DefDog: John Hamre Gets It Wrong — and Politico Lets Him Slide — “Electronic Pearl Harbor” is Original to Winn Schwartau

The ‘electronic Pearl Harbor’ Eighteen years ago I was the first to use that term publicly. It was the wrong analogy then. Not anymore. The phrase became a touchstone in the long national argument over cybersecurity, for better or worse. I was not the author of the phrase. That honor goes to a dear friend of …

Review: [Time-Based Two-Man Detect & React] Analogue Network Security by Winn Schwartau

Winn Schwartau 6 Stars – Foundation for IT & Web 3.0 Security This book is critical to the post-Western Web 3.0 new Internet and should be translated into Chinese and Russian as soon as possible. This is a Nobel-level piece of work that provides everything that Vint Cerf and Tim Berner-Lee failed to plan for. …

Berto Jongman: cyber pearl harbor panel discussion – 22 Years Late

Panel Talks About Detecting, Thwarting Cyber Attack Space Foundation, 04/08/2013 Can the U.S. detect, thwart and respond to a cyber offensive that would leave our nation vulnerable to other, possibly more conventional, offensive efforts? Visions of a “Cyber Pearl Harbor” are forcing decision makers to take steps to avoid such a calamity. Read more.

Review: INFORMATION WARFARE–Chaos on the Electronic Superhighway

5 Stars Still a Best in Class Endeavor December 1, 2007 Winn Schwartau I continue to believe this is one of the best in class original references. Winn, Peter Black (RIP) and I were among the first to warn of electronic Pearl Harbors, with Winn being the most knowledeable and the only one invited to …

Stephen E. Arnold: Industrial Catastrophic Sabotage Via the Cloud?

Juicy Target: Big Cloudy Agglomerations of Virtual and Tangible Gizmos What’s the implication? Forget Go to My PC vulnerabilities. Old news. The bad actors may have the opportunity to derail certain industrial and manufacturing processes. What happens when a chemical plant gets the wrong instructions. Remember the Port of Texas City mishap? A tragic failure. …

CIA Training Handbook: How to Fake Intelligence Plus Case Study on Faking Russians Hacking US Election

WARNING NOTICE: Exclusively for Directorate of Operations Covert Action Staff (DO/CAS) Employees Identified by Name within Sensitive Compartmented Information (SCI) List FKTRUMP. EXTRACT It is sometimes necessary to fabricate intelligence — to lie to our customer — in order to achieve a necessary strategic effect. There are two general justifications for this form of covert …

Robert Steele: Donald Trump’s Bunker Hill Ronald Reagan Air Traffic Control Moment – Confronting CIA & The Deep State on Russians Hacking the Election (They Did Not) UPDATE 11

I invite readers to use the share buttons to send this to all possible pro-Trump twitter and facebook addresses (the ones that have not been illegally censored). UPDATES at end of this original post. Donald Trump’s Bunker Hill Moment As Donald Trump prepares to hear what I am certain will be carefully constructed lies from …

Robert Steele Answers at Midnight

Short URL: http://tinyurl.com/Steele-Midnight ROBERT STEELE, or for Latinos, Robert David STEELE Vivas, is the embodiment of Truth in our time. A former spy and the founder of the Open Source Intelligence movement in the 1980’s, he has morphed into the leading proponent for Open Source Everything Engineering (OSEE), the focus of our show today. His …

Event: InfoWarCon 2014

Winn Schwartau Brings Back InfowarCon By: Anthony Kimery Homeland Security Today, 09/25/2013 A highly anticipated annual event for many years in the Washington, DC area, the InfowarCon conference is being resurrected by its founder, long-time cybersecurity authority, Winn Schwartau, who launched the event in 1994. Having recently re-acquired the successful conference after being encouraged to “notch …

Marcus Aurelius: Hackers to Attack Feds Over Manning?

Feds involved in Manning prosecution enter hackers’ crosshairs By Aliya Sternstein NextGov, 12/20/2011 A government-hired forensics specialist and an Army investigating officer could face online backlash from WikiLeaks supporters who are unhappy with this week’s prosecution of a U.S. soldier accused of releasing confidential government files to the anti-secrets website, a computer engineer affiliated with …

Robert Steele: Secrecy, Self-Restraint, & Democracy Done in By Elites and “Experts”

The times they are a’ changing.  I was asked to comment on  the recently published Reference: Protecting Sensitive “Open” Information and do so gladly.  The author of that work means well, and there is absolutely nothing wrong with the substance of what he expouses.  It is simply not reasonable nor feasible in context. I know …

Undersea Cables: The Achilles Heel of our Economies

Franz-Stefan Gady Foreign policy analyst, EastWest Institute Huffington Post, Posted: December 21, 2010 02:20 PM In December 2008 within milliseconds, Egypt lost 70 percent of its connection to the outside Internet. In far away India, 50 to 60 percent of online connectivity similarly was lost. In Pakistan, 12 million people were knocked offline suddenly, and …

2008 Annotated Bibliography ELECTION 2008 – Lipstick on the Pig (Full Text Online for Google Translate)

Annotated Bibliography[1] Robert David STEELE Vivas Chapter in ELECTION 2008: Lipstick on the Pig (Earth Intelligence Network, 2008) Anti-Americanism, Blowback, Why the Rest Hates the West Betrayal of the Public Trust Biomimicry, Green Chemistry, Ecological Economics, Natural Capitalism Blessed Unrest, Dignity, Dissent, & the Tao of Democracy Capitalism, Globalization, Peak Oil, & “Free” Trade Run …