The Irish are the masters of drama, over or understatement. Calling a civil war the “Troubles” and this contemplated super spy agency “could cause complications.” Also note the proposed agency would not be “like” CIA or MI6 but “would have responsibility for all elements of security along with military intelligence, the national cyberneticist agency” and other related organisations.” A new meaning for bespoke and what could go wrong?
I can handle the foreign sounding Irish names and words while I read them in an Irish accent in my mind and imagine we are all in a pub having Guinness. Then there are those faces! What is it with these faces across the pond like the one above and the other one this week?
Major complications could arise if Ireland tries to create a “bespoke” security agency similar to the CIA or MI6, Taoiseach Leo Varadkar has warned.
Source: Creating a ‘bespoke’ CIA or MI6 for Ireland could cause complications
Stanley Kubrick’s iconic black comedy Dr. Strangelove remains one of the most insightful works on deterrence. The film revolves around the Doomsday Machine…
Source: Invisible Doomsday Machines: The Challenge of Clandestine Capabilities and Deterrence – War on the Rocks
The Federal Communications Commission (FCC) voted 3-2 on Thursday to dismantle their authorities to enforce net neutrality rules that prohibit internet service providers, such as Verizon, AT&T, and Comcast, from interfering in the traffic streams that take place over their infrastructure.
Source: The End of Net Neutrality: Implications for National Security
Google, Facebook, Apple, and Microsoft all affected by “intentional” BGP mishap.
Source: “Suspicious” event routes traffic for big-name sites through Russia
Iran has conducted several highly damaging cyberattacks and become a major threat that will only get worse
Source: Following the Developing Iranian Cyberthreat
Russian President Vladimir Putin has sought to exploit open and free U.S. cyberspace, which serves as a force multiplier for commerce and freedom of expression, with hacking and discoverable influence operations. Conducting all-source forensics following these Russian attacks on our democratic process, U.S. social media networking sites are in the incident response phase — “to the right of boom.”
Source: Exposing Russian Interference – The Value of Real-Time Forensics
Lucas Kello, The Virtual Weapon and International Order (Yale University Press, 2017) Why do all hackers wear hoodies?
Source: Do Trees Fall in Cyberspace?