Jan 212012

Via:  www.telegraph.co.uk


More at articles.boston.com/2012-01-17/metro/30632769_1_courtenay-griffiths-charles-taylor-war-crimes

Nov 252011

Via:  consortiumnews.com


whowouldbenefit adds Italian telecommunications security expert Adamo Bove, Greek telecommunications expert Costas Tsalikidis and Deborah Jeane Palfrey.

Jun 082011

Via:  commondreams.org
Gen. Keane Keen on Attacking Iran by Ray McGovern.



“Iran halted weaponization in 2003.”

Apr 182011

Via:  informationweek.com


The NSA is looking at using a cloud-centric approach to share information with other intelligence agencies.

“a role-based identity access management framework”

“even when that information resides in another agency’s database”

“database queries across agencies”

As with Nebula software their will be a push for some open source code and new servers will allow developers to write apps.



Feb 252011


Pre-nomination hearing questions with some details on the Comprehensive National Cybersecurity Initiative (CNCI)



“There has been a marked increase in cutting edge technology which has been developed through research and development and successfully transitioned to operations… [The CIA Directorate of Science and Technology’s] acquisitions and operations have also delivered innovative new capabilities and technical operations that have closed collection gaps.”


Feb 232011

Via:  in.news.yahoo.com

Russia’s Foreign Intelligence Service (SVR) is warning in a report:

“”Pakistan’s ISI stating that top-secret CIA documents found in Davis’s possession point to his, and/or TF373, providing to al Qaeda terrorists “nuclear fissile material” and “biological agents””

More at:  telegraph.co.uk/news/worldnews/asia/pakistan/8340999/Raymond-Davis-was-acting-head-of-CIA-in-Pakistan.html

Feb 202011

Via:  news.cnet.com

The good news about the new bill, judicial review via lawsuits filed in the District of Columbia for objecting to being placed a a list of systems or assets that constitute covered critical infrastructure.

Feb 192011

Via:  arstechnica.com

The US government on rootkits, computer viruses, trojan horses ect.
Task B – Stealth Windows software onto a target laptop
PCMCIA, ExpressCard, and Firewire give direct memory access.
USB and wireless networking.
“not be detectable” by virus scanners or operating system port scans, and it should clean up after itself to eliminate all traces of entry.
“Task C” infiltrate Windows machines running Microsoft Outlook.
A rootkit demo for XP, later to be a next-gen encrypted product called “12 monkeys.”
0-day, a Windows, Flash, Java security hole that no one else has ever found. Was called “Juicy Fruit”
Political cartoons, multiple social media accounts, manipulate conversations, seeking massive amounts of Facebook data.
A root kit to send back as many behavioral measurements as possible, as your type your computer becomes a “paranoia-meter”.
DARPA did not seem interested in the paranoia-meter plan.
Sniff Russian GSM cell phone signals for hacking ideas.
Magenta was a rootkit that would accept commands from outside a full Windows firewalling enabled system.

Feb 192011

Via:  hometownannapolis.com

Meade High School will be getting a cyber curriculum designed specifically to feed the needs of the National Security Agency and Cyber Command.

Will the NSA offer more tech jobs than Silicon Valley?

U.S. Rep. Dutch Ruppersberger (D) on the House Intelligence Committee:

“”That corridor that I represent, in 10 years, there are going to be more tech jobs than Silicon Valley,””

More at:  http://it.slashdot.org/story/11/02/18/2239238/National-Security-Jobs-To-Rival-Silicon-Valley-Over-the-Next-10-Years#comments

Feb 182011

Via:  wired.com

1 percent or so of America’s population contributes to the country’s defense.

Darpa will have $25 million to find military Veterans, including disabled Veterans, futurists, inventors, hobbyists and tinkerers who approach military problems from an unconventional perspective and your dog.

from:  http://www.darpa.mil/Docs/MasterJustification_DARPA_PB_2012.pdf

“Conceptualize and develop tools to enable persons with similar interests and complementary capabilities to find each other and collaborate on military problems. – Develop techniques for correlating and fusing solution concepts put forward by diverse proposers to yield “meta-solutions” for complex military problems.”