Cyber Security

Surviving Cyberia

Friday, February 23rd, 2018

Russia’s cyber-attacks on the United States, have not been limited to interfering with the 2016 elections. Nor did Russian spying, stealing information and spreading disinformation begun in 2013 when several of them conspired to interfere with and undermine the 2016 elections results. The Russians have been at it since the... ...

Mobile apps and smartphones pose a clear and present danger*

Saturday, February 17th, 2018

Most people don’t realize that the mobile phone is being ‘weaponized. New revelations show that Iran has posted apps found on Google’s Play Store which give the Iranians the ability to easily spy on anyone who downloads them to their smartphone.  Some say these are “weaponized” smartphone apps. Most people don’t realize... ...

Dealing With Cyber Vulnerabilities of US Weapons Systems*

Tuesday, March 28th, 2017

A new Defense Science Board report, produced by a special task force, has raised serious questions about how robust existing and future defense systems are and will be against cyber attacks and cyber intrusions. As the Trump administration rightly commits billions of dollars to overhaul worn-out weapons platforms, is attention being... ...

Needed: An Independent Financial Cyber-Threat Clearinghouse

Sunday, August 21st, 2016

A month before September 11, 2001,  President Bush was given his Presidential Daily Briefing (PDB), with an item entitled, “Bin Laden Determined to Strike the U.S.”  The PDB didn’t contain any specific evidence of an impending attack; just that federal agencies had bits and pieces of information indicating a desire... ...

Take Advantage of the Reserves for Innovation*

Thursday, May 19th, 2016

The National Guard and Reserves should be the Defense Department’s source of innovation and technical know-how.   With the establishment of the Defense Innovation Unit Experimental (DIUX), Secretary of Defense Ash Carter is putting a lot of effort into building a relationship with Silicon Valley, hoping some — but not too... ...

Needed: U.S. Cyber Defense Policy

Tuesday, April 5th, 2016

Two years have passed since the Obama administration was tasked by Congress to develop cyber countermeasure policies. But in response to Sen. Joe McCain (R-AZ) question “Is it correct that these are policy-decision that have not been made?”  U.S. Cyber Command Commander Adm. Michael S. Rogers responded: “The way I... ...

Iran Thumbs Its Nose at Obama

Sunday, March 13th, 2016

Left: TEHRAN (FNA)- Commander of the Islamic Revolution Guards Corps Aerospace Force Brigadier General Amir Ali Hajizadeh said Iran’s ballistic missiles can fly 400km above the ground to hit targets at 2,000km within 12 to 13 minutes. –  Iran’s firing long-range ballistic missiles that could reach Israel last week was the... ...

The U.S. Cyber Vulnerability Goes On

Wednesday, February 10th, 2016

Is there anyone in the United States whose personal information has not been stolen, yet? Hard to tell. The government agencies seem slow in detecting such breaches, slower in reporting about them, and very slow in resolving problems arising from such thefts.  Take today’s Internal Revenue Service’s  announcement of the latest breach.... ...

What Should Israel Worry About?

Wednesday, November 25th, 2015

A former director of the Central Intelligence Agency recently stated that the intelligence community in the U.S. has a perfect record of identifying future threats: “We have never been right”. The one thing we know nothing about is the future. Nevertheless we have no choice but to try to peer... ...

Weekly Review, September 21-25, 2015

Friday, September 25th, 2015

The U.S. Moral Decline – Rachel Ehrenfeld – What would Eleanor Roosevelt say about the election of Saudi Arabia’s Geneva ambassador Faisal Trad, as Chair of the United Nation Human Rights Council’s monitoring panel? She would wonder how…continue… A Tale of Two Viennas – Norman A. Bailey – The great powers of... ...

Xi’s Bluffing Hand*

Sunday, September 20th, 2015

Next week’s state visit of China’s No. 1 Xi Jinping looks to be all pomp and circumstance. There is little expectation that the long list of critical issues between Washington and Beijing will be addressed in any substantive way. And, in fact, the international Greek chorus which sings a baleful... ...

Weekly Review, Aug. 31 – Sept. 4, 2015

Friday, September 4th, 2015

Obama Selling the Iranian Deal – Rachel Ehrenfeld – As a used lemon-car salesman, Secretary of State John Kerry continues to peddle the defective agreement with Iran. While his boss, who commands the lemon car dealership has successfully persuaded 36 Democratic Senators to assist him in preventing a congressional veto... ...

Obama’s Threats Unlikely To Stop Cyber Attacks

Wednesday, September 2nd, 2015

Left: US President Barack Obama is expected to take a firm line on the issue of hacking during Chinese President Xi Jinping’s visit. Photo: AP Talk about imposing sanctions on Chinese and Russian individuals and a company benefiting from their government’s looting of American trade, military and personnel secrets, is cheap, but futile.... ...

