392:
184:
were found with pre-installed, weaponized malware which was capable of exfiltrating CRM data and financial data. These scanners are of the type used by many United States retailers and warehouses, as well as delivery services such as
164:, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories, such as a computer monitor or keyboard cables with hidden wireless transmitters bugs built-in for eavesdropping on video and
327:
372:
294:
44:
interdiction. The former refers to operations whose effects are broad and long-term; tactical operations are designed to affect events rapidly and in a localized area.
350:
319:
227:
364:
301:
22:
is interception of an object prior to its arrival at the location where it is to be used in military, espionage, and law enforcement.
148:
group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load
153:
198:
36:
In the military, interdiction is the act of delaying, disrupting, or destroying enemy forces or supplies en route to the
433:
252:
278:
161:
342:
194:
136:(domestic or foreign) for the purpose of implanting bugs before they reach their destination. According to
157:
145:
300:. Australian Government - Department of Immigration and Citizenship. 2010. p. 152. Archived from
452:
219:
129:
462:
426:
186:
72:
31:
8:
365:"Malware Hidden In Chinese Inventory Scanners Targeting Logistics and Shipping Companies"
133:
457:
407:
419:
274:
165:
90:
94:
59:
41:
156:
remote access. The report also indicates that the NSA, in collaboration with the
104:
403:
446:
177:
66:
241:
318:
Appelbaum, Jacob; Horchert, Judith; Stöcker, Christian (29 December 2013).
193:. The scanned data was copied and sent out to an established comprehensive
108:
139:
112:
100:
399:
76:
152:
onto the electronics or install malicious hardware that can give
149:
197:
connection (CnC) to a
Chinese botnet that was terminated at the
37:
190:
181:
391:
132:
when an electronics shipment is secretly intercepted by an
320:"Catalog Reveals NSA Has Back Doors for Numerous Devices"
343:"China-Made Handheld Barcode Scanners Ship with Spyware"
317:
40:
area. A distinction is often made between strategic and
176:
In July 2014 it was reported that handheld shipping
444:
427:
242:"Joint Publication 3-03 - Joint Interdiction"
137:
434:
420:
128:The term interdiction is also used by the
220:"Air Interdiction--Focus For The Future"
273:(first ed.). Osprey. p. 164.
445:
340:
217:
99:The term interdiction is also used in
268:
386:
199:Shandong Lanxiang Vocational School
52:In different theaters of conflict:
13:
330:from the original on Jun 13, 2024.
258:from the original on Aug 15, 2021.
84:
16:Interception while en route to use
14:
474:
375:from the original on Jan 1, 2020.
353:from the original on Mar 1, 2024.
230:from the original on Oct 7, 2022.
390:
123:
357:
334:
311:
287:
262:
234:
211:
1:
341:Scharr, Jill (15 July 2014).
249:Intelligence Resource Program
204:
406:. You can help Knowledge by
118:
7:
25:
10:
479:
385:
88:
29:
271:A Dictionary of Aviation
269:Wragg, David W. (1973).
218:Snider, John A. (1990).
171:
154:US intelligence agencies
47:
295:"Annual report 2009-10"
62:or Interdiction bombing
402:-related article is a
138:
107:, such as in the U.S.
187:United Parcel Service
73:Maritime interdiction
32:Line of communication
251:. 9 September 2016.
195:command and control
134:intelligence agency
224:globalsecurity.org
201:located in China.
415:
414:
369:Supply Chain 24/7
91:Drug interdiction
470:
453:Military tactics
436:
429:
422:
394:
387:
377:
376:
371:. 10 July 2014.
361:
355:
354:
338:
332:
331:
315:
309:
308:
306:
299:
291:
285:
284:
266:
260:
259:
257:
246:
238:
232:
231:
215:
180:manufactured in
143:
95:Supply reduction
60:Air interdiction
478:
477:
473:
472:
471:
469:
468:
467:
443:
442:
441:
440:
383:
381:
380:
363:
362:
358:
339:
335:
316:
312:
304:
297:
293:
292:
288:
281:
267:
263:
255:
244:
240:
239:
235:
216:
212:
207:
174:
126:
121:
105:law enforcement
97:
87:
85:Law enforcement
50:
34:
28:
17:
12:
11:
5:
476:
466:
465:
463:Military stubs
460:
455:
439:
438:
431:
424:
416:
413:
412:
395:
379:
378:
356:
333:
324:SPIEGEL ONLINE
310:
307:on 2014-02-13.
286:
279:
261:
233:
209:
208:
206:
203:
178:image scanners
173:
170:
125:
122:
120:
117:
86:
83:
82:
81:
80:
79:
69:
63:
49:
46:
27:
24:
15:
9:
6:
4:
3:
2:
475:
464:
461:
459:
456:
454:
451:
450:
448:
437:
432:
430:
425:
423:
418:
417:
411:
409:
405:
401:
396:
393:
389:
388:
384:
374:
370:
366:
360:
352:
348:
344:
337:
329:
325:
321:
314:
303:
296:
290:
282:
280:9780850451634
276:
272:
265:
254:
250:
243:
237:
229:
225:
221:
214:
210:
202:
200:
196:
192:
188:
183:
179:
169:
167:
163:
159:
155:
151:
147:
142:
141:
135:
131:
124:United States
116:
114:
110:
106:
102:
96:
92:
78:
74:
70:
68:
67:No-drive zone
64:
61:
57:
56:
55:
54:
53:
45:
43:
39:
33:
23:
21:
408:expanding it
397:
382:
368:
359:
346:
336:
323:
313:
302:the original
289:
270:
264:
248:
236:
223:
213:
175:
144:, the NSA's
127:
109:War on Drugs
98:
51:
35:
20:Interdiction
19:
18:
347:Tom's Guide
140:Der Spiegel
113:immigration
101:criminology
447:Categories
205:References
166:keylogging
89:See also:
30:See also:
458:Espionage
119:Espionage
400:military
373:Archived
351:Archived
328:Archived
253:Archived
228:Archived
77:Blockade
65:Ground:
42:tactical
26:Military
150:malware
111:and in
277:
38:battle
398:This
305:(PDF)
298:(PDF)
256:(PDF)
245:(PDF)
191:FedEx
182:China
172:China
71:Sea:
58:Air:
48:Types
404:stub
275:ISBN
189:and
160:and
103:and
93:and
162:FBI
158:CIA
146:TAO
130:NSA
75:or
449::
367:.
349:.
345:.
326:.
322:.
247:.
226:.
222:.
168:.
115:.
435:e
428:t
421:v
410:.
283:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.