Showing posts with label Infiltrate. Show all posts
Showing posts with label Infiltrate. Show all posts

November 19, 2015

Vetting The Refugees--Do You Think It'll Work?

So not that anyone was so thrilled with the Syria and Iraq refugee idea post 9/11 to begin with...

But now 31 States have come straight out refusing to take these refugees post the terror attack that happened just last week in Paris--where at least one of the terrorists was...

Guess what?

That's right!  A fake refugee from Syria

But what about the "intensive vetting process" that is being promised for these 10,000 refugees?

Well what can be more intensive than the vetting that the American government does on employees working for highly sensitive agencies like the CIA, FBI, and NSA? 

So how has that worked out?

Probably not too bad, but the problem is that no vetting no matter how thorough is foolproof, hence major spies have infiltrated these organizations for years or even decades and caused immense harm to national security:

Robert Hanssen (former FBI--spied for the Soviets for 21 years)

Aldrich Ames (31-year veteran of the CIA, compromised 2nd largest number of CIA agents after Robert Hanssen)

Edward Snowden (leaked classified information from the NSA on our surveillance programs)

The point is that no matter how well we vet 10,000 or more refugees from Iraq and Syria, with ISIS vowing "to strike America at its center in Washington"--there certainly can be some errors in the screening and final adjudication process.

Again no vetting process is perfect--especially when the refugees themselves are admitting that fake ideas are being given out to them like candy in a candy store. 

So that's the dilemma we now face:

HEART--do what our heart tells us to and help people in need by taking in the refugees.

OR 

HEAD--follow our heads not risking another one or more potentially devastating terror attacks on the U.S. homeland. 

The choice is heartbreaking or headache producing! ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark

September 13, 2014

6 D's Of Cyberwar

Popular Science had a interesting article that spelled out the six D's of Cyberwar:

On the offensive side, you want to destroy, deny, degrade, disrupt, and deceive.

"Unlike World War II code breaking, cyber attacks offer the potential to not just read the enemy's radio, but to seize control of the radio itself."

- Step 1: Infiltrate the enemy's networks and communications and gather/exfiltrate information.

- Step 2:  Compromise the enemy's information either by:

1) Corrupting the enemy's information, planting misinformation, sewing erroneous reports, and causing poor decision-making. 
2) Taking control of their networks, disabling or jamming them, and disrupting their command and control or harming their critical infrastructure and causing mass confusion, destruction, and death.

Examples are "not merely to destroy the enemy's tanks, but to make them drive in circles--or even attack each other" or to cyber attack an enemies control systems for electricity, dams, transportation, banking, and so on. 

With the ability to steal information, sow misinformation, seize control, or even stop the information flow altogether, cyberwar is not just another weapon in our arsenal, but "a tool to help achieve the goals of any given operation."

On the flip side, you want to defend against the enemy's use of cyberspace to hurt us.

We need to continue to get serious about cyberwarfare and cybersecurity and become the masters in the information domain, and quickly. ;-)

(Source Photo: Andy Blumenthal)
Share/Save/Bookmark