Marcus Aurelius: The Cyber-Dam Break — “Blame It On China” Goes Into High Gear

The Cyber-Dam Breaks Sensitive Army database of U.S. dams compromised; Chinese hackers suspected BY: Bill Gertz The Washington Free Beacon, May 1, 2013 U.S. intelligence agencies traced a recent cyber intrusion into a sensitive infrastructure database to the Chinese government or military cyber warriors, according to U.S. officials. The compromise of the U.S. Army Corps …

Berto Jongman: cyber pearl harbor panel discussion – 22 Years Late

Panel Talks About Detecting, Thwarting Cyber Attack Space Foundation, 04/08/2013 Can the U.S. detect, thwart and respond to a cyber offensive that would leave our nation vulnerable to other, possibly more conventional, offensive efforts? Visions of a “Cyber Pearl Harbor” are forcing decision makers to take steps to avoid such a calamity. Read more.

Berto Jongman: Defense Science Board Report on Baby Steps Toward Resilient Military C4I Systems

Defense Science Board Task Force Report: Resilient Military Systems and the Advanced Cyber Threat EXTRACT After conducting an 18-month study, this Task Force concluded that the cyber threat is serious and that the United States cannot be confident that our critical Information Technology (IT) systems will work under attack from a sophisticated and well-resourced opponent …

John Robb: Cyber-War with China — Wrong Answer (and Robert Steele with Better Answer)

Cyber Deterrence against China? The only route left is an Open Source Approach Is there a way to deter cyber attacks? Yes. Two ways. One takes a moral high ground. I won’t waste any time discussing that option. Why? After flame/stuxnet, and the unilateral escalation of the cyberweapons arms race by the US, that option …

Marcus Aurelius: Badley Manning Merits Execution — What He Did Has Brought DoD Information Handling to Its Knees

(1) Tragic that this is being tried as non-capital case; IMHO, Manning deserves to be executed; (2) for those readers not currently in government and thus not dealing with government computer systems on daily basis, it’s impossible to adequately convey how much Manning’s treachery has cost us in terms of lost functionality, lost access to …

Reference: Top-Notch Report on Chinese Exploitation of US Idiocy & Incompetence

2013 Mandiant_PRC Cyber APT1_Report Phi Beta Iota:  The naive and the unscrupulous emphasis external threats and internal vulnerabilities while glossing over the FACT that this threat was clearly articulated by Winn Schwartau, among others, in 1990, and clearly articulated, in a letter delivered in 1994 to Marty Harris at the National Information Infratructure (NII) reporting …

Chuck Spinney: Panetta’s Phony Doomsday Scenario

Panetta’s Phony Doomsday Scenario Two Questions for the Next Secretary of Defense by FRANKLIN C. SPINNEY CounterPunch, 11 February 2013 EXTRACT Figure 1 places Mr. Panetta’s claim into the context of past defense budgets.  I have aggregated these budgets into the four year totals corresponding to each presidential term since Harry Truman’s second term began …