Intelligence

COMMENTARY:
Last week yet another call was heard for the need for increased efforts to identify, collect, analyze and disseminate cyber intelligence. This latest call was the result of a recent report that warned the U.S. must develop cyber intelligence as a new and better coordinated government discipline.

How many times does this have to be recommended and justified before we just get it done and done right? Keep reading →

A recently released report provides a glimpse into the true economic impact of the cyber crime wave that has been going on for years.

The 2011 Norton Cyber crime disclosed that over 74 million people in the United States were victims of cyber crime in 2010. These criminal acts resulted in $32 billion in direct financial losses. Keep reading →

COMMENTARY:
The race to keep pace with conventional arms development recently ran head long into the race for cyber dominance–and sustained an eye-opening set-back.

These weapons programs take years to develop and typically cost billions of dollars. But the damage goes far beyond the dollars spent on the program to date. The loss of time in the conventional arms race is perhaps the biggest area of loss and the greatest concern for Defense Department strategic planners. Keep reading →

COMMENTARY:
A new arms race began a few years back and its rapid revolutions will make the cold war era look like a minuscule research project for a white paper!

The new race is to develop offensive, defensive and intelligence collection capabilities for cyber space operations. Keep reading →

COMMENTARY:
Social media is perhaps the greatest tool for mass communication–and for attracting like-minded individuals. That is not new. Back in 2005, for instance, the Journal of International Security Affairs reported on the increased web presence of several major Islamic militias.

Threat intelligence analysis, however, indicates that information and activities within social networking sites is now viewed as one of the primary sources of cyber intelligence on extremist groups and terrorists. Keep reading →

COMMENTARY:
The cyber threats we face today routinely transcend industries, geographic boarders as well as government, military, and business domains. The impact of the aggressive cyber attacks we have witnessed recently, however, have become so substantial that it has now reached priority status in the executive suite.

“C” level executives are now routinely involved when their organizations experience one of these attacks. That is a departure from what we have seen. Keep reading →

The world has become addicted to the Internet and all its vast expanse has to offer. Experts have forecast that in 2014 there will be upwards of 2.5 billion devices connected to the Internet.

Whether you access it via a desktop, laptop, tablet, smartphone, game console or other device the socializing, services and content has addicted all of us. This addiction is why criminals, activists, terrorists and rogue nation states have turned the Internet into a weapon. Keep reading →

Page 3 of 3123