Robert Steele: “I Told You So” — From Elections to Yahoo, Everyone Has Been Grossly Irresponsible on Cyber-Security

The below letter was sent to the White House point person for cyber-security in 1994. I introduced NSA to hackers (they brought two bus-loads to my 1993 conference), co-founded the Information Warfare Conference with Winn Schwartau, and was the opening speaker at Hackers on Planet Earth (HOPE) in 1994. Apart from ignoring us entirely — …

Neal Rauhauser: Cyber-Security Global Knowledge Network

Worth a look. ICS-ISAC and the Global Knowledge Sharing Network Posted on May 20, 2012 by icscybersecurity ICS-ISAC and the Global Knowledge Sharing Network The Industrial Control System Information Sharing and Analysis Center (ICS-ISAC) is part of the Global Knowledge Network (GKN). The Global Knowledge Network has been evolving for a number of years and is …

Josh Kilbourn: US Banks Under Minor Cyber-Attack – Probable Israeli False Flag — Meanwhile US Cyber-Security Largely Vaporware + Meta-RECAP

High Alert! Millions Of Bankers Cant Bank Online. BofA Blames Hackers From Middle East. Bank Cyber Attacks By Iran? Black Monday October 1, 2012? The financial and banking industries are on high alert tonight as a massive cyberattack continues, with potentially millions of customers of Bank of America, PNC and Wells Fargo finding themselves blocked …

DefDog: Deja Vu on Cyber-Security, 25 Years After Terminal Compromise

Deja vu!  Seem to recall Winn Schwartau saying all of this in 1990-1991. The Looming Specter of Cyber Warfare: Deprivations and Social Breakdowns Keeping your finger on the pulse of evolving cyber threats is very difficult as they change so frequently and abruptly. In the following interview, IDGA’s @DefenseInsider explores the current and future landscape …

Cyber-Security Politics, Business, Ethics…

Is it just me, or does it appear that we’re okay with selling our cyber-soul to China (and Russia), as long as we can also blow tens of billions on US firms pretending to do cyber-security? Report: Despite status as U.S. security threat, China’s Huawei partnering with Symantec East-Asia-Intel.com, April 27, 2011 The Chinese telecom …

Reference: US CoC on Cyber-Security

Source Online (26 Pages) Phi Beta Iota: This is interesting at multiple levels.  It demonstrates that the Office of Management and Budget (OMB) endeavor to achieve common solutions is not only not working, but does not properly integrate industry.  It demonstrates that Cyber-Command is off on its own warpath, and not thinking deeply about the …

German Approach to Cyber-Security

News Article 20 Page Report Phi Beta Iota: The German approach differs substantially from that of the US in that it avoids offensive capabilities and the expense of vaporware and sock puppets; it recognizes the importance of cyber-security across all normal elements of government, not just the “national security” zone; it places a very high …

Event: 1-2 June London Cyber-Security Summit

Program as of March 2011 Phi Beta Iota: Those organizing, and those named as confirmed and invited, are the “creme de la creme” of the old regimes.   There isnt’ a hacker, autonomous internet, cloud, anonymous/transparency, open anything participant in the whole lot.  And the youth–by invitation only, as if the organizers have any legitimacy among …

Secrecy News Extract: JASONS on Cyber-Security

JASON:  SCIENCE OF CYBER SECURITY NEEDS MORE WORK “Cyber security is now critical to our survival but as a field of research [it] does not have a firm scientific basis,” according to the Department of Defense.  “Our current security approaches have had limited success and have become an arms race with our adversaries.  In order …

Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)

Army Times article, second below, reports what the beginning of what I expect will be a major decline in functionality of Army computer systems.  While some sort of institutional response to the alleged Wikileaks traitor, Specialist Bradley Manning, is appropriate, I don’t think this is it.  This is a simplistic approach, the sort of thing …

Journal: Cyber-Security Etc. & Multinational Engagement

As attacks increase, U.S. struggles to recruit computer security experts Hackers break Amazon’s Kindle DRM–The great ebook ‘unswindle’ Peace, Justice and the Lord’s Resistance Army Weapons-carrying plane headed for Sri Lanka Phi Beta Iota: It has finally come to pass.  Cyber-security–like the Black Plague before it–and of course the ten high-level threats to humanity so …