History Channel Interview

An interview I did for the History Channel is now running on a History Undercover episode entitled "Cyberterrorism". I don't know when it will repeat, so check you local listings. As with most interviews this one also brought an old friend out of the woodwork, so thanks to Rob for giving me the head's up on the interview.


Mindy the star

My cousin Mindy has been living with us for three weeks while she attended DayJams, which is a music camp based out of Alexandria, VA. We've had a blast hosting her and will really miss her. At the camp, they write and perform a complete song within one week. I've posted two Mindy clips on my dotmac account in the Quicktime format. The first is a solo from a song and can be found here. The second song was performed as a duet with a girl named Danielle and can be found here. She is talented!


Discussing Threat to Australians

Interestingly enough, this discussion took place only two weeks before the Bali attack.


CNN Aaron Brown Interview

An interesting segment with friends Schwartau, Steele, and the late Peter Black on emerging threats and scenarios.


BlackHat and Defcon

For those attending BlackHat and/or Defcon, I will be speaking at both events. See the official sites for details. Look forward to running into lots of old friends.


National Do Not Call

Finally! We've needed a solution like this for a while. The National Do Not Call registry will allow you to register your phone numbers and designate that you do not want to receive calls from telemarketing companies. Can't wait for the enforcement of this registry, which begins on October 1, 2003. Visit donotcall.gov to register your phone number with the service.


Photo blog

I am testing a new Nokia 3650 with a built in camera. Pictures can be sent from the phone straight to the internet. See examples at this site.


Under Construction

This site is under active construction and may not display correctly when viewed in Windows. Issue should be addressed soon. UPDATE: Think I have the problem solved. If it is still not displaying correctly for you, please email me.


US Cybersecurity Agency launched

We've lost two cybersecurity directors in as many months, but that hasn't impacted developments at DHS. "The U.S. Department of Homeland Security announced the creation of a new cybersecurity division Friday, kindling a spark of optimism in technology industry groups that were losing faith in the government's commitment to computer security." Full Story


Threat still exists…

Osama bin Laden's al-Qaeda terror network is poised to unleash chemical, biological and even nuclear attacks, the US Central Intelligence Agency said. "Al-Qaeda and associated extremist groups have a wide variety of potential agents and delivery means to choose from for chemical, biological, radiological or nuclear attacks," the CIA said in a report ...More


The Dog Blog

The Dog Blog is a great idea. Lots of fun. Can you guess which one is mine?


Church of Jenkins

I've often joked that I am going to start a formal religion surrounding the work of Brian Jenkins in the terrorism field. His name is cited so often and in such strange circumstances that it is obvious he has a dedicated following. When I introduce Brian for speaking engagements, I often say "it is tough to have a cup of coffee with him without becoming more enlightened". Therefore, it is nice to see this Washington Post profile of him and his contributions to the field over the past thirty years. While it is a large article, it doesn't even skim the surface of his real-world experience.


Lone Wolf

The emergence of AQ lone wolfs is something that has concerned me for a while. We've certainly seen some instances, from a teenage boy in Tampa to a commando limo driver at LAX, but the true potential of this threat has yet to be realized. This is also one of those areas, where once the ice is broken, the frequency of attacks will increase. "Man arrested last week allegedly sought bombmaking material. In April, court documents allege, Sayed Abdul Malike tried to buy enough explosives to blow up "a mountain." No one knows what Mr. Malike's specific plan might have been, or whether it would have succeeded, but thanks to an alert shop owner the Afghan-born legal resident will go before the federal court in Brooklyn for a bail hearing on a…


Internet Dreams Turn to Crime

Those that see the TechDef marketing literature always ask why we offer a counter-extortion service. From the Washington Post: "Soon, U.S. prosecutors said, Gorshkov and Ivanov were scouring the Internet looking for security vulnerabilities in the computer networks of American corporations. When they found a way in, they would steal credit card numbers or other valuable information. They would then contact the site's operator and offer to "fix" the breach and return the stolen data -- for a price." Full Story


And they call it journalism

UPDATE: I dropped an email to the author of the piece mentioned below noting my frustration with his methods and the misquote. To my surprise he actually responded with an apology and fixed the article. So the quote you will read below is actually one I endorse now! Nice to see someone so willing to correct a mistake. It amazes me when journalists will use other media stories as a source, rather than talk to the interviewee directly. The story below discusses a quote of mine that was out of context in the first place and which is now out of context once removed. I've never claimed that 100 nations are developing information warfare capabilities. That information comes from the director of CIA and if you hear me speak, you'll know I…


ABC Radio (Australia) Speech Transcript

ABC Radio in Australia ran an edited version of a public speaking engagement I did while I was there. The broadcast ran well after I had left the country, so I didn't get a chance to hear it, but the transcript is available below.