14 May 2015

DHS Warns That ISIS Belgian Plot Could be Roadmap for U.S. Attack

The Department of Homeland Security has issued a ten page intelligence assessment warning that the disrupted Belgian plot could serve as a warning of future attacks against the U.S. and other Western nations. The Assessment highlights the tactics, targets, and tradecraft allegedly used in a plot disrupted by Belgian authorities

0 Read More
12 May 2015

DHS Call with Private Sector Highlights Ongoing ISIL Threat

The Department of Homeland Security (DHS) held a teleconference with private sector representatives from the 16 critical infrastructure sectors and subsectors on May 9, 2015. Officials with the Department’s Infrastructure Protection and Intelligence & Analysis offices discussed the current threat environment. Since the beginning of 2015, there has been an

0 Read More
20 Apr 2015

The Seven Categories of Domestic Terrorists as Defined by the FBI

Domestic Extremists Individuals present in the United States who seek to further political or social goals, wholly or in part, through unlawful acts of force or violence. The mere advocacy of political or social positions, political activism, use of strong rhetoric, or generalized philosophic embrace of violent tactics may not

0 Read More
OKC Memorial2
17 Apr 2015

Twenty Years After Oklahoma City Bombing, Domestic Terrorism Still a Major Threat According to FBI/DHS

Twenty years later, the Oklahoma City Bombing remains the deadliest mass casualty attack in US history carried out by domestic extremists on US soil. Domestic extremism, however, remains a persistent threat, and the United States has experienced violent ideologically-motivated criminal acts, both prior to and after the Oklahoma City attack.

0 Read More
OKC Bombing OODA
16 Apr 2015

The 18 Domestic Terrorism Incidents Over the Past 15 Months That Have the FBI Concerned

Leading into the 20th Anniversary of the Oklahoma City bombing, the DHS/FBI issued a Joint Intelligence Bulletin highlighting the ongoing threat of domestic terrorism. The following is a summary of the cases that occurred over the past 15 months that have them concerned. March 23 2015, Austin, Texas: A

0 Read More
15 Apr 2015

Asymmetric naval warfare in the Taiwan Strait

The recent landing in Taiwan by two USMC F/A-18C Hornet, allegedly due to a mechanical fault and the object of a prompt protest by Beijing, has served as a reminder of the Island’s key location. Sitting astride essential sea lanes of communication (SLOCs), halfway between Japan and South

0 Read More
10 Apr 2015

Kansas-Based Violent Extremist Arrested after Attempting to Detonate Car Bomb at Ft. Riley

The FBI have arrested Kansas-based John T. Booker of Topeka, Kansas, resident agency, for allegedly attempting to use a weapon of mass destruction, maliciously damage and destroy by means of fire and explosive a United States government facility, and attempting to provide material support or resources to the Islamic State

0 Read More
08 Apr 2015

Stay Safe Online by Following the Safety Guidelines Law Enforcement Officers Use

Participating in social networking sites and communicating online can cause anxiety for those that are not comfortable maintaining their online identities to high standard of privacy and security. Additionally, a poorly maintained profile can result in exploitation by malicious attackers seeking to engage in fraud against you and/or your family

0 Read More
06 Apr 2015

U.S. to create Tom Clancy-esque Rainbow Six organization to deal with overseas hostage situations?

According the Washington Post, the Obama administration has circulated a letter sent to the families of U.S. hostage victims articulating a proposal for a “fusion cell” allowing “law enforcement, intelligence and other officials to better coordinate its response to hostage situations.” Some Washington D.C. national security analysts immediately associated the

0 Read More
02 Apr 2015

The Red Teamer’s Top Ten Books

If might expect a red teamer’s top ten list of books to feature volumes on coding, hacking, and pentesting, you’re going to be surprised. In my view, the overarching principles of red teaming exist independent of any specific domain of application. Hence, my theme here is timeless patterns of cross-domain

0 Read More