DefDog: The Hillary Clinton Hack on Al Qaeda That Was Not….

Government, Idiocy, IO Impotency
DefDog

The Hack That Wasn’t: Sec. Clinton and Operation AdWords

Kim Zetter

WIRED, 24 May 2012

When news outlets recently quoted U.S. Secretary of State Hillary Clinton claiming that State Department operatives hacked the websites of al-Qaida affiliates in Yemen, we didn’t know whether to be proud of the feds’ leet skills or appalled at the administration’s hypocrisy regarding hacking.

Turns out the hacks who wrote the stories got it wrong – though Danger Room’s David Axe, who was on the scene, got the story right the first go-around. And now, with the hyped headlines dialed back, we’re just disappointed.

Turns out the team simply purchased anti-al-Qaida ads on the websites to counter anti-American ads the sites were running.

Call it Operation AdWords, if you like.

Clinton was delivering a keynote speech at the Special Operations Command gala dinner in Tampa, Florida, when, as the Associated Press reported, she described how State Department specialists attacked sites tied to al-Qaida, which were trying to recruit new members by “bragging about killing Americans.”

“Within 48 hours, our team plastered the same sites with altered versions of the ads that showed the toll al-Qaida attacks have taken on the Yemeni people,” Clinton said, according to the AP. “We can tell our efforts are starting to have an impact because extremists are publicly venting their frustration and asking supporters not to believe everything they read on the internet.”

The AP rushed out a story with the headline “Hillary Clinton: U.S. Hacked Yemen al-Qaida Sites,” only to revise the story with a more demure headline later, reading “Clinton: US wars with al-Qaida on the web.”

The latter story included new quotes from a State Department official clarifying that the specialist didn’t actually hack the sites. Instead, he said, they challenged extremists in open forums.

Read the rest of this sorry tale.

Patrick Meier: Disaster Response, Self-Organization and Resilience: Shocking Insights from the Haiti Humanitarian Assistance Evaluation

Corruption, Government, IO Impotency, Non-Governmental
Patrick Meier

Disaster Response, Self-Organization and Resilience: Shocking Insights from the Haiti Humanitarian Assistance Evaluation

Tulane University and the State University of Haiti just released a rather damming evaluation of the humanitarian response to the 2010 earthquake that struck Haiti on January 12th. The comprehensive assessment, which takes a participatory approach and applies a novel resilience framework, finds that despite several billion dollars in “aid”, humanitarian assistance did not make a detectable contribution to the resilience of the Haitian population and in some cases increased certain communities' vulnerability and even caused harm. Welcome to supply-side humanitarian assistance directed by external actors.

 

“All we need is information. Why can't we get information?”

A quote taken from one of many focus groups conducted by the evaluators. “There was little to no information exchange between the international community tasked with humanitarian response and the Haitian NGOs, civil society or affected persons / communities themselves.” Information is critical for effective humanitarian assistance, which should include two objectives: “preventing excess mortality and human suffering in the immediate, and in the longer term, improving the community’s ability to respond to potential future shocks.”

This longer term objective thus focuses on resilience, which the evaluation team defines as follows:

Continue reading “Patrick Meier: Disaster Response, Self-Organization and Resilience: Shocking Insights from the Haiti Humanitarian Assistance Evaluation”

Event: 0730-0930 12 June National Press Club Government Executive The Expanding Role of Open Source Information and Social Media

IO Impotency

The Expanding Role of Open Source Information and Social Media for the Intelligence Community

Open source information and social media have caused a huge growth in the amount of data available to the intelligence community. In a budget constrained environment, this information explosion may become a major source for producing intelligence and protecting our nation.  Join us on June 12th as three experts in the fields of open source data and analytics discuss:

  • The role of open source in developing and producing intelligence
  • Impacts of big data, analytics, and civil liberties on open source and social media data
  • Seeing strategic trends and indicators via social media

Speakers Include: 

Continue reading “Event: 0730-0930 12 June National Press Club Government Executive The Expanding Role of Open Source Information and Social Media”

Penguin: Cataloging Wounds of War to Help Heal Them — Not Big Data, Not Small Data, But Rather Integrated “Smart” Data

IO Deeds of War, IO Impotency, IO Sense-Making
Who, Me?

Cataloging Wounds of War to Help Heal Them

By

New York Times,  May 17, 2012

FORT CAMPBELL, Ky. — To those unfamiliar with a battlefield’s bleak routine, Col. Michael D. Wirt’s database could be read like a catalog of horrors. In it, more than 500 American soldiers are subjected to characteristic forms of violence of the Afghan war.

Faces are smacked with shrapnel, legs are blasted away near knees, bullets pass through young men’s abdomens. Vehicles roll over, crushing bones. Eardrums rupture. Digits are severed.

Dozens of soldiers die. Hundreds more begin journeys home, sometimes to treatment that will last the rest of their lives.

Each was listed in a small but meticulous computer entry by Colonel Wirt, a doctor intent on documenting how soldiers were wounded or sickened, how they were treated and how they fared. For those seeking to understand war and how best to survive it, the doctor on his own initiative created an evidence-based tool and a possible model.

His database is one part of a vast store of information recorded about the experiences of American combatants. But there are concerns that the potential lessons from such data could be lost, because no one has yet brought the information together and made it fully cohere.

