30 Sep 2015

Cyber Security Implications of China’s 10-Year, $250 Billion Latin America Investment Plan

The People’s Republic of China’s recently stated plans to invest $250 billion in Latin America over the next 10 years will likely have cyber security implications for U.S. private sector entities operating in the region. Such implications may include increased targeted intrusion attempts by China-linked cyber espionage actors,

Read More
11 Sep 2015

Burundi Conflict: Current Unrest is Not an Ethnic Conflict

Before late-Spring of this year, few internationally-minded Americans would have been able to say anything of consequence about Burundi, perhaps beyond that it is in Africa. The country is small, resource-poor, and relatively politically insignificant, both regionally and internationally. In May, however, an election-related political conflict escalated into a military

Read More
24 Jun 2015

The Yemen Cyber Army: Profile and Analysis

On May 2015, actors claiming affiliation with the Yemen Cyber Army compromised the Government of Saudi Arabia’s Ministry of Foreign Affairs (MFA) website, posting sensitive government data on multiple file-sharing websites. Reporting indicates that the data included Saudi travel visas, personally identifiable information (PII) for Saudi citizens, email messages belonging

Read More
24 Jun 2015

The Americans Supporting ISIS

A state and local Fusion Center has compiled an analysis of the Americans supporting ISIS as an informational tool for law enforcement and first responders. Since late 2014, ISIS has implemented an aggressive, calculated plan to infuse the internet via social media with propaganda, specifically targeting western sympathizers. The use

Read More
16 Jun 2015

The Cybersecurity Infantry, Part II: “Underground” Operations

In the first post in this series, I highlighted the broad utility of the sensible and timely tactical retreat. In this post, I explore the power of operating “underground.” Once again, I turn to H. John Poole’s Phantom Soldier, where he describes the challenge of fighting an adversary who operates

Read More
09 Jun 2015

DHS/FBI Issues Warning Regarding the Threat of Chemical Terrorism

A joint release to law enforcement by the Department of Homeland Security and the FBI highlights the ongoing risk of terrorist used of chemical weapons in an attack. According to the release: “Violent extremists continue to encourage the use of toxic industrial chemicals (TICs) to conduct attacks through violent extremist

Read More
27 May 2015

The Cybersecurity Infantry, Part I: Retreat for Advantage

Read retired Marine H. John Poole’s Phantom Soldier. It doesn’t matter if you’re not in the infantry; read it anyway. It will open your eyes to the Eastern way of small-unit tactics. And while you’re reading it, contemplate the manifold parallels to cybersecurity. It will open your eyes to the

Read More
14 May 2015

DHS Warns That ISIS Belgian Plot Could be Roadmap for U.S. Attack

The Department of Homeland Security has issued a ten page intelligence assessment warning that the disrupted Belgian plot could serve as a warning of future attacks against the U.S. and other Western nations. The Assessment highlights the tactics, targets, and tradecraft allegedly used in a plot disrupted by Belgian authorities

Read More
12 May 2015

DHS Call with Private Sector Highlights Ongoing ISIL Threat

The Department of Homeland Security (DHS) held a teleconference with private sector representatives from the 16 critical infrastructure sectors and subsectors on May 9, 2015. Officials with the Department’s Infrastructure Protection and Intelligence & Analysis offices discussed the current threat environment. Since the beginning of 2015, there has been an

Read More
20 Apr 2015

The Seven Categories of Domestic Terrorists as Defined by the FBI

Domestic Extremists Individuals present in the United States who seek to further political or social goals, wholly or in part, through unlawful acts of force or violence. The mere advocacy of political or social positions, political activism, use of strong rhetoric, or generalized philosophic embrace of violent tactics may not

Read More