Category NSA

‘Operation GhostSecret’: North Korea Is Suspected in Intensifying Global Cyberattack

David Maxwell Comment:  “The new weapon of choice from north Korea?”   Excerpts: In early March, McAfee identified cyberattacks on Turkish financial institutions and government groups that deployed a “Bankshot” implant that embedded malicious files in Microsoft Word documents sent to victims via email attachment. Computers were infected if users downloaded the attachment.   But […]

Russia Claims It Has A U.S. Tomahawk Cruise Missile And Will Use It To Improve Its Own Weapons

Russia claims it has a US Tomahawk cruise missile and will use it to improve its own weapons By Holly Ellyatt | @hollyellyatt, www.cnbc.com View Original April 25th, 2018 Matthew Daniels/U.S. Navy via Getty Images Russia has gotten its hands on an U.S. Tomahawk cruise missile and it’s going to study it to improve its own weapon […]

The OSS, 9/11 & Gina Haspel: Intelligence Under Fire

The OSS, 9/11 & Gina Haspel: Intelligence Under Fire thecipherbrief.com · by Alex Bolling Alex Bolling Former CIA Chief of Station Just weeks after the attacks of 9/11, a flatbed truck was parked unceremoniously in the tree-lined fire lane next to the CIA’s New Headquarters Building, surrounded by furious activity. The team was packing gear on shipping […]

Beating Moscow At Its Main Game: Espionage

Beating Moscow at its Main Game: Espionage thecipherbrief.com Richard BoucherFormer Assistant Secretary of State for South and Central Asia We talk a lot these days about smart power and hard power and soft power even the sharp power of manipulating information. In the end, power and influence have always been exercised in multiple dimensions – […]

CyCon U.S. Call For Papers Is Now Open: Full Paper Submission Deadline Is July 22, 2018

CyCon U.S. Call for Papers is now open Theme: Cyber Conflict during Competition CyCon U.S. seeks technical, legal, political, and military positions and research related to Cyber Conflict during Competition. Important Dates Full Paper Submission Deadline: July 22, 2018 Notification of Paper Acceptance: August 20, 2018 Final Paper Submission Deadline: September 17, 2018 “Inter-state strategic […]

Under Secretary Of Defense For Intelligence: ‘A Lot Of Technology Remains Untapped’

Defense intelligence chief: ‘A lot of technology remains untapped’ – SpaceNews.com spacenews.com · by Sandra Erwin · April 23, 2018 Kernan: Project Maven so far has been “extraordinarily” useful in processing intelligence but more capabilities are needed. TAMPA, FLA. — Undersecretary of Defense for Intelligence Joseph Kernan, a retired Navy vice admiral, is rarely seen or heard at […]

Chinese Money Sows European Disunion: ‘Eastern States Are Being Seduced By The Allure Of Authoritarianism’

https://asia.nikkei.com/Spotlight/Comment/Chinese-money-sows-European-disunion The EU’s consensus-based approach to diplomacy and security makes it difficult to stand up to China, if even one member sides with Beijing.   © AP COMMENT Chinese money sows European disunion Eastern states are being seduced by the allure of authoritarianism   HIROYUKI AKITA, Nikkei commentator April 23, 2018 13:55 JST TOKYO — The […]

Alexa, Tell Me A National Security Secret: Amazon’s Reach Goes Beyond The Post Office

Alexa, Tell Me A National Security Secret: Amazon’s Reach Goes Beyond The Post Office By Brian Naylor, www.npr.org View Original April 23rd, 2018 Amazon has been one of President Trump’s favorite targets on Twitter. He’s accused the company of not collecting taxes (which it does), charged it with putting retailers out of business — and focused his […]

Virtual War And Weapons Of Mass Deception – Modern War Institute

A cautionary conclusion.  Will we heed these words? Sixteenth-century Dutch scholar Desiderius Erasmus noted that “Prevention is better than cure.” Enemies of the United States continue to probe our virtual defenses. Our rivals are building the plans to attack and win in Virtual War so that they can avoid US military overmatch capabilities in physical […]

8 Ways Hackers Monetize Stolen Data

8 Ways Hackers Monetize Stolen Data   http://www.fortunascorner.com      Steve Zurier posted an April 17, 2018 article to the security and technology website, DarkReading.com, with the title above.  We are all well aware that our personal data has likely been compromised many times in the past decade because of the plethora of gaps and vulnerabilities with […]