Monthly Archives: August 2015

China And Russia Are Using Hacked Data To Target U.S. Spies; Beijing Will Use Big-Data Mining/Analytics — To ‘Connect-The-Dots’ To Uncover/Expose Operatives — Did Snowden Leak Play A Role In OPM Breach?

China And Russia Are Using Hacked Data To Target U.S. Spies; Beijing Will Use Big-Data Mining/Analytics — To ‘Connect-The-Dots’ To Uncover/Expose Operatives — Did Snowden Leak Play A Role In OPM Breach? www.fortunascorner.com      The title above is from an article in today’s (Aug. 31, 2015) Los Angeles Times, by Brian Bennett and W.J. Hennigan.  […]

Playing Politics With Intelligence Is An Old Game With New Players

tbo.com Playing Politics With Intelligence Is An Old Game With New Players Aug. 30, 2015  5 min read  original Back around 1990, when Lora Griffith was new to the CIA, some of the men who trained her had lingering chips on their shoulders.     It was bitterness over the Vietnam War and how military leaders […]

Killing Abu Ghadiya: The Untold Story Of A Risky Delta Force Mission To Take Out A Senior al Qaeda Militant Inside Syria

Killing Abu Ghadiya The untold story of a risky Delta Force mission to take out a senior al Qaeda militant inside Syria. BY SEÁN D. NAYLOR AUGUST 31, 2015 SEAN.NAYLOR @SEANDNAYLOR http://foreignpolicy.com/2015/ 08/31/deltaforce-seals-syria- iraq-terrorism/ The four helicopters scythed through the air, two Black Hawks full ofDelta Force operators covered by a pair of AH-6 Little Birds, […]

Why U.S. Generals Don’t Want Advisers On The Front Lines In Iraq

Conclusion: Obama lacks a credible policy to support Sunni warriors and leadership backed by U.S. firepower. Our generals are rightly reluctant to avoid commitment in the absence of an achievable political end state and public support. A tactic is not a substitute for a strategy. washingtonpost.com  Read Later Why U.S. Generals Don’t Want Advisers On The […]

Hillary’s Emails: How The Russians, The Chinese . . . And The White House, Have Benefited

Excerpt: The international implications of Hillary’s actions, however, are at least as important as the domestic political implications, and a distinct likelihood exists that they have negatively shaped the turbulent international environment of the past few years. It is highly unlikely that Hillary’s use of private email servers (and her private email account had no […]

The Facebook Model For Taking On Jihadist Groups Online

washingtonpost.com  Read Later The Facebook Model For Taking On Jihadist Groups Online by Steven Stalinsky  Aug. 27, 2015  2 min read  original Steven Stalinsky is executive director of the Middle East Media Research Institute. In meetings with U.S. counterterrorism officials, on Capitol Hill and with journalists, I am asked repeatedly about how Twitter has become a […]

Special Forces Transform Into Hi-Tech ‘Desert Ghosts’ In Stealth Suits As They Hunt Jihadi John

mirror.co.uk by Dan Warburton August 29, 2015 Special Forces Transform Into Hi-Tech ‘Desert Ghosts’ In Stealth Suits As They Hunt Jihadi John Special forces are using state-of-the-art stealth clothing to operate as “desert ghosts” in the hunt for Jihadi John. SAS and other elite snipers are wearing the suits which keep them hidden from sophisticated […]

Sozzled Seducer Who Was Stalin’s Super Spy: Debauched And Indiscreet, Old Estonian — Guy Burgess — Was A very Unlikely KGB Spy; But, That’s What Made Him Deadly

Sozzled Seducer Who Was Stalin’s Super Spy:  Debauched And Indiscreet, Old Estonian — Guy Burgess — Was A very Unlikely KGB Spy; But, That’s What Made Him Deadly   www.fortunascorner.com      Andrew Lownie, writing on the August 28, 2015 edition of London’s TheDailyMailOnline, discusses a new book out on Guy Burgess, one of the “notorious […]

Terrorist And Insurgent Unmanned Aerial Vehicles: Use, Potentials, And Military Implications

The paper can be downloaded directly at this link: http://www. strategicstudiesinstitute. army.mil/pubs/download.cfm?q= 1287 Terrorist And Insurgent Unmanned Aerial Vehicles: Use, Potentials, And Military Implications http://www. strategicstudiesinstitute. army.mil/pubs/display.cfm? pubID=1287 Authored by Dr. Robert J. Bunker. Added August 27, 2015 Type: Monograph 75 Pages Download Format: PDF Cost: Free Send this page to a colleague. Alert me when similar studies […]

The U.S. May Have To Go After The ‘Great Firewall’ To Stop China’s Cyber-Attacks

The U.S. May Have To Go After The ‘Great Firewall’ To Stop China’s Cyber-Attacks by South China Morning Post  Aug. 30, 2015  5 min read  original As the world recalls how two atomic bombs were dropped on Japan to end the second world war in Asia 70 years ago, a digital deterrent of a similar magnitude […]