2015 Robert Steele – Foreword to Stephen E. Arnold’s CyberOSINT: Next Generation Information Access

Stephen E. Arnold, CyberOSINT: Next Generation Information Access (Harrods Creek, KY: Arnold Information Technology, 2015) Memorable URL: http://tinyurl.com/Steele-CyberOSINT Foreword By Robert David Steele In 1986, I was selected from the CIA’s clandestine service to help lead a pilot project to bring the CIA into the 21st Century. From that moment almost 30 years ago, I …

Berto Jongman: Cyber Counterintellingence – From Theory to Practice

Cyber Counterintelligence: From Theory to Practice Tripwire.com, 5 May 2014 In the previous article, Cyber Intelligence Collection Operations, the types of collection and the types of data that could be obtained were discussed. At the end of the discussion I pointed out that analysts must be critical of the data they evaluate as at any …

Jim Dean: Asian Boomerang — China Calls for Security Alliance with Iran and Russia — Changes Dynamics for Afghanistan, Middle East, North Africa

China Calls for Security Alliance with Iran, Russia Editor’s Note: Well, it looks like Obama the Peacemaker image took another hit today. China, which has no overseas military bases and no carrier battle groups sailing the seas to defend its customers, considers itself a target and not a threat. Imagine that! The US “divide and …

Berto Jongman: CYBER – 10 Ways to Kill the Internet — and Information-Sharing Analysis Centers (ISAC)

The bad with the good. The Plan to Kill the Internet Uncovered 10 ways web freedom is being butchered worldwide. LIST ONLY: 1) The Death of Net Neutrality 2) Intelligence Agencies are Manipulating the Internet With Deliberate Disinformation 3) Governments are Paying Trolls to Sway Public Opinion 4) Mainstream News Websites are Killing Comment Sections …

Marcus Aurelius: CYBER School Modeled on RANGER School? But What Is Cyber?

Interesting concept, although I’m not sure how practical it is. Towards a Cyber Leader Course Modeled on Army Ranger School By Gregory Conti, Michael Weigand, Ed Skoudis, David Raymond, Thomas Cook and Todd Arnold Small Wars Journal  | Apr 18 2014 – 11:31am Since 1950, the U.S. Army Ranger School has garnered a well-earned reputation …

Berto Jongman: US National Security Achilles Heel – Electromagnetic Spectrum’s Vulnerability to Being Fried

U.S. National Security’s Achilles Heel – The Electromagnetic Spectrum Over the past four years bills on cybersecurity, Electromagnetic Pulse threats, and other forms of “purposeful interference” with U.S. cyberspace have been introduced only to go nowhere. By now it has been well established that EMP, whether in the form of a Carrington Event of solar origin or the …

Berto Jongman: Cyber-Threats Current & Emerging

Current and Emerging Cyber-Threats Security expert Steve Durbin discusses nation-state espionage and the dangers lurking in cyberspace, and urges organizations to become cyber resilient. QUESTIONS ONLY What should CIOs be most concerned about in Threat Horizon 2016? How can enterprises mitigate nation-state espionage? What threat intelligence-sharing forums should enterprise CIOs be following? What are useful …