Petrochemical companies were hit by a series of cyberassaults last year. The worst of them, against a widely used safety system, could have set off an explosion.
It is about disrupting and holding accountable entrenched actors and conduct that have reared their ugly heads again and again over the years continuing to present.
The following have been updated and added to the integrated slides:
Never Too Late
Focusing on Relevant Stuff
Title 26, 18, 50 and 10 Confusion
Federal Investigations Primer:
Added compartmentalization & Need to Know
Cross-Border Law Enforcement Primer:
Added Canadian “Agent” Role
Added Stings, Ethnic Communities and Foreign Personas
Updated Factual Instances: Corruption
Updated Impacts of Off-the-Books or Regional Independence Alliances
Sources, Operatives & Organizations Digest:
Added Criminal Organization Structure
Added Criminal Organization Communication Structure
Added Matchmakers & Rainmakers
Seattle Federal Corruption Slides Integrated:
Added Selected Linkages Slide Set
This post is the 2nd addendum to (previous limited information 9 posts) and integrated post for documentation and reference purposes. Information, context and statements were previously and contemporaneously documented and independently verifiable. Conclusions and assessments are self-evident or clearly marked and separately identified. Related efforts are not recent and have been ongoing for a significant period.
This picture is much better than Anglteon and that whole week of bad photos.
Cyber events of the past two years—perpetrated by state actors in several notable cases, according to public statements by the U.S. and British governments— have demonstrated the potential for damaging impact to national security, critical infrastructures, and the global economy. Electric power distribution, healthcare services, pharmaceutical manufacturing and global shipping have all suffered significant disruptions, … Continue reading “The ‘Greek Tragedy’ of Cyber Security: We Know How This Ends”
The shades of reality that can be articulated in verse resemble the qualities of intuition and instinct that rest more on the relationships between discrete facts than on the facts themselves. When poems are both inductive and meditative, they make self-knowledge honest by capturing those aspects of both perception and understanding that defy concise description or quantification. The insights produced in this way are less subject to biases and the manipulations that are sometimes applied to serve one’s preferences.
VICE News obtained the manual for the DEA’s “Sensitive Investigative Unit,” which trains elite foreign cops to target drug kingpins.
How much of this is due to overclassification? Simplified:
Risk imposed by backlogs + Risks imposed by unnecessary classification and by default > Cost of fixing the classification system (instead of physical queue management)
A nearly four-fold increase has people waiting more than a year for top-secret clearance.
Wise words on risks of accuracy in profiling, customized crafting of messages, impersonation and loss of confidence in authentication of individual. I am not sure how otherwise relevant scale and speed of AI can be. Limitations on information input, absorption and processing capability of human beings are blessings that cap the output power any information presentation system. The danger is not in death by a thousand cuts of utterly confused and zombie citizens, but one mission bullets which then are not effective for mass deception, and easier to defend against their best logical targets of critical decision makers.
Today, waging information warfare is a manpower-intensive effort. What if that changes?
A few years ago, shortly after stepping down as Assistant Attorney General for National Security, I published a long article called Law Enforcement as a Counterterrorism Tool. As its title suggests, the article’s central thesis was that law enforcement methods are useful in combating international terrorism. I did not try to make the case that law enforcement is the only, or even necessarily the best, way of combating terrorism.
Presidents and generals depend upon timely intelligence to shape their decisions in a world of ambiguity, hostile actors and disinformation. The savviest leaders in the private sector do the same. Governments have broad intelligence authorities and powerful tools unavailable to the private sector, but they do not have a monopoly on the application of intelligence.