Weekly Review, August 17-22, 2015

Friday, August 21st, 2015

Left: IAEA director general Yukiya Amano, left, and Iran’s Atomic Energy Organization president Ali Akhbar Salehi sign a confidential ‘roadmap’ document in Vienna on July 14, 2015. (Photo: D.Calma/IAEA) Obama’s Reckless Iran Agreement Exposed – Rachel Ehrenfeld – One wonders how much longer President Obama and his minions can claim... ...

Weekly Review, August 10-15, 2015

Saturday, August 15th, 2015

The Advancement of Global Jihad – The Meir Amit Intelligence and Terrorism Information Center – The weekly report on Global Jihad details and analyses, ISIS, al Qaeda and their affiliated terror groups during between August 6-12, 2015. In Derna, Libya, “ISIS operatives are trying to regain control of the city... ...

Cybersecurity’s “New Normal”

Wednesday, August 12th, 2015

Left: For the past five years, Chinese cyber spies have been reading the private emails of an undisclosed but presumably large number of top Obama administration officials. Former Secretary of State Hillary Clinton is not alone ignoring the security of her cyber correspondence and government secrets, using “personal communications hardware and... ...

Weekly Review, August 3-8, 2015

Friday, August 7th, 2015

Left: TEHRAN (FNA)- Tehran’s provisional Friday Prayers Leader Ayatollah Mohammad Emami Kashani underlined that the Takfiri terrorists have been created and supported by Washington. Who Mongers War? — Rachel Ehrenfeld — If Secretary Kerry has been telling the truth that parts of agreement are kept secret, what led him and the President to... ...

“What are Israel’s options regarding Iran?”*

Tuesday, August 4th, 2015

The White House release of what it claims is “the entire Iran deal,” on VentureBeat‘s Medium (candidate Obama’s mouthpiece since 2007), instead of in a press release, is telling. The President will do whatever he can to further mislead and influence Congressmen still seating on the fence, while attacking the opposition to... ...

Weekly Review, July 12-17, 2015

Friday, July 17th, 2015

Alfred Nobel Must Be Spinning in His Grave – Rachel Ehrenfeld – The 2009 stillborn Nobel Peace Prize Laureate, U.S. President Barack Hussein Obama, has violated all three of Alfred Nobel’s stipulations for the award. Instead of working for the “abolition or reduction of standing armies,” Obama has done his... ...

Timing is Everything*

Monday, July 13th, 2015

If you think that computer intrusions are the main thing we need to worry about when it comes to cybersecurity, think again. There’s growing concern about the implications of our increasingly wireless world and how readily it can be disrupted. When it comes to our reliance on the electromagnetic spectrum... ...

Weekly Review, June 15-20, 2015

Saturday, June 20th, 2015

Left: Learning a trade … former “militants” study electronics at the Swat valley centre. Photograph: Mian Kursheed/Reuters  The Folly of Islamic de-Radicalization – Rachel Ehrenfeld – Establishing de-radicalization centers to fight the jihadist plague, either in Muslim countries or in the West is a futile endeavor. They cannot erase centuries of indoctrination by religious authorities... ...

GPS Vulnerability: Options and Alternatives

Sunday, June 14th, 2015

Abstract The Global Positioning System (GPS) was declared operational on December 8, 1993. Since that time the system and the receivers that use it have been improved to a level of performance unimagined by its creators. Also, the system has been integrated into the daily life of societies all around... ...

It’s Getting Late in the Cyber War

Thursday, June 11th, 2015

Promises to increase the United States cyber defenses are nothing new, though lately they are made more frequently. On June 9, 2015, just one day after President Obama vowed to “aggressively bolster” our cyber defenses, the U.S. Army official website was hacked and defaced, apparently by a hacktivist group, supporting Bashar Assad, the “Syrian Electronic... ...

Weekly Review, June 1-5, 2015

Friday, June 5th, 2015

Pic Credit: Saul Loeb, the Atlantic — Fueling the ISIS Fire – Rachel Ehrenfeld – Under growing criticism of handling the war against ISIS, the Obama administration decided to send more weapons to the Iraqi army and has already sent the first shipment of the 2,000 AT4 anti-tank missiles to be used against ISIS driven American... ...

Fueling the ISIS Fire

Friday, June 5th, 2015

Left: U.S. Humvee captured by ISIS in Mosul, June 11, 2014.  According to Deputy Secretary of State Tony Blinken, the international coalition forces against ISIS succeeded in the past nine months, mainly through the United States air-campaign, to kill more than 10,000 ISIS fighters. This, according to Blinken, caused ISIS... ...

