Chinese IW - 1996

Digging through some old files and found this from 1996: ::::::::::::::::::::: May 10, 1996, Friday SECTION: Part 3 Asia-Pacific; CHINA; MILITARY; EE/D2609/S2 LENGTH: 308 words HEADLINE: INFORMATION WARFARE; China: characteristics of information…


Dronegate: The First Casualty is our Cybersecurity Paradigm

Out of respect to the original blog, my comments on this article can be found by following the link below the excerpt. These are important issues and we should be examining and debating them in detail. "As of yet, there is no definitive narrative…


Using hackers as a national resource

Misha Glenny's TED talk entitled "Hire the Hackers" was sent to me about a dozen times today. I was reminded of the excerpt below taken from my 1995 thesis. Reviewing it after all these years, it is not perfect, but does raise some important points…


‘Stuxnet’ Worm Far More Sophisticated Than Previously Thought

Interesting revelation. One major red flag associated with this worm was the fact that folks were claiming it got distributed widely via removable media. Turns out that might not be the case... "As first reported on July 15 by KrebsOnSecurity.com,…


Snapshot in time - September 11, 2001

A few interesting screenshots from the Terrorism Research Center on September 11, 2001. Here is a message that Neal Pollard and I wrote that greeted our visitors when they first hit the terrorism.com domain. Having founded the company on the 1st…


We all live in the future now...

While I'm not usually one to dwell on the significance of a new decade, 2010 seems worth reflecting on.  This post covers a hodge-podge of issues keeping in tune with this blog's general charter of technology, security, and obscurity.  Hopefully,…


Pretty clever

For some reason, this attack made me laugh. An interesting blending of meatspace and cyberspace. Hackers in Grand Forks, North Dakota of all places have hit on a clever Trojan Horse: using a fraudulent parking ticket to direct unsuspecting…


Threats in the Age of Obama

I'm a contributor to this impressive new book that examines what threats we face in the coming years.  An excellent compilation of contributors and expertise which is highly recommended. You can purchase the book at Amazon today


2009 - The year of living cyberdangerously

The reliance on computers to operate key infrastructures has created a tunnel of vulnerability previously unrealized in the history of conflict. I first wrote that sentence in 1993 as part of my M.A. thesis on information warfare and my thesis…


Back to the basement

Yesterday was my last day of employment at the Terrorism Research Center/TIS.  As an original co-founder of TRC in 1996 and it's only active President and CEO, I was able to grow the company beyond any of the expectations we originally had.  It has…