“I can neither confirm nor deny”; NSA + Google = Glomar Response May 12, 2012
Posted by Chris Mark in News, Risk & Risk Management, terrorism.Tags: Chris Mark, freedom of information act, Glomar, google, mark consulting group, NSA, privacy, security
add a comment
In a story on Foxnews it is revealed that a US Federal Appeals court has turned down a request under the Freedom of Information Act that would have forced the National Security Agency to disclose what, if any, relationship it has with Google and specifically a cyberattack against Google which originated in China. According to the story: “The Electronic Privacy Information Center, which focuses on privacy and civil liberties, sought communications between Google and the NSA, which conducts worldwide electronic surveillance and protects the U.S. government from such spying. But the NSA refused to confirm or deny whether it had any relationship with Google. The NSA argued that doing so could make U.S. government information systems vulnerable to attack.”
Now for some history- In April 1968, the Soviet Union’s K129 nuclear submarine sank. Seeing an opportunity to get some intelligence, the US CIA’s Special Activities Division came up with a plan known as Project Azorian. Using Howard Hughes’ company as a front, they commissioned the Hughes Glomar Explorer. Hughes claimed the ship was designed to extract minerals from the ocean floor. The HGE was sent to pick up the remains of the submarine and return them to the US. When the project came to light and the US Government was asked about the project, the response was: “I can neither confirm nor deny” the existence of such a project. Thus was born the Glomar Response or Glomar Denial…
“The Weakest Link”- Insider Foils Underwear Bomb Plot May 8, 2012
Posted by Chris Mark in Risk & Risk Management, terrorism, Uncategorized.Tags: al qaeda, Chris Mark, mark consulting group, operational security, security, terrorism, underwear bomber
add a comment
I have written extensively about the weakest link in any security program being the actual people responsible. While we understand this point from a “good guys” perspective, it is just as true for our adversaries. MSNBC reported today that the underwear bomber who was supposed to blow up a jet liner this month had been working for US and our Allies since day one and was a paid informant. As stated on MSNBC: “An insider who worked with the United States and an allied security service to thwart an al-Qaida bomb plot hatched in Yemen was the man picked to carry out the suicide attack on a U.S.-bound airliner, U.S. and Yemeni officials tell NBC News. An unidentified Yemeni government official, speaking on condition of anonymity, said the supposed suicide bomber was working for Western intelligence “from day one.”
The interesting point of this story is that it does not matter whether we are talking about nuclear facilities, cybersecurity, or counter terrorism, the human element always plays a role and is always the most unpredictable. While the group that sent the man on his suicide mission clearly believed he was a ‘true believer’ willing to give his life for their cause, it appears that he had another agenda. This is the challenge with security. Trust but verify is a mantra that rings true in all aspects of security. Thank goodness the group that tried to blow up the airliner acted on faith and not solid security principles.
Airstrike Kills Al Qaeda Leader wanted in USS Cole Bombing May 6, 2012
Posted by Chris Mark in Industry News, Risk & Risk Management, terrorism.Tags: al qaeda, Al-Quso, Chris Mark, mark consulting group, terrorism, USS cole, yemen
add a comment
Foxnews reported that an airstrike on Sunday killed an Al Qaeda leader on the FBI’s most wanted list for the 2000 bombing of the USS Cole. According to Foxnews: ” Fahd al-Quso was hit by a missile as he stepped out of his vehicle, along with another Al Qaeda operative in the southern Shabwa province, Yemeni military officials said. They were speaking on condition of anonymity in accordance with military regulations.”
“Al-Quso, 37, was on the FBI’s most wanted list, with a $5 million reward for information leading to his capture. He was indicted in the U.S. for his role in the 2000 bombing in the USS Cole in Aden, Yemen, in which 17 American sailors were killed and 39 injured. (more…)
ALERT: CyberAttack Underway Against US Gas Piplines May 6, 2012
Posted by Chris Mark in cybersecurity, Industry News, InfoSec & Privacy, Risk & Risk Management, terrorism.Tags: Chris Mark, cybersecurity, Gas Pipeline, ICS CERT, InfoSec, mark consulting group, security, terrorism
1 comment so far
According to stories on MSNBC, CNN, and other major outlets, “A major cyber attack is currently under way aimed squarely at computer networks belonging to US natural gas pipeline companies, according to alerts issued to the industry by the US Department of Homeland Security.” On March 29th, 2012 the US Department of Homeland Security issued 3 confidential Amber Alerts warning that the US was facing a: “gas pipeline sector cyber intrusion campaign” against multiple pipeline companies. The attacks, which began 4 months ago, are ongoing today. The Industrial Control Systems Cyber Emergency Response Team (ICS CERT), which is responsible for helping secure the nation’s industrial control systems said: (more…)