Weekly Review, May 18-23, 2015

Saturday, May 23rd, 2015

Left: iSIS destroying historical sites in Iraq, AP  —  ISIS: Why Does Obama Sit on His Hands? – Rachel Ehrenfeld – Is President Obama kept on the dark by his intelligence briefers about ISIS’s rapid advance in Iraq and Syria? Why does he think there is time to now begin... ...

Ehrenfeld on Hacking into Airplanes Controls*

Tuesday, May 19th, 2015

Adam Kredo’s “Cyber Experts: FBI Ignoring Hack Threats to Airplane Wi-Fi. Law enforcement still sees no credible threat,” appeared today in the Washington Free Beacon: “Law enforcement officials are downplaying reports that a U.S. hacker infiltrated a commercial airliner Wi-Fi network mid-flight and assumed control of the craft’s controls, according to one... ...

CyberSecurity Promises. Again.

Monday, May 18th, 2015

Right: Hackers who claim to be affiliated with the Islamic State group released a video threatening “electronic war” on the United States and Europe, Monday, May 11, 2015. Youtube —   Concluding the Camp David Gulf Cooperation summit, President Obama promised to help secure the Gulf States from cyber attacks by... ...

Weekly Briefing, May 2-9, 2015

Saturday, May 9th, 2015

U.S. Counterterrorism at Risk – Rachel Ehrenfeld – Three days after American jihadists Elton Simpson and Nadir Soofi’s attempted to kill the participants of the Mohammed Cartoon competition in Garland, Texas, was foiled, Defense Secretary Ash Carter acknowledged that “ISIS remains a continuing threat and it is a movement that... ...

The Lure of ISIS

Thursday, May 7th, 2015

Left: ISIS Sign-Language Video for Deaf and Mute recruits in Europe  The Islamic State’s attraction to young Muslim females and males continues to mystify Westerners, especially non-Muslims. They wonder,  ”Why would educated and mostly well-off young Westerners be willing to join ISIS?” This follows by search for the ubiquitous “root-causes.” Thus... ...

A Navigation and Timing Primer: Concepts and Misconceptions

Sunday, May 3rd, 2015

This paper attempts to establish a common base of terms and concepts related to navigation. It is intended to set the definitions and principles which will enable rational discussions of navigation issues, such as the search for alternatives to GPS.  I. Introduction – Navigation is recognized as an important activity by... ...

Weekly Briefing – March 16-20, 2015

Saturday, March 21st, 2015

“Anti-Semitism is a Huge Menace” – The Netherlands Chief Rabbi – Emerson Vermaat, Exclusive to ACD – “The growing wave of anti-Semitism in Holland forces Jews  to be careful and hide any symbol that would give away their identity.”  “I don’t think anti-Semitism is growing in the Netherlands. It is... ...

Weekly Briefing – March 1-7, 2015

Friday, March 6th, 2015

Right: TEHRAN (FNA)- Iranian Deputy Foreign Minister and senior negotiator Seyed Abbas Araqchi described the removal of all sanctions against Tehran as a precondition for a comprehensive deal with the world powers, underlining that Tehran is standing on its positions firmly. On the Road to a “Very Bad Deal” with... ...

Weekly Briefing – February 22 – 27, 2015

Friday, February 27th, 2015

 Drones in the U.S. National Airspace System – Major Stephen Maddox & Captain David Stuckenberg —  in 2014 an American Airlines Group regional jet in Florida nearly collided with a drone at 2,300 feet. This type of UAS is supposed to remain within 400 feet of the surface. A collision... ...

Weekly Briefing – February 16-20, 2015

Friday, February 20th, 2015

“If Only Germany Had Solved Its Unemployment Problem in 1933, Germans Wouldn’t Have Become Nazis…Er, Maybe not.” – David P. Goldman (Sprengler) Denmark’s Compromised “Values” – Rachel Ehrenfeld – The Danes should have known better, but they continue to ignore the writings on the wall. Instead, they have compromised their... ...

Drones in the U.S. National Airspace System*

Friday, February 20th, 2015

Earlier this week, the Federal Aviation Administration (FAA) proposed rules on drones (unmanned aircraft systems (UAS). For example, the proposed rule would require that an operator maintain visual line of sight of a small UAS. Or, whether the rules should allow operations beyond line of sight, and if so, what the... ...

Weekly Briefing, February 8-13, 2015

Friday, February 13th, 2015

Deterring ISIL is Not Enough – Rachel Ehrenfeld – “Muslims need to change the religious discourse and remove from it things that have led to violence and extremism.”… President Obama’s requested Congressional authorization to indefinitely use U.S. military forces in “systematic campaign of airstrikes against ISIL in Iraq and Syria”... ...

Weekly Briefing – February 1-6, 2015

Friday, February 6th, 2015

Hell on Earth –  Dr. Mordecai [email protected] – Burning alive a human being is a method of eliminating enemies that is well known and documented in early Islamic sources, and based on a deductive legal principle of Sharia law… Anyone who attacks Islamic State will be condemned to Hell on... ...

