Reference: Logistics Oversight as an Information Operations (IO) Mission

David Isenberg Posted: December 21, 2010 11:59 PM Huffington Post Can’t Anyone at DoD Do Oversight? Anyone at All? The perennial issue regarding private military security contractors is the degree to which they are subject to effective oversight. In that regard there is only one item in today’s news worth looking at. That is the …

Journal: NSA Assumes It Has Been Compromised…Correct!

U.S. Code-Cracking Agency Works As If Compromised. The U.S. government’s main code-making and code-cracking agency now works on the assumption that foes may have pierced even the most sensitive national security computer networks under its guard. “There’s no such thing as ‘secure’ any more,” Debora Plunkett of the National Security Agency said on Thursday amid …

Undersea Cables: The Achilles Heel of our Economies

Franz-Stefan Gady Foreign policy analyst, EastWest Institute Huffington Post, Posted: December 21, 2010 02:20 PM In December 2008 within milliseconds, Egypt lost 70 percent of its connection to the outside Internet. In far away India, 50 to 60 percent of online connectivity similarly was lost. In Pakistan, 12 million people were knocked offline suddenly, and …

Journal: Cyber-Idiocy Wipes Out Productivity

Information has never been so free. Even in authoritarian countries information networks are helping people discover new facts and making governments more accountable. — US Secretary of State Hillary Clinton, January 21, 2010 So much for that…. Military Bans Disks, Threatens Courts-Martial to Stop New Leaks By Noah Shachtman, Wired, December 9, 2010  |  7:02 …

Graphic: Cyber-Threat 101

As first used in a briefing to the National Security Agency conference in Las Vegas, 9 January 2002. 2002 The New Craft of Intelligence–What Should the T Be Doing to the I in IT? See Also: Journal: Army Industrial-Era Network Security + Cyber-Security RECAP (Links to Past Posts)