A Cyberattack in Saudi Arabia Had a Deadly Goal. Experts Fear Another Try.

Petrochemical companies were hit by a series of cyberassaults last year. The worst of them, against a widely used safety system, could have set off an explosion.

Source: A Cyberattack in Saudi Arabia Had a Deadly Goal. Experts Fear Another Try.


Integrated Posts Updates

It is about disrupting and holding accountable entrenched actors and conduct that have reared their ugly heads again and again over the years continuing to present.

The following have been updated and added to the integrated slides:

Never Too Late
Focusing on Relevant Stuff
Title 26, 18, 50 and 10 Confusion

Federal Investigations Primer:
Added compartmentalization & Need to Know

Cross-Border Law Enforcement Primer:
Added Canadian “Agent” Role
Added Stings, Ethnic Communities and Foreign Personas
Updated Factual Instances: Corruption
Updated Impacts of Off-the-Books or Regional Independence Alliances

Sources, Operatives & Organizations Digest:
Added Criminal Organization Structure
Added Criminal Organization Communication Structure
Added Matchmakers & Rainmakers

Seattle Federal Corruption Slides Integrated:
Added Selected Linkages Slide Set

This post is the 2nd addendum to (previous limited information 9 posts) and  integrated post for documentation and reference purposes. Information, context and statements were previously and contemporaneously documented and independently verifiable. Conclusions and assessments are self-evident or clearly marked and separately identified. Related efforts are not recent and have been ongoing for a significant period.

The ‘Greek Tragedy’ of Cyber Security: We Know How This Ends

This picture is much better than Anglteon and that whole week of bad photos.

Cyber events of the past two years—perpetrated by state actors in several notable cases, according to public statements by the U.S. and British governments— have demonstrated the potential for damaging impact to national security, critical infrastructures, and the global economy. Electric power distribution, healthcare services, pharmaceutical manufacturing and global shipping have all suffered significant disruptions, … Continue reading “The ‘Greek Tragedy’ of Cyber Security: We Know How This Ends”

Source: The ‘Greek Tragedy’ of Cyber Security: We Know How This Ends

Know Thyself: Learning Leadership through Poetry

The shades of reality that can be articulated in verse resemble the qualities of intuition and instinct that rest more on the relationships between discrete facts than on the facts themselves. When poems are both inductive and meditative, they make self-knowledge honest by capturing those aspects of both perception and understanding that defy concise description or quantification. The insights produced in this way are less subject to biases and the manipulations that are sometimes applied to serve one’s preferences.

Source: Know Thyself: Learning Leadership through Poetry

As Clearance Backlog Soars Past 710,000, Senators Want to Know Why – Defense One

How much of this is due to overclassification? Simplified:

Risk imposed by backlogs + Risks imposed by unnecessary classification and by default > Cost of fixing the classification system (instead of physical queue management)

A nearly four-fold increase has people waiting more than a year for top-secret clearance.

Source: As Clearance Backlog Soars Past 710,000, Senators Want to Know Why – Defense One

Could AI-Driven Info Warfare Be Democracy’s Achilles Heel?

Wise words on risks of accuracy in profiling, customized crafting of messages, impersonation and loss of confidence in authentication of individual. I am not sure how otherwise relevant scale and speed of AI can be. Limitations on information input, absorption and processing capability of human beings are blessings that cap the output power any information presentation system. The danger is not in death by a thousand cuts of utterly confused and zombie citizens, but one mission bullets which then are not effective for mass deception, and easier to defend against their best logical targets of critical decision makers.

Today, waging information warfare is a manpower-intensive effort. What if that changes?

Source: Could AI-Driven Info Warfare Be Democracy’s Achilles Heel?

Law Enforcement as a Counterintelligence Tool – Lawfare

A few years ago, shortly after stepping down as Assistant Attorney General for National Security, I published a long article called Law Enforcement as a Counterterrorism Tool. As its title suggests, the article’s central thesis was that law enforcement methods are useful in combating international terrorism. I did not try to make the case that law enforcement is the only, or even necessarily the best, way of combating terrorism.

Source: Law Enforcement as a Counterintelligence Tool – Lawfare

A CEO’s Brief Guide to Intelligence: “Not Just for Three-Letter Agencies”

Presidents and generals depend upon timely intelligence to shape their decisions in a world of ambiguity, hostile actors and disinformation. The savviest leaders in the private sector do the same. Governments have broad intelligence authorities and powerful tools unavailable to the private sector, but they do not have a monopoly on the application of intelligence.

Source: A CEO’s Brief Guide to Intelligence: “Not Just for Three-Letter Agencies”