Weekly Briefing – January 24-30, 2015

Saturday, January 31st, 2015

ISIS Advances – January 22-28, 2015 – Rachel Ehrenfeld – As the White House claims its attacks on ISIS have weakened the barbaric jihadist movement, we are witnessing an expansion of its activities. In previously unseen coordinated attacks ISIS attacked Egyptian security forces in the Sinai Peninsula, killing 26 and wounding more than... ...

Cyber Information Sharing – A Multidisciplinary Analysis*

Wednesday, January 28th, 2015

“Is there a different paradigm in the world of information technology that would allow dealing with current and future cyber challenges without the need for sharing, or is there no choice but to join forces in the battle and rapidly adopt uniform standards for a sharing infrastructure? Either way, such... ...

Weekly Briefing – January 12-16, 2015

Saturday, January 17th, 2015

Charlie Hebdo – A Missed Opportunity – Rachel Ehrenfeld — In less than a week the free world seems to have lost the United States’ leadership, and the media lost its courage. The winners are the Islamists, whose ‘sensitivities’ apparently weigh more than those of Christians, Jews, Hindus, and all... ...

Weekly Briefing – January 5-9, 2015

Monday, January 5th, 2015

The Mystery of the Islamic State – Rachel Ehrenfeld — Over several months last year, in an effort to understand the Islamic State movement, Maj. Gen. Michael K. Nagata, commander of American Special Operations forces in the Middle East, sought the advice of Defense, intelligence and State experts, and academicians….the... ...

Weekly Briefing – December 28-January 2, 2014/15

Saturday, January 3rd, 2015

Cybersecurity and the 114th Congress – Rachel Ehrenfeld – The Sony hacking served as a national reminder that cybersecurity should be taken more seriously…In May 2010, former National Security Agency Director Keith Alexander lamented, “The scale of compromise, including the loss of sensitive and unclassified data, is staggering,” Miller said.... ...

Obama Losing War on America’s Economy

Monday, December 29th, 2014

Whether the fourth quarter 5% growth of the U.S. gross development product [GDP] is a fluke, another wave of the troubled sea of the longest recovery in recent American history, it is evidence of the miraculous strength of the U.S. economy. Some are predicting it means a return to 3%... ...

Cybersecurity and the 114th Congress

Monday, December 29th, 2014

The Sony hacking served as a national reminder that cybersecurity should be taken more seriously. Thus, the lame-duck 113th Congress passed several cybersecurity acts, which the President signed on December 18. The new laws include: The National Cybersecurity Protection Act (S. 2519); The Federal Information Security Modernization Act of 2014 (S. 2521); The Critical... ...

Weekly Briefing – December 21-27, 2014

Sunday, December 28th, 2014

Left: Israel – completely clear – on Christmas morning from the International Space Station. Astronaut Barry Wilmore woke up early on Christmas to reflect upon the beauty of the Earth and snap some images to share with the world. Photo credit: NASA/Barry Wilmore 123C0777  — The Oil Market Crossroad –... ...

Weekly Briefing – December 15-19, 2014

Saturday, December 20th, 2014

Left: A North Korean commando on an infiltration training mission to South Korea. Cyberwarfare Threatening U.S. Economy and Free Speech – Rachel Ehrenfeld – Lack of appropriate cybersecurity exposes U.S. vulnerable communications to sophisticated cyberattacks; the fastest and safest venue to attack the U.S. economy, national security, and our right... ...

Cyberwarfare Threatening U.S. Economy and Free Speech

Thursday, December 18th, 2014

Lack of appropriate cybersecurity exposes U.S. vulnerable communications to sophisticated cyberattacks; the fastest and safest venue to attack the U.S. economy, national security, and even the right to free expression. Sony’s recent hacking and publication of its files, allegedly by North Korean hackers, has meant heavy short- and long-term damage... ...

Weekly Briefing – December 8 – 13, 2014

Sunday, December 14th, 2014

 By 2021 new nuclear missile systems, composed of new warheads and new delivery systems, will constitute 98 percent of Russia’s intercontinental ballistic missile forces. This modernization includes the new RS-24 Yars (which NATO calls the SS-27 Mod 2), shown here, which is a new road-mobile system designed to carry up... ...

Cyberattack on Civil Aviation

Friday, December 5th, 2014

The holiday season brings new “traditional” threats to airline passenger from al Qaeda, to nontraditional threat from wireless communication devices that carried and used on board the planes. Would be terrorists may be discoverer before detonating sophisticated hidden explosives, but would not come under any suspicion for using their smart... ...

