2011 Cyber-Command or IO 21 + IO Roots

Briefing  (28 Slides) Version 3.2 (Notes As Delivered) Open Source Intelligence (OSINT) Starting Point 2009 DoD OSINT Leadership and Staff Briefings Below the Line: Unclassified Impressions & Questions, Three Books on Truth, Past OSINT and IO References with Emphasis on Multinational Sharing and Sense-Making

Officer’s Comment on Education vs. Sock Puppetry

Pre-quel America’s absurd stab at systematising sock puppetry Promising mid-career officer’s comments: Have you seen this?  Passing off DoD-sponsored “sock puppets” as Information Operations (IO) is ridiculous on its face, as it is a waste of time, tax-payer dollars, and once again represents a one-off, niche contractor hardware/software solution that will show not only no …

Search: cyber warfare center, structure

Strategic Cybercom is intended to integrate and coordinate DOD cyber defenses that previously were based in the individual military services.  Led by Army Gen. Keith Alexander, Cybercom also oversees offensive cyber capabilities, and that involves developing weapons and the doctrine that governs when and how those weapons can be used. When he took command of …

Assisi-Rome 2nd Meeting

The first meeting, in Assisi on Saturday 22 January 2011, was off the record.  The letter is in the Franciscan Order’s hands.  The third meeting, with a major trans-Europe foundation, is off the record until the Secretary-General obtains approval to proceed with broad dissemination of the letter. The second meeting, arranged by Sergio Germani, was …

Journal: NSA Assumes It Has Been Compromised…Correct!

U.S. Code-Cracking Agency Works As If Compromised. The U.S. government’s main code-making and code-cracking agency now works on the assumption that foes may have pierced even the most sensitive national security computer networks under its guard. “There’s no such thing as ‘secure’ any more,” Debora Plunkett of the National Security Agency said on Thursday amid …