Kevin G. Coleman

Underground movements are not uncommon, but the apparent ground swell that has taken place in the cyber underground has caught the attention of traditional and cyber intelligence organizations around the world.

Call them covert, clandestine, black-market – whatever title you choose to put on these activities – the fact remains there is a growing community of underground groups and individuals with diverse missions and objectives. These groups develop and acquire sophisticated cyber weapons that are used in highly targeted attacks against their enemies. Keep reading →

Few people would dispute that the United States is in the cross-hairs when it comes to cyber attacks. After all, the U.S. is the country that is the most dependent on the Internet as a component of our critical infrastructure.

Cyber attacks on our critical infrastructure have evolved over the years and pose a substantial threat that should concern everyone. Keep reading →


The Bipartisan Policy Center produced a report that is getting a fair amount of attention and raising some concerns. The report stated that the number of cyber attacks appears to be on the rise, along with financial losses.

This data was based on information from October 2011 through February 2012. The report indicates, that over 50,000 cyber attacks on private and government networks were reported to the Department of Homeland Security, including 86 attacks on “critical infrastructure networks.” Information also indicated that many private firms keep the fact that they experienced a cyber attack secret “because of fears, some justified, including harm to their reputations and potential loss of customers.” Keep reading →

We have entered a new age of modern conflict. This new age is different from those we have experienced in the past and perhaps even more challenging. The military has dubbed cyber as the 5th domain and have embarked on establishing the capabilities for offensive, defensive and intelligence collection and analysis in this domain.

However, many are attempting to address this threat as they did traditional forms of conflict. Some have gone as far as to compare what has been called a cyber arms race to the cold war. Recent conversations and witnessed actions are cause for concern. Keep reading →

Conventional arms transfers – Exports (US$ millions – 2005; 1990 prices). Refers to the voluntary transfer of weapons destined for the armed forces or intelligence agencies of another country. It includes ships, aircraft, missiles, artillery, armored vehicles and guidance and radar systems. It excludes trucks, services, ammunition, small arms, support items, components and component technology. SOURCE: Stockholm International Peace Research Institute.

The 193 United Nations diplomats are driving a treaty that would be the first legally binding global treaty that would regulate the international arms trade. This treaty is expected to promote transparency and accountability in the arms trade. This is not new! Keep reading →

The big news reverberating through cybersecurity circles last week, reported by the New York Times, that the U.S. was behind the Stuxnet cyber attack on Iranian nuclear enrichments back in 2010 has set off a new firestorm of concern about the likelihood of retaliation.

The news report was based on information provided by “unnamed participants in the program.” In the article it states that the information in the piece was called an “account of the American and Israeli effort to undermine the Iranian nuclear program is based on interviews over the past 18 months with current and former American, European and Israeli officials involved in the program, as well as a range of outside experts.” Keep reading →

In a move that suggests the incendiary impact of malicious software, Iran has now publicly threatened the United States over the Flame malware incident that has gained worldwide attention in recent days.

Flame has been dubbed the “utlimate spy” and for good reason. Iran was the country hit the hardest by the state-of-the-art piece of malware. Keep reading →

It happened again. A number of countries have been hit by what has been called the most sophisticated piece of malware seen to date.

The malware is called Flame – appropriate given the number of computers that have been burned by this latest cyber weapon. Keep reading →

The spirit of necessity has taken hold and U.S. Cyber Command, the National Security Agency (NSA) and even the Department of Homeland Security (DHS) along with the office of the Director of National Intelligence (ODNI) are sharing cyber intelligence with critical infrastructure providers and technology companies in the private sector.

Of course this is done on a case by case basis and there clearly needs to be an identified threat and of course a need to know. Keep reading →

Iranian President Mahmoud Ahmadinejad (L) speaks with foreign minister Ali Akbar Salehi (R) next to a map of Iran at the presidential office in Tehran, Jan. 5, 2012.

Recent incidents in Iran, including cyber attacks against the nation’s pipeline and its refinery infrastructure have embarrassed Iran on the world stage. These latest two attacks are estimated to have had a quarter of a billion dollar financial impact on Iran. Keep reading →

Page 2 of 41234