Journal: Cyber-Security or Cyber-Scam? Plus Short List of Links to Reviews and Books on Hacking 101

Analysis, Collaboration Zones, Communities of Practice, Ethics, InfoOps (IO), Key Players, Mobile, Policies, Real Time, Threats

Full Story Online
Full Story Online

COVER STORY: The Cyberwar Plan  It’s not just a defensive game; cyber-security includes attack plans too, and the U.S. has already used some of them successfully.

by Shane Harris Saturday, Nov. 14, 2009

Full Story Online
Full Story Online

14 tech firms form cybersecurity alliance for government Lockheed Martin, top suppliers launch initiative for government market

By Wyatt Kash  Nov 12, 2009

Phi Beta Iota: It is a scam, big time.  The U.S. does not have–outside of our small number of colleagues in Hackers on Planet Earth and the Silicon Valley Hackers/THINK Conference–the brainpower and cummulative skills to fill the Potemkin Center, much less staff a capability with global reach.

Continue reading “Journal: Cyber-Security or Cyber-Scam? Plus Short List of Links to Reviews and Books on Hacking 101”