Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

Hacking, IO Multinational, IO Secrets, IO Sense-Making, Military, Peace Intelligence
0Shares
Marcus Aurelius Recommends

Army Times article, second below, reports what the beginning of what I expect will be a major decline in functionality of Army computer systems.  While some sort of institutional response to the alleged Wikileaks traitor, Specialist Bradley Manning, is appropriate, I don't think this is it.  This is a simplistic approach, the sort of thing the KGB did and presumably the sort of the SVR continues to do.

By the way, IMHO, 91K classified documents on the Internet is not some sort of an inadvertent security violation.  It's almost certainly one of the national security crimes; I think it's treason. Better to concentrate on the perpetrator — try him, convict him, and then, maybe, violate in some significant ways his Constitutional protection against “cruel and unusual punishment” as a highly visible deterrent against espionage.

NOTE:  Image links to source generally as persistent link not available.

Below the line: PBI comment and cyber-security recap (34).

Phi Beta Iota: Treason inspires strong feels among patriots.  Unfortunately, we spend too much time focusing on micro-treason (leaking documents for whatever reason) and not enough time on macro-treason (betrayal of the public trust by elected and appointed officials).  Beyond that is the matter of C4I complexity and integrity.  Since 1994 the US Army has been on the wrong track, and the DoD Grid is dead on arrival.  A commercial multinational grid is evolving that is vastly superior to what the US Army persists on using–unaffordable, non-interoperable, easily jammed or confused spectrum, etcetera.  Top-down security is an oxymoron.  Security in the 21st century is not about stopping leaks–it is about acting honorably and intelligently in the first place, making leaks both less likely and largely irrelevant.  IOHO.

See Also:

1994 Brief to the National Research Council Review of the Army Multi-Billion Dollar Future Communications Architecture

1994 Sounding the Alarm on Cyber-Security

1995 National Information Strategy 101 Presentation to CENDI/COSPO*

2004 General Accountability Office (GAO) Report: Defense Acquisitiions: The Global Information Grid and Challenges Facing Its Implementation

2006 Briefing to the Coalition Coordination Center (CCC) Leadership at the U.S. Central Command (USCENTCOM)–Multinational Intelligence: Can CENTCOM Lead the Way? Reflections on OSINT & the Coalition

2006 General Accountability Office (GAO) Defense Acquisitions DoD Management Approach and Processes Not Well-Suited to Support Development of Global Information Grid

2009 Defense Science Board Report on Creating an Assured Joint DoD and Interagency Interoperable Net-Centric Enterprise

2009 Homeland Security Today: Vet with a Vision

2009 Intelligence for the President–AND Everyone Else

2009 Perhaps We Should Have Shouted: A Twenty-Year Restrospective

Graphic: Open Everything

Journal: Cyber-Security Etc. & Multinational Engagement

Journal: Cyber-Security or Cyber-Scam? Plus Short List of Links to Reviews and Books on Hacking 101

Journal: Cyber-War, Cyber-Peace, Cyber-Scam

Journal: DoD Mind-Set Time Lags Most Fascinating

Journal: Government Information Policy & Security Not Favoring the Public

Journal: Pentagon as VERY Slow Learner….

Journal: Pentagon Flails in Defending Cyberspace

Journal: Politics & Intelligence–Partners Only When Integrity is Central to Both

Journal: To “Win” the Cyber War, Start with a Brain

Reference: Are Hackers Pioneers with the Right Stuff or Criminal Pathological Scum? Mitch Kabay Reprises

Reference: Earth Intelligence Network Concept for Execution

Reference: Joe Nye on Cyber-Power

Reference: National Cyber Security Research and Development Challenges Related to Economics, Physical Infrastructure and Human Behavior

Review: Computer-Related Risks

Review: Cybershock–Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption

Review: INFORMATION WARFARE–Chaos on the Electronic Superhighway

Review: Pearl Harbor Dot Com

Review: Terminal Compromise

Review: The World Is Open–How Web Technology Is Revolutionizing Education

Robert Ackoff on Doing Right Things Righter

Search: “the central problem of our time” Steele

Search: InfoOps (Information Operations (IO))

Search: The Future of OSINT [is M4IS2-Multinational]

Financial Liberty at Risk-728x90




liberty-risk-dark