Berto Jongman: Interesting National Security Headlines

Book Review – Truth And Consequences: The U.S. vs. Bradley Manning French Cyber-Strategy GPS with Soul Hacktivism at Risk Integral Leadership Rosetta Stone Kony 2012 White Savior Industrial Complex Magnetic Pole Reversal Has Started – Will Take a Thousand Years Malware Proliferation Estimates PDF: Carnage Interrupted: An Analysis of Fifteen Terrorist Plots Against Public Surface …

DefDog: The infamous ‘take down the Internet in 30 minutes’ hearing from 1998 — Tens of Billions Later, NSA and OMB Have Not Done Their Jobs, US Cyber is Wide Open and Unsafe at Any Speed + Meta-RECAP

This is the famous hearing where Mudge told senators he could K-O the Internet in 30 minutes. It was a wide-ranging discussion, though Mudge’s claim is what the media ran with at the time. Watch and ask yourself, as Trustwave’s Tom Brennan does on his Facebook page this morning: “14 Years… have we gotten better?” …

Marcus Aurelius: Richard Clarke Sounds Off on Cyber-Stuff

  Richard Clarke on Who Was Behind the Stuxnet Attack America’s longtime counterterrorism czar warns that the cyberwars have already begun—and that we might be losing By Ron Rosenbaum Smithsonian magazine, April 2012 EXTRACT: I had come to talk to him about what’s been done since the urgent alarm he’d sounded in his recent book, …

Berto Jongman: Various National Security Contributions

Brief History of Hactivism Bruce-Hoffman Super-Author per Routledge Cyber Articles from Routledge 2012 Cybercrime Dominated By Organized Gangs, Academic Study Finds Engineers rebuild HTTP as a faster Web foundation Militarization of Cyber-Security Social Networking Risks Terrorism as Manageable Risk US counterterrorism policy US outgunned in hacker war VIDEO on Brain Structure War porn: The new …

DefDog: Feds Hype Cyber-Threat, Seek DHS Mandates & Money

Feds Warn of Cyber Threats, Seek Expanded Authority for DHS By Kenneth Corbin March 28, 2012 — CIO — Federal cybersecurity officials on Wednesday gave lawmakers a sobering warning about the vulnerabilities of critical information technology systems across the public and private sectors, describing a laundry list of threats and the challenge of keeping up …

Berto Jongman: Various National Security Online Posts

Al Qaeda’s Network in Iran (per German trial) DoD finalizing rules of engagement for cyber attacks George Clooney’s satellite spies reveal secrets of Sudan’s bloody army Lockerbie Report Slams Courts for Multiple Failures On the Edge Radical Interpretation of US Presidential Order SXSWi: pictures worth a thousand bytes