Continue reading “Penguin: Cataloging Wounds of War to Help Heal Them — Not Big Data, Not Small Data, But Rather Integrated “Smart” Data”

DefDog: CEOs Receive Secret Cyber-Scare Briefing from USG

Corruption, Government, IO Impotency, Military
DefDog

There are some scare tactics in this….while it is possible, I am not convinced that CyberCom has the capabilities, they are pretty noisy in their actions…..and then we have Y2K as a precedent for all talk and no damage.

Cyber Briefings ‘Scare The Bejeezus' Out Of CEOs

AP

Cybersecurity analysts work in the watch and warning center during the first tour of the government's secretive cyberdefense lab intended to protect the nation's power, water and chemical plants, electrical grid and other facilities on Sept. 29, 2011, in Idaho Falls, Idaho.

Published: May 09, 2012

by Tom Gjelten

For the CEOs of companies such as Dell and Hewlett-Packard, talk of cyberweapons and cyberwar could have been abstract. But at a classified security briefing in spring 2010, it suddenly became quite real.

“We can turn your computer into a brick,” U.S. officials told the startled executives, according to a participant in the meeting.

The warning came during a discussion of emerging cyberthreats at a secret session hosted by the office of the Director of National Intelligence and the departments of Defense and Homeland Security, along with Gen. Keith Alexander, head of the U.S. military's Cyber Command.

The meeting was part of a public-private partnership dubbed the “Enduring Security Framework” that was launched at the end of 2008. The initiative brings chief executives from top technology and defense companies to Washington, D.C., two or three times a year for classified briefings. The purpose is to share information about the latest developments in cyberwarfare capabilities, highlighting the cyberweapons that could be used against the executives' own companies.

“We scare the bejeezus out of them,” says one U.S. government participant.

The hope is that the executives, who are given a special one-day, top-secret security clearance, will go back to their companies and order steps to deal with the vulnerabilities that have been pointed out.

“I personally know of one CEO for whom it was a life-changing experience,” says Richard Bejtlich, chief security officer for Mandiant, a cybersecurity firm. “Gen. Alexander sat him down and told him what was going on. This particular CEO, in my opinion, should have known [about the cyberthreats] but did not, and now it has colored everything about the way he thinks about this problem.”

Read full AP article.

Phi Beta Iota:  In fairness to General Alexander, he is making up for decades of dereliction of duty by OMB and his predecessors, but he is also going about it completely wrong, spending tens of billions on secret capabilities that are at best immature and incomplete, while failing to illuminate the battlefield publicly and call for common open source hardware, open source software, and open spectrum that are secure at “root.”  He is completely ignoring the related matter of computational mathematics and mathematical ethics.

DefDog: Bruce Hoffman, the US IC, Bin Laden…Many Contradictions

07 Other Atrocities, 09 Terrorism, Articles & Chapters, Corruption, Government, IO Deeds of War, IO Impotency, Media, Military
DefDog

Bruce is bascially saying that the IC has failed completely…..which we know it has. This also supports my view that the folks who dreamed up the latest air attack are also out of touch with AQ reality. But the media has dumbed down the public enough that they believe almost anything….

The thing I find interesting is that Bruce has openly said that the IC is a failure.  He also raises some questions that would suggest bin Laden was not alive, i.e. the focus on the Arab Spring.  This does not fall into line with UBL as much as it does with Zawahiri….and his Muslim Brotherhood.

As I noted, the fact that someone with Hoffman's stature is questioning the IC should make people pause and reflect on the state of affairs within those halls….

Bruce Hoffman: What Osama Was Thinking at the End

Bin Laden was more fearful that his men might be affected by the weather than by any effort of the Pakistani government to apprehend them.

By releasing 17 documents seized last year from Osama bin Laden's compound in Abbottabad, Pakistan, the U.S. government has supplied a needed corrective to the bunkum that has passed for analysis throughout the war on terrorism's first decade.

For too long, government officials and pundits alike have made extravagant and incorrect claims about the weakness of al Qaeda and the irrelevance of its founding leader.

Continue reading “DefDog: Bruce Hoffman, the US IC, Bin Laden…Many Contradictions”

DefDog: Lockheed Wins Half Billion Cyber Contract

IO Impotency
DefDog

From the guys who brought you the F-35 JSF…….unreal!

Lockheed to provide cyber security support to DOD in $454M contract

Lockheed Martin Corp. will provide the U.S. Department of Defense's    Cyber Crime Center with cyber security support in a contract that will net the company $454 million.

Federal News Radio reports that Lockheed's services will include a range of technical, functional and management support. The Cyber Crime Center provides assistance in the investigation of criminal, counterintelligence and counterterrorism, in addition to cyber security support.

Lockheed Martin, the world's largest defense company by revenue, has operated Albuquerque's Sandia National Laboratories    for the U.S. Department of Energy's    National Nuclear Security Administration since 1993.

Click here to read Lockheed's press release about the contract.

Phi Beta Iota:  In fairness to Lockheed, despite their long history of starting and maintaining the military-industrial complex, 1) they do what the government asks them to do and 2) we are informed by very small business that Lockheed is the only beltway bandit that does not cheat them.  We would also observe that a half billion is a drop in the bucket.  NSA / Cyber-Command are probably wasting upwards from $25 billion a year, money that would be much better spent creating an open source national infrastruture solution along with a Centre for Computational Mathematics — the US Government is severely ignorant in both areas.

See Also:

Mini-Me: General Alexander Wants to Legislate “Critical Systems” IT Security

noble gold