Destructive Cyber Attacks on the Rise

Wednesday, December 3rd, 2014

Rising geopolitical tensions have led to a constant barrage of cyber hacking into the U.S. government, industries and businesses. The recent attack against California-based Sony Pictures Entertainment marked a turning point. It was the first officially acknowledged destructive coordinated cyber attack against a U.S.-based corporation. This led to Monday’s FBI... ...

Advanced Targeted Cyber Attacks – Identifying New Patterns

Tuesday, December 2nd, 2014

Analysis of Firsthand Experiences of the World’s Most Renowned Cybersecurity Forensics Teams Pinpoints Exploitation of Privileged Accounts as a “Signature” in Targeted Attacks. A new report was just released, identifying the compromise and misuse of privileged accounts as a key signature common among advanced targeted cyberattacks. Privileged Account Exploits Shift... ...

ISIS: Portrait of a Jihadi Terrorist Organization*

Friday, November 28th, 2014

An ISIS operative holds a shoulder-fired anti-aircraft missile on the background of a black ISIS flag (Picture sent by ISIS via Twitter) Objectives 1. This study examines the nature of the Islamic State in Iraq and Greater Syria (ISIS), an Islamic Salafist-jihadi terrorist organization founded a decade ago as a... ...

Weekly Briefing, November 2-8, 2014

Sunday, November 9th, 2014

Transportation Terrorism – Part I – Rachel Ehrenfeld – The art of war teaches us to rely not on the likelihood that the enemy’s not coming, but on our own readiness to receive him; not on the chance of his not attacking, but rather on the fact that we have... ...

Weekly Briefing, October 26 – November 1, 2014

Saturday, November 1st, 2014

Laser Communications – Rachel Ehrenfeld – Uninterrupted radio frequencies are necessary to guarantee wireless communications. The rapid growth of wireless communication and computing systems with a wide range of applications and services have crowded the airwaves, increasing their vulnerabilities to interference. “I can give you a whole list of interference... ...

Laser Communications

Wednesday, October 29th, 2014

Uninterrupted radio frequencies are necessary to guarantee wireless communications. The rapid growth of wireless communication and computing systems with a wide range of applications and services have crowded the airwaves, increasing their vulnerabilities to interference. “I can give you a whole list of interference incidents. Radars, wireless land devices, unlicensed... ...

Weekly Briefing, October 6-10, 2014

Saturday, October 11th, 2014

Countering BioTerrorism – Rachel Ehrenfeld – Bio-terrorism dates back to the New Stone Age. The Scythians (7th century BC – 4th century AD), the Gauls (Celtic people, 5th century BC – 3rd century AD), the ancient Romans (first and second centuries AD), the Aztecs, and the Mayans have used toxins... ...

Cyber Insecurity National Reminder

Tuesday, October 7th, 2014

As in previous years, the President proclaimed October, the “National Cybersecurity Awareness Month.” Yet, the nation’s growing cyber vulnerabilities attest that six years into the job, he has little to show but hollow statements. Our growing cyber vulnerabilities manifest that one month of national awareness a year has done little to alert... ...

Weekly Briefing, September 28-October 4, 2014

Sunday, October 5th, 2014

Left: Iraqi Shiite fighters wearing explosive belts Jihad is Jihad is Jihad and It’s Deadly – Rachel Ehrenfeld – The ISIS announcement of  American aid worker, despite his conversion to Islam. Former Army Ranger Peter Edward Kassig, now Abdul-Rahman, will die because he is an American.  For the ISIS and all... ...

Weekly Briefing – September 6-12, 2014

Saturday, September 13th, 2014

The Jihadist Plague on the March – Rachel Ehrenfeld – Al Qaeda’s attacks on the World Trade Center and the Pentagon, on September 11, 2001, signaled the beginning of the spreading of the global jihadist plague. The deliberate dismissal of growing jihadist movements the world over has been aided and... ...

Weekly Briefing – August 24-29, 2014

Saturday, August 30th, 2014

ACD NEEDS YOUR SUPPORT — “The ACD/EWI ability to predict future threats is second to none.” – R.James Woolsey, former CIA Director. The latest news about hacking into JPMorgan Chase and other banks’ databases should have not surprised ACD Blog readers. We have been warning against this and other threats... ...

More Cyberthreats, Less Cybersecurity

Saturday, August 16th, 2014

The lack of cybersecurity continues to pose the biggest threat to the United States. Describing it “one of the most serious economic and national security challenges we face,” President Obama went on to issue Executive Order 13696, to Improve Critical Infrastructure Cybersecurity. This order led to the Enhanced Cybersecurity Services  (ECS)... ...

Weekly Briefing – August 3 – 8, 2014

Saturday, August 9th, 2014

On ACD Behind the Veil: The Fundamental Nature of the Jihadist Cause – Rachel Ehrenfeld –  Click for the PDF or Youtube versions of this presentation. UNRWA – The Hand that Feeds Palestinian Terrorists (With Our Money) – Rachel Ehrenfeld – UNRWA has always denied links to Palestinian terrorism, or... ...

