CIA concludes Saudi crown prince ordered Jamal Khashoggi’s death, official says – CNNPolitics

You shall know the truth and the truth shall … be brutal. Once out, this one could not be sugar coated, and if he with is strategic importance, status, power, relationships and wealth does not get a pass (in assessments) no one does. 

How context, profiles, actions, timelines, sequences, HUMINT, SIGNIT and surveillance in aggregate and in a mosaic tell a story. It is integrity. Did I just accuse CIA of having integrity? I thought that was an FBI thing!

The CIA has concluded that Saudi Crown Prince Mohammed bin Salman personally ordered the killing of journalist Jamal Khashoggi, despite the Saudi government’s denials that the de facto ruler was involved, according to a senior US official.

Source: CIA concludes Saudi crown prince ordered Jamal Khashoggi’s death, official says – CNNPolitics

Advertisements

Cyber Security Derailed? Recommendations for Smarter Investments in Infrastructure

A state-owned Chinese company receives a contract to build and maintain the next generation of railcars that service Metro stations at the Pentagon, near the White House and Capitol Hill, and throughout the Washington, D.C., metro area. What could possibly go wrong?

Source: Cyber Security Derailed? Recommendations for Smarter Investments in Infrastructure

Data Rich and Information Poor (DRIP): The Adversary of Lethality

No! Who would want to perpetuate the problem?!

“Despite the Joint Enterprise Defense Infrastructure being validated by the Joint Requirements Oversight Council, it still faces opposition from Congress and some in industry who seek to perpetuate the problem, and their government contracts, by obfuscating any simple solution to the state of being data rich and information poor.”

And the final recommendation is just an authoritative EDW. See that go on a tailspin before.

Source: Data Rich and Information Poor (DRIP): The Adversary of Lethality

Speech of NSA General Counsel Glenn Gerstell to 2018 ABA National

It is not a simple slow moving or even complex environment but marked by a certain degree of ambiguity the does not fit well with current law or legislature. Carpenter had no NS or CT impact. And he was not being critical at all:

“I am not in any way being critical of our judiciary. Rather, I am simply pointing out that the limitations of our “case or controversy” scheme can result in a patchwork quilt of legal precedent that takes into account only the particular technology directly before the court in each case, which in turn leads to decisions that are sometimes hard to reconcile or are distinguishable only by factors that seem of dubious significance. It also yields a set of legal determinations in this area that are, at best, of uneven value in predictive utility. Indeed, the very fact that the nine justices generated five distinct opinions in Carpenter itself makes clear that even the best legal minds are divided over the right approach. And this was in a relatively straightforward case involving fairly well-established technology, where there was already ample Supreme Court precedent about the government’s access to other types of cell phone information and its use of technology to track a person’s physical movements.

Source: Speech of NSA General Counsel Glenn Gerstell to 2018 ABA National

Meet the people busting scientists who fake images in research papers

In biomedical research alone, an estimated $2 billion may have evaporated last year over papers that were retracted due to doctored images. Now, a growing body of researchers are turning to AI to catch crooked scientists in the act, and hopefully solve this decade-old issue.

Source: Meet the people busting scientists who fake images in research papers

The Death of Cyber Utopia

Back in the mid-1990s senior leaders in the U.S. Air Force were deeply enmeshed in a debate—one that, as General (Ret.) Michael Hayden describes it, was almost Jesuitical in its seeming abstruseness. The Air Force, on the cutting edge of new computer-enabled capabilities, was trying to decide whether this new domain of activity was one of “cyber” operations or one of “information” operations.

Source: The Death of Cyber Utopia