cyber

Intelligence about the tragedy in Benghazi continues to dribble out very slowly, almost one document at a time. Some of the electronic cables, messages and reproductions of other physical documents have come into view over the past several weeks. Some of these documents were classified, but still found their way to members of Congress and openly reported in the media.

However, one piece of electronic information about security concerns on that fateful day has not received the attention it deserves. Keep reading →

COMMENTARY:
The race to keep pace with conventional arms development recently ran head long into the race for cyber dominance–and sustained an eye-opening set-back.

These weapons programs take years to develop and typically cost billions of dollars. But the damage goes far beyond the dollars spent on the program to date. The loss of time in the conventional arms race is perhaps the biggest area of loss and the greatest concern for Defense Department strategic planners. Keep reading →

COMMENTARY:
A new arms race began a few years back and its rapid revolutions will make the cold war era look like a minuscule research project for a white paper!

The new race is to develop offensive, defensive and intelligence collection capabilities for cyber space operations. Keep reading →

COMMENTARY:
Social media is perhaps the greatest tool for mass communication–and for attracting like-minded individuals. That is not new. Back in 2005, for instance, the Journal of International Security Affairs reported on the increased web presence of several major Islamic militias.

Threat intelligence analysis, however, indicates that information and activities within social networking sites is now viewed as one of the primary sources of cyber intelligence on extremist groups and terrorists. Keep reading →

COMMENTARY:
The cyber threats we face today routinely transcend industries, geographic boarders as well as government, military, and business domains. The impact of the aggressive cyber attacks we have witnessed recently, however, have become so substantial that it has now reached priority status in the executive suite.

“C” level executives are now routinely involved when their organizations experience one of these attacks. That is a departure from what we have seen. Keep reading →