Weekly Briefing – July 27 – August 2, 2014

Sunday, August 3rd, 2014

On ACD Time to Hand Out the Goebbels Propaganda Award – Rachel Ehrenfeld – The competition among Western media outlets in spreading pro-Hamas propaganda, thus legitimizing its murderous agenda, should be recognized by giving the most biased anti-Israeli reporting the Goebbels Propaganda Award. Choosing the worst offender will be difficult.... ...

Weekly Briefing – June 23-27, 2014

Saturday, June 28th, 2014

From ACD: FCC to China – “Stop! Or, or I’ll Say Stop Again!” – Rachel Ehrenfeld – The Justice Department and the Federal Communications Commission (FCC) seem to model themselves after British policemen, popularly known as “bobbies,” whose only regular weapon is a short, wooden truncheon, which they keep out... ...

FCC to China – “Stop! Or, or I’ll Say Stop Again!”*

Monday, June 23rd, 2014

The Justice Department and the Federal Communications Commission (FCC) seem to model themselves after British policemen, popularly known as “bobbies,” whose only regular weapon is a short, wooden truncheon, which they keep out of sight and may not employ except in self-defense or to restore order. In response to Chinese... ...

Weekly Briefing, June 15-21, 2014

Sunday, June 22nd, 2014

From ACD: “Stop! Or, or I’ll Say Stop Again!” (The FCC to China) – Rachel Ehrenfeld – The Justice Department and the Federal Communications Commission (FCC) seem to model themselves after British policemen, popularly known as “”bobbies,” whose only regular weapon is a short, wooden truncheon, which they keep out... ...

Next Steps in Cyber Security*

Friday, June 20th, 2014

Mounting cyber attacks on the economic interests of the United States are a constant reminder that, despite the billions of dollars spent by both the U.S. government and the private sector to date, our cyber defenses are lacking. This is not to say that the U.S. government is ignoring the... ...

Penny Wise – Flotilla Foolish

Saturday, June 14th, 2014

The escalation of the sectarian fighting in Iraq has led the White House to announce the deployment of the supercarrier USS George H.W. Bush to the Persian Gulf. This 100,000-ton ship, with its 4.5-acre landing field and a crew of 6,000, has layered countermeasure and defense systems, including surface-to-air missiles... ...

GPS Purposeful Interference – The Next Generation Urban Weapon of Mass Effect

Friday, June 13th, 2014

We experience everyday interference with our communication systems and devices dependent upon uninterrupted reception of signals from the United States Global Positioning System. If the signals between our GPS satellites and their receiving ground control stations, or the signals from the ground stations, were disabled by jamming or spoofing, the... ...

Cyber Accidents Can Have a Purpose

Wednesday, June 11th, 2014

“Steven Chabinsky recently painted a detailed portrait of today’s evolving cybersecurity threat landscape. It’s not pretty.” reports Frank Konkel, in “If You Think Cybersecurity is ‘Just an IT Problem,’ Prepare to Get Owned.” “Aside from classified information, Chabinsky, who is chief risk officer of CrowdStrike and former deputy assistant director... ...

Weekly Briefing – May 31-June 7, 2014

Saturday, June 7th, 2014

From ACD Cyberspace Time Security – Rachel Ehrenfeld – Speaking at the Shangri-LaDialogue security summit, Defense Secretary Chuck Hagel again warned the Chinese to stop their cyber spying activities, suggesting they should renew the dialog to reduce “the risk of miscalculation and escalation in cyberspace.” In response, the director of the Center for... ...

Cyberspace Time Security

Monday, June 2nd, 2014

Speaking at the Shangri-La Dialogue security summit, Defense Secretary Chuck Hagel again warned the Chinese to stop their cyber spying activities, suggesting they should renew the dialog to reduce “the risk of miscalculation and escalation in cyberspace.” In response, the director of the Center for China-America Defense Relations, Maj. Gen.... ...

Weekly Briefing – May 24-30, 2014

Saturday, May 31st, 2014

Time to Debunk Political Islam – Rachel Ehrenfeld – Islamism has been accepted by the West as simply another political point of view and its growing efforts and sometimes violent acts to force its dictates, has been met with little, if any resistance especially since September 11, 2001. On May 23,... ...

Guerra de espias

Saturday, May 31st, 2014

GEOPOLÍTICA Al acusar a China de robarle secretos industriales, Estados Unidos se enfrenta con el gigante asiático. En junio de 2013, las imágenes de Barack Obama y de Xi Jinping paseando sin corbata por los jardines en el rancho californiano de Sunnylands eran elocuentes. El don de gentes del estadounidense... ...

