Category social media

‘Is That Really You Typing?  New Pentagon Technology Will Know’; But, Beware Of Over-Reliance, Or over-Confidence In This Technique — Only The Digital Shadow…….Really Knows

‘Is That Really You Typing?  New Pentagon Technology Will Know’; But, Beware Of Over-Reliance, Or over-Confidence In This Technique — Only The Digital Shadow…….Really Knows   http://www.fortunascorner.com        Mohana Ravindranath had an article last week by NextGov.com, and posted on the national security website, DefenseOne.com, with the title above.  He begins, “in its quest to drop […]

U.S. Special Operations Commander Says LEAKS To New York Times Are The Reason Islamic State Leader Abu Bakr al-Baghdadi Escaped U.S. Forces And Is Likely Still Alive

U.S. Special Operations Commander Says LEAKS To New York Times Are The Reason Islamic State Leader Abu Bakr al-Baghdadi Escaped U.S. Forces And Is Likely Still Alive http://www.fortunascorner.com      General Raymond ‘Tony’ Thomas, Commander, U.S. Special Operations Command (USSOCOM), told an audience at the Aspen Security Forum last week, that Islamic State leader Abu […]

Moscow’s Cyber-Defense How The Russian Government Plans To Protect The Country From The Coming Cyber War

Very long, but interesting read.  Definitely worth the time.  RCP, fortunascoirner.com Excerpt: “This is just the demo version of a future large-scale cyberwar,” concludes Group-IB’s report on WannaCry. “It’s become clear how vulnerable the modern world is to digital weapons from the arsenals of intelligence agencies and cyber-armies, when they fall into other hands. Unfortunately, […]

If You Have An Apple IPhone/iPad, Etc. – Upload Security Patch NOW!

Update Your Apple Devices. Right Now. By Brian Fung, www.washingtonpost.com View Original July 20th, 2017 Apple has released a software update to iOS and macOS that you should download right away. The security update patches a dangerous vulnerability in WiFi chips that allows hackers to “execute arbitrary code” — industry-speak for taking over your device. Through the WiFi chip, a hacker may […]

Staying Secret in The Age Of Social Media

Staying Secret in The Age Of Social Media thecipherbrief.com · July 19, 2017 July 19, 2017 | Mark Kelton Mark Kelton Former Deputy Director for Counterintelligence, CIA National Clandestine Service Intelligence officers must often use a false identity – a legend or cover. How has social media and digital technology changed how they create and preserve these cover […]

How Hostile Spies Study Social Media to Crack CIA Cover, Spot Likely Agents

How Hostile Spies Study Social Media to Crack CIA Cover, Spot Likely Agents thecipherbrief.com · July 19, 2017 July 19, 2017 | Daniel Hoffman The Newsletter Get exclusive analysis delivered to your inbox daily. subscribe now Daniel Hoffman Former Chief of Station, Central Intelligence Agency Intelligence officers’ tradecraft is highly guarded for good reason. One of its most […]

When The NSA Spots A Crack In Commercial Software – Should It Tell?

When The NSA Spots A Crack In Commercial Software – Should It Tell? thecipherbrief.com · July 14, 2017 One of the only tasks the U.S. Constitution declares that the federal government must do is to provide for the common defense. That is the government’s foundational truth and purpose; to protect American lives, liberty, and their pursuit […]

2017 Black Hat Security Pros Expect Major Breaches In 2018/2019; Attendees Predict That A Major Compromise Of U.S. Critical Infrastructure Will Occur In The Next Two Years;  And, Some Potential Cyber Threats They Did Not Address

2017 Black Hat Security Pros Expect Major Breaches In 2018/2019; Attendees Predict That A Major Compromise Of U.S. Critical Infrastructure Will Occur In The Next Two Years;  And, Some Potential Cyber Threats They Did Not Address http://www.fortunascorner.com      Tim Wilson, Editor-In-Chief of the cyber security website — DarkReading.com — had a July 6, 2017 article based […]

Russian Hand In This Week’s Cyber Pandemic? Petya Ransomware May Be Linked To Russia

https://www.wired.com/story/petya-ransomware-ukraine/ PETYA RANSOMWARE EPIDEMIC MAY BE SPILLOVER FROM CYBERWAR Ukrainian flag on Independence Square in Kiev. SERGEI SUPINSKY/GETTY IMAGES WHEN A RANSOMWARE outbreak exploded from Ukraineacross Europe yesterday, disrupting companies, government agencies, and critical infrastructure, it at first appeared to be just another profit-focused cybercriminal scheme—albeit a particularly vicious and damaging one. But its origins in Ukraine […]

The Pentagon’s New Algorithmic-Warfare Team

Conclusion: It is clear that algorithmic warfare is developing now. Governments, industry, academia, and civil society should all be pursuing ways to secure war-algorithm accountability. The Pentagon’s New Algorithmic-Warfare Team By Dustin Lewis, www.lawfareblog.com View Original June 26th, 2017 In April 2017, the Pentagon created an “Algorithmic Warfare Cross-Functional Team,” pending a transfer of $70 million from Congress. The premise […]