Bureaucracies and their management (government being the top offender) often act in not very efficient and political manner, and not with the best (hindsight) judgement. Technology and IT system selection and integration are among the worst examples. Notwithstanding the possibility that some essential required capabilities were redacted (illegal could also mean inability to conform with a required legal demand which is also redacted) there is no linkage to 9/11 having been prevented. Ironically, the article is a trailblazer of assumptions and thin on evidence threads and conclusions! It is not like there was no warning at all. At least he got it right on metadata and taxonomies.
Retired Gen. Michael Hayden, former director of the NSA and CIA (and now, a national security analyst at CNN), has recently emerged as a leading critic of the Trump administration, but not so long ago, he was widely criticized for his role in the post-9/11 surveillance abuses.
Source: Hayden, NSA, and the Road to 9/11
There has been growing discussion about the importance of open source information – both in terms of the power and potential of creating and disseminating news and narratives worldwide, whether genuine or fake, and for the pressing need to evolve the open source intelligence (OSINT) discipline. “Devaluing OSINT has become a more significant problem as Russia … Continue reading “Open Source Information: Info Ops’ Untapped Weapon”
Source: Open Source Information: Info Ops’ Untapped Weapon
Can open source information meet most of the knowledge needs of the United States?
Source: Wrapping Intelligence Around the Open Source Whirlwind
Now this is how you fix a glitch. This agency is obsessed with customer satisfaction … “risk to users” used 3 times in 2 sentences. Wow, I am not sure if my geek and Info Architect side is ecstatic or LOL’ing. And so much documentation and explaining: a removal/conversion/disposition glossary, even file formats. All, of course, is because the truth (and details) shall set you free.
But seriously where is the porn? Live free or die!
Source: November 2017 Release of Abbottabad Compound Material
Information in the public domain is capable of meeting most of the knowledge needs we have.
Source: Don’t Waste Tax Dollars on ‘Secrets’ Hiding in Plain Sight
The critics’ bullet-proof “conclusion” while being critical of certainty level arrived “assessments” is also full of “may”s and alternative explanations.
Notwithstanding 9 “may have”s and 16 “likely”s in the Forensicator analysis (ahem non-assessment assessment,) there is nothing contradicting a remote hacker initially copying server data to local computers/mounts to assure future access. Later cross OS fingerprints, time-stamps and forensics can be due to staging or multiple transfers between devices before they got to Wikileaks, or can all be false breadcrumbs and not conclusive by themselves since they are all based on a single source.
That is assuming all other corroborating IP/SSH tracks are also false and all other evidence is orchestrated to create a Guccifer 2.0 persona — which is the main central assumption. And Information warfare on Facebook, Twitter, bots, fake news, active measures … never mind … I almost gave this a Just Nuts grade but thought not!
Mike Pompeo sought “facts” from NSA whistleblower William Binney, who says the 2016 theft of DNC emails was an inside job, not a Russian hack.
Source: CIA Director Met Advocate of Disputed DNC Hack Theory — at Trump’s Request
Alexander Zharov, chief of the Federal Communications Agency, told Russian news agencies on Tuesday that they will work to “make Facebook comply with the law” on personal data, which obliges foreign companies to store it in Russia.
Source: Russia threatens to block Facebook over data storage