Knowledge

Interdiction

Source đź“ť

392: 184:
were found with pre-installed, weaponized malware which was capable of exfiltrating CRM data and financial data. These scanners are of the type used by many United States retailers and warehouses, as well as delivery services such as
164:, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories, such as a computer monitor or keyboard cables with hidden wireless transmitters bugs built-in for eavesdropping on video and 327: 372: 294: 44:
interdiction. The former refers to operations whose effects are broad and long-term; tactical operations are designed to affect events rapidly and in a localized area.
350: 319: 227: 364: 301: 22:
is interception of an object prior to its arrival at the location where it is to be used in military, espionage, and law enforcement.
148:
group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load
153: 198: 36:
In the military, interdiction is the act of delaying, disrupting, or destroying enemy forces or supplies en route to the
433: 252: 278: 161: 342: 194: 136:(domestic or foreign) for the purpose of implanting bugs before they reach their destination. According to 157: 145: 300:. Australian Government - Department of Immigration and Citizenship. 2010. p. 152. Archived from 452: 219: 129: 462: 426: 186: 72: 31: 8: 365:"Malware Hidden In Chinese Inventory Scanners Targeting Logistics and Shipping Companies" 133: 457: 407: 419: 274: 165: 90: 94: 59: 41: 156:
remote access. The report also indicates that the NSA, in collaboration with the
104: 403: 446: 177: 66: 241: 318:
Appelbaum, Jacob; Horchert, Judith; Stöcker, Christian (29 December 2013).
193:. The scanned data was copied and sent out to an established comprehensive 108: 139: 112: 100: 399: 76: 152:
onto the electronics or install malicious hardware that can give
149: 197:
connection (CnC) to a Chinese botnet that was terminated at the
37: 190: 181: 391: 132:
when an electronics shipment is secretly intercepted by an
320:"Catalog Reveals NSA Has Back Doors for Numerous Devices" 343:"China-Made Handheld Barcode Scanners Ship with Spyware" 317: 40:
area. A distinction is often made between strategic and
176:
In July 2014 it was reported that handheld shipping
444: 427: 242:"Joint Publication 3-03 - Joint Interdiction" 137: 434: 420: 128:The term interdiction is also used by the 220:"Air Interdiction--Focus For The Future" 273:(first ed.). Osprey. p. 164. 445: 340: 217: 99:The term interdiction is also used in 268: 386: 199:Shandong Lanxiang Vocational School 52:In different theaters of conflict: 13: 330:from the original on Jun 13, 2024. 258:from the original on Aug 15, 2021. 84: 16:Interception while en route to use 14: 474: 375:from the original on Jan 1, 2020. 353:from the original on Mar 1, 2024. 230:from the original on Oct 7, 2022. 390: 123: 357: 334: 311: 287: 262: 234: 211: 1: 341:Scharr, Jill (15 July 2014). 249:Intelligence Resource Program 204: 406:. You can help Knowledge by 118: 7: 25: 10: 479: 385: 88: 29: 271:A Dictionary of Aviation 269:Wragg, David W. (1973). 218:Snider, John A. (1990). 171: 154:US intelligence agencies 47: 295:"Annual report 2009-10" 62:or Interdiction bombing 402:-related article is a 138: 107:, such as in the U.S. 187:United Parcel Service 73:Maritime interdiction 32:Line of communication 251:. 9 September 2016. 195:command and control 134:intelligence agency 224:globalsecurity.org 201:located in China. 415: 414: 369:Supply Chain 24/7 91:Drug interdiction 470: 453:Military tactics 436: 429: 422: 394: 387: 377: 376: 371:. 10 July 2014. 361: 355: 354: 338: 332: 331: 315: 309: 308: 306: 299: 291: 285: 284: 266: 260: 259: 257: 246: 238: 232: 231: 215: 180:manufactured in 143: 95:Supply reduction 60:Air interdiction 478: 477: 473: 472: 471: 469: 468: 467: 443: 442: 441: 440: 383: 381: 380: 363: 362: 358: 339: 335: 316: 312: 304: 297: 293: 292: 288: 281: 267: 263: 255: 244: 240: 239: 235: 216: 212: 207: 174: 126: 121: 105:law enforcement 97: 87: 85:Law enforcement 50: 34: 28: 17: 12: 11: 5: 476: 466: 465: 463:Military stubs 460: 455: 439: 438: 431: 424: 416: 413: 412: 395: 379: 378: 356: 333: 324:SPIEGEL ONLINE 310: 307:on 2014-02-13. 286: 279: 261: 233: 209: 208: 206: 203: 178:image scanners 173: 170: 125: 122: 120: 117: 86: 83: 82: 81: 80: 79: 69: 63: 49: 46: 27: 24: 15: 9: 6: 4: 3: 2: 475: 464: 461: 459: 456: 454: 451: 450: 448: 437: 432: 430: 425: 423: 418: 417: 411: 409: 405: 401: 396: 393: 389: 388: 384: 374: 370: 366: 360: 352: 348: 344: 337: 329: 325: 321: 314: 303: 296: 290: 282: 280:9780850451634 276: 272: 265: 254: 250: 243: 237: 229: 225: 221: 214: 210: 202: 200: 196: 192: 188: 183: 179: 169: 167: 163: 159: 155: 151: 147: 142: 141: 135: 131: 124:United States 116: 114: 110: 106: 102: 96: 92: 78: 74: 70: 68: 67:No-drive zone 64: 61: 57: 56: 55: 54: 53: 45: 43: 39: 33: 23: 21: 408:expanding it 397: 382: 368: 359: 346: 336: 323: 313: 302:the original 289: 270: 264: 248: 236: 223: 213: 175: 144:, the NSA's 127: 109:War on Drugs 98: 51: 35: 20:Interdiction 19: 18: 347:Tom's Guide 140:Der Spiegel 113:immigration 101:criminology 447:Categories 205:References 166:keylogging 89:See also: 30:See also: 458:Espionage 119:Espionage 400:military 373:Archived 351:Archived 328:Archived 253:Archived 228:Archived 77:Blockade 65:Ground: 42:tactical 26:Military 150:malware 111:and in 277:  38:battle 398:This 305:(PDF) 298:(PDF) 256:(PDF) 245:(PDF) 191:FedEx 182:China 172:China 71:Sea: 58:Air: 48:Types 404:stub 275:ISBN 189:and 160:and 103:and 93:and 162:FBI 158:CIA 146:TAO 130:NSA 75:or 449:: 367:. 349:. 345:. 326:. 322:. 247:. 226:. 222:. 168:. 115:. 435:e 428:t 421:v 410:. 283:.

Index

Line of communication
battle
tactical
Air interdiction
No-drive zone
Maritime interdiction
Blockade
Drug interdiction
Supply reduction
criminology
law enforcement
War on Drugs
immigration
NSA
intelligence agency
Der Spiegel
TAO
malware
US intelligence agencies
CIA
FBI
keylogging
image scanners
China
United Parcel Service
FedEx
command and control
Shandong Lanxiang Vocational School
"Air Interdiction--Focus For The Future"
Archived

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