Weekly Briefing – May 18 – 23, 2014

Saturday, May 24th, 2014

From ACD: U.S. CyberSpace Vulnerabilities – Rachel Ehrenfeld – Cisco Systems’ CEO John Chambers’s letter asking President Obama to personally intervene to stop the National Security Agency from intercepting and planting surveillance software in the company’s equipment before it is shipped to customers around the world… This letter overshadowed the news of charges against Chinese... ...

U.S. CyberSpace Vulnerabilities

Tuesday, May 20th, 2014

Cisco Systems’ CEO John Chambers’s letter asking President Obama to personally intervene to stop the National Security Agency from intercepting and planting surveillance software in the company’s equipment before it is shipped to customers around the world is likely to further curtail the agency’s spying capabilities. This letter overshadowed the news... ...

“No Place to Hide”- A Must Read Review

Friday, May 16th, 2014

‘Glenn Greenwald believes the government’s goal is the ‘elimination of electronic privacy worldwide.’ In a 1964 essay, Richard Hofstadter described what he called “the paranoid style” in American politics, a mode of analysis and rhetoric employed by insiders who feel threatened by change or outsiders who feel frustrated that they... ...

Weekly Briefing – May 3 – 10, 2014

Saturday, May 10th, 2014

U.S. National Security’s Achilles Heel – The Electromagnetic Spectrum – – Rachel Ehrenfeld – On December 23, 2013, the Defense Threat Reduction Agency issued a solicitation “to … conduct satellite system performance modeling, satellite system response-to-environments modeling, high altitude weapons electromagnetic pulse effects modeling, and disturbed atmosphere effects modeling…”  Yet,... ...

U.S. National Security’s Achilles Heel – The Electromagnetic Spectrum

Saturday, May 10th, 2014

Over the past four years bills on cybersecurity, Electromagnetic Pulse threats, and other forms of “purposeful interference” with U.S. cyberspace have been introduced only to go nowhere. By now it has been well established that EMP, whether in the form of a Carrington Event of solar origin or the explosion of a high-radiation-yield nuclear... ...

The Cyber Threat Industry: Into the Darknet*

Friday, May 2nd, 2014

Deep in shadowy chat rooms, where normal users never visit, there’s an entirely different world. Its denizens conduct their business secretly, keeping their distance from journalists and information security experts who try to meddle in their affairs. This business has rules of its own — the collection of forums and... ...

The Complete Guide to Online Threats: Part I

Wednesday, April 23rd, 2014

A glimpse behind the scenes of virus creation, in a must-read article that could help you prevent digital mishaps and disasters. We won’t give any hacking tips, but we’ll hopefully help you understand the threats lurking in the dark corners of cyberspace. We keep warning you against online security problems,... ...

ACD—Scientific and Policy Briefing on EMP Threats – 10 April 2014

Thursday, April 10th, 2014

The US Senate Committee on Energy and Natural Resources will meet in full committee today to consider “Keeping the lights on – Are we doing enough to ensure the reliability and security of the US electric grid?”  ACD will broadly articulate and disseminate solutions for our nation’s continuing exposure to... ...

Houston T. “Terry” Hawkins Joins ACD Board of Directors

Wednesday, April 9th, 2014

Houston “Terry” Hawkins, Senior Fellow/ Scientist, Principal Associate Directorate for Global Security, Los Alamos National Laboratory, Joins the ACD Board of Directors The American Center for Democracy is pleased to announce that Houston T. “Terry” Hawkins, Senior Fellow/Senior Scientist, Principal Associate Directorate for Global Security, Los Alamos National Laboratory (LANL), Los Alamos, New Mexico,... ...

Google PR at the Expense of HLS*

Tuesday, April 1st, 2014

Google is working hard to repair the damage to their public image, wisely doing so by criticizing various defense organizations. Over the last few months the American intelligence organizations got their fair share of bad publicity: The U.S. Senate, Congress and even the White House gave them the cold shoulder,... ...

ACD Weekly Briefing March 22 – 28, 2014

Sunday, March 30th, 2014

The Impact of Purposeful Interference on U.S. Cyber Interests* An ACD Event Report, by Rachel Ehrenfeld  — About the event:  “Thank you for inviting me to participate in one of the most interesting discussions ever.”  -Houston T. Hawkins, Senior Fellow, Principal Associate Directorate for Global Security, Los Alamos National Laboratory.... ...

The Impact of Purposeful Interference on U.S. Cyber Interests – An ACD Event Report*

Saturday, March 29th, 2014

“There’s been obviously a recent deepened concern with cybersecurity.  But this is something the ACD has been thinking about for a long time. It has been ahead of its time and done a terrific job identifying emerging threats and issues which we need to be thinking about sooner, rather than... ...

