force Turns to Google for Help Screening Top Generals -- US News and World Report
My Comment: I am sure the Air Force screening process will be more "in depth" than what Google can provide.
1 comment:
Google Project X has 'Classified Servers' that can perform a whole lot more than the ordinary 'Audience Operating System' that is built into the Browser, OS, in-Memory Persistence. Instead of doubting and being dismissive of 'Google Search of Generals' - not any ordinary foot-soldier - it instead needs to be considered with overdue respect and awe.
Secondly... from FireEye...
http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/operation-ephemeral-hydra-ie-zero-day-linked-to-deputydog-uses-diskless-method.html
Recently, we [FireEye] discovered a new IE zero-day exploit in the wild, which has been used in a strategic Web compromise. Specifically, the attackers inserted this zero-day exploit into a strategically important website, known to draw visitors that are likely interested in national and international security policy.
We have identified relationships between the infrastructure used in this attack and that used in Operation DeputyDog. Furthermore, the attackers loaded the payload used in this attack directly into memory without first writing to disk – a technique not typically used by advanced persistent threat (APT) actors. This technique will further complicate network defenders’ ability to triage compromised systems, using traditional forensics methods.
Enter Trojan.APT.9002
If a Deputy Dog can do all that, Enter Operation Sheriff Wolf.
Post a Comment