Berto Jongman: Cyber Counterintellingence – From Theory to Practice

Cyber Counterintelligence: From Theory to Practice Tripwire.com, 5 May 2014 In the previous article, Cyber Intelligence Collection Operations, the types of collection and the types of data that could be obtained were discussed. At the end of the discussion I pointed out that analysts must be critical of the data they evaluate as at any …

Berto Jongman: CYBER – 10 Ways to Kill the Internet — and Information-Sharing Analysis Centers (ISAC)

The bad with the good. The Plan to Kill the Internet Uncovered 10 ways web freedom is being butchered worldwide. LIST ONLY: 1) The Death of Net Neutrality 2) Intelligence Agencies are Manipulating the Internet With Deliberate Disinformation 3) Governments are Paying Trolls to Sway Public Opinion 4) Mainstream News Websites are Killing Comment Sections …

Marcus Aurelius: CYBER School Modeled on RANGER School? But What Is Cyber?

Interesting concept, although I’m not sure how practical it is. Towards a Cyber Leader Course Modeled on Army Ranger School By Gregory Conti, Michael Weigand, Ed Skoudis, David Raymond, Thomas Cook and Todd Arnold Small Wars Journal  | Apr 18 2014 – 11:31am Since 1950, the U.S. Army Ranger School has garnered a well-earned reputation …

Michael Ostrolenk: Cyberlibertarians’ Digital Deletion of the Left

Cyberlibertarians’ Digital Deletion of the Left David Golumbia David Golumbia is an assistant professor of English at Virginia Commonwealth University and author of The Cultural Logic of Computation. Jacobin, 4 December 2013 Technological innovation does not inherently promote the Left’s goals. The digital revolution, we are told everywhere today, produces democracy. It gives “power to the …

Berto Jongman: Cyber-Threats Current & Emerging

Current and Emerging Cyber-Threats Security expert Steve Durbin discusses nation-state espionage and the dangers lurking in cyberspace, and urges organizations to become cyber resilient. QUESTIONS ONLY What should CIOs be most concerned about in Threat Horizon 2016? How can enterprises mitigate nation-state espionage? What threat intelligence-sharing forums should enterprise CIOs be following? What are useful …

Owl: Malaysian Airlines Flight Hijacked via AWACS? Chinese Engineers Renditioned? Update 4 Diego Garcia Redux, Boeing Cyber Hijack

UPDATE 16 Mar 14: Was Malaysia Airlines Flight 370 Redirected to Diego Garcia? and also Is missing Malaysian jet the world’s first CYBER HIJACK? Chilling new theory claims hackers could use a mobile phone to take over the controls UPDATE 15 Mar 14: Malaysia Airline MH370: 9/11-style terror allegations resurface in case of lost plane …

Mini-Me: Cyber Expert: Open Source Intelligence Needs Improvement

Huh? Cyber Expert: Open Source Intelligence Needs Improvement The advantage of cyberspace is the large volume of information it holds,” said Esti Peshin, Director of Cyber Services for IAI, at the Israeli Video Analysis Conference organized by iHLS. Peshin was referring to the intelligence gathering potential of open source intelligence (OSNIT), adding that “on the …