Public-Private Cybersecurity Cooperation

Thursday, March 27th, 2014

Testimony of NPPD Deputy Under Secretary for Cybersecurity Phyllis Schneck. Before the Senate Homeland Security and Governmental Affairs Committee Regarding “Strengthening Public-Private Partnerships to Reduce Cyber Risks to Our Nation’s Critical Infrastructure” March 26, 2014 Chairman Carper, Ranking Member Coburn, and distinguished Members of the Committee, it is a pleasure... ...

Strengthening Public-Private Partnerships to Reduce Cyber Risks to our Nation’s Critical Infrastructure

Wednesday, March 26th, 2014

Testimony Before the United States Senate Committee on Homeland Security and Governmental Affairs March 26, 2014 Introduction Good morning Chairman Carper, Ranking Member Coburn, and distinguished Members of the Committee. I am pleased to appear before you today to discuss cybersecurity partnerships among the federal government, states, and the private... ...

Can Technology Protect Americans from International Cybercriminals?

Thursday, March 20th, 2014

Testimony of Steven R. Chabinsky Jointly before the United States House of Representatives Committee on Science, Space, and Technology; and the Subcommittee on Oversight and Subcommittee on Research and Technology March 4, 2014 Introduction Good morning Chairmen Broun and Bucshon, Ranking Members Maffei and Lipinski, and distinguished Members of the Subcommittees.... ...

ACD Weekly Update, March 8 – 14

Saturday, March 15th, 2014

Russian President Vladimir Putin refuses to announce that he will not annex Crimea to Russia even if Sunday’s referendum outcome will favor such action, Rachel Ehrenfeld says in Crimean Tatars, However, in seizing Crimea, Vladimir Putin may well have bitten off more than he can chew.  This, not because he... ...

The Drone Mystique and Turkey

Wednesday, March 12th, 2014

The recent positioning of US unmanned aerial vehicles, or drones, at bases created in the Horn of Africa, the Arabian Peninsula, the Levant and Afghanistan is a geopolitical event that demands greater consideration. That it does not receive more attention is perhaps due to the fact that drone bases pop-up... ...

Quantum Cryptography: Has the White House Heard of It?

Friday, March 7th, 2014

At long last there’s good news on the cybersecurity front.  As cyber attack has continued to mount exponentially over the past five years, government has been glacially slow at even organizing itself to combat it, or to initiate or adopt proper policies to encourage the private sector. Instead, we are told... ...

Cybersecurity: America’s Achilles’ Heel

Friday, February 14th, 2014

The Cybersecurity Framework, which was announced on February 12, 2014, by President Obama, has very little new to offer to the private sector. It’s only a guide to how everyone should be conceptualizing and communicating about cybersecurity concerns. The report comes a year after the president first announced his Executive... ...

Connect the Dots . . . Please!

Thursday, February 13th, 2014

Recent press accounts illustrate the mainstream media’s growing awareness of threats to the electric power grid and the need to counter them. These threats extend from physical attacks, to cyber attacks, to natural and manmade electromagnetic pulse events that could take down the grid for an indefinite period of time,... ...

Initiatives to Limit EMP Threat

Thursday, January 23rd, 2014

The United States’ electric power grid is more vulnerable today to Electro Magnetic Pulse effects, either by a sun-burst or a high altitude nuclear explosion, than it was five decades ago. Indeed, on December 23, 2013, the Defense Threat Reduction Agency issued a solicitation “to … conduct satellite system performance modeling, satellite system... ...

Hurtling Downhill

Sunday, January 5th, 2014

If recent events are any indication, the pace of U.S. withdrawal from the world and the extent of our fecklessness (and the West’s generally) in the face of threats coming from Islamist terrorism, Russia, China, and Iran  promises to pick up in 2014. Something new pops up every day. Al... ...

Latest Global Cyber Review

Friday, January 3rd, 2014

Israel’s Institute for National Security Studies reported on January 1st: Israel Iranian hackers claim to have extracted personal details of top Israelis army officers An Iranian linked hacker claimed to infiltrate the Israeli Defense Force (IDF) servers last week. The group, calling itself the Islamic Cyber Resistance (ICR), claims to... ...

The Air of Unreality in NSA Reform

Tuesday, December 24th, 2013

The president’s panel found no official malfeasance but recommends overhauling surveillance programs anyway. Grope through the Styrofoam pellets of rhetoric that surround the 46 recommendations in the report issued last week by the president’s Review Group on Intelligence and Communications Technologies, and you will discover that the authors “have not... ...

In the Cyber Domain, the Best Defense is Defense

Tuesday, December 10th, 2013

“Very few decision-makers understand this field in depth…. While it is clear to most in the senior political echelon and the military top ranks what the S-300 or Kalashnikov is, they have no clue about Zeus or Conficker.” (Highly infectious computer worms.) — Erez Kreiner, Nov. 2013 The media’s pre-occupation with... ...