jump to navigation

“Use of Force” Webcast – Nexus Consulting Group May 16, 2012

Posted by Chris Mark in Industry News, Laws and Leglslation, terrorism, weapons and tactics.
Tags: , , , , , ,
add a comment

Nexus Consulting Group is scheduling a webcast for the week of May 21- 25 on the topic of the Use of Force in Maritime Security.  Recently, a video surfaced of a maritime security company firing on Somali Pirates.  While the topic has been debated, Nexus was mistakenly identified as the company that took action.  If you are interested in learning about Use of Force and the legal issues, then contact Nexus at info@ncga.us and note your interest in attending the webcast and we will advise which sessions are available.  You can download the Use of Force Primer and follow along document here.

Having previously worked for a maritime security company,  I felt pretty informed on the Use of Force and Maritime issues.  After speaking to Kevin on numerous occasions, it was apparent that Kevin is an expert on Maritime Security and the industry at large.  I always come away from a discussion with Kevin impressed and having learned something new about maritime security.  Any knuckle-dragger can carry a gun and use it indiscriminately.  It is appropriate, disciplined use of a weapon that separates professional security from amateurs.  There are few security companies that I would recommend and that have the expertise to protect  ships while minimizing risk to ship owners. Use of force is an critical yet complex subject.  I recommend you take the opportunity to listen to an expert on maritime security and definitely take the opportunity to ask questions.

“Semper Fi?” – Marines Convicted of Selling Weapons to Gangs & China May 15, 2012

Posted by Chris Mark in News, terrorism, weapons and tactics.
Tags: , , , , , , , , ,
1 comment so far

As a former Marine, this is a difficult story for me to write. It does however highlight the importance of the concept of “trust but verify” within security.  As reported in the Jacksonville Daily News, a 2 year investigation by the Naval Criminal Investigation Service (NCIS) has uncovered an operation where 49 Marines and 21 civilians stole and then sold almost $2 million worth of weapons and equipment.  Many of the Marines were stationed at Camp Lejeune, NC and much of the gear was sold on eBay, Craigslist or in face to face meetings.    One of the Marines was a member of the elite Marines Special Operations Command and served with the 3rd Special Operations Battalion.  As stated in the article: “Sgt. Daniel Adam Reich, a former member of 3rd Marine Special Operations Battalion, was convicted of selling and attempting to sell military property and conspiracy. He was sentenced to 40 months in prison and a dishonorable discharge, MarSOC spokesman Maj. Jeff Landis said.” The investigation has since extended into the Air Force and Army. 

The point of this blog post is to show that even our military folks who take an oath of honor and are subject to very stiff penalties for violation of that oath are vulnerable to the same temptations as everyone.  It is not enough to blindly trust people to do the right thing.  While 99% may be honest and have integrity, there is always a small percentage that will give in to temptation.  This is why it is so critical to “trust but verify” in security.

“RSA Doesn’t Dine Alone” – China Suspected In Pipeline Attack May 13, 2012

Posted by Chris Mark in cybersecurity, InfoSec & Privacy, terrorism.
Tags: , , , , , , , , ,
add a comment

For background on this story, please read the previous post, as well as an earlier post titled: “Cyberattack underway against US Pipelines”. While the timing of this story is fortuitous for this author, the event is frightening.  According to the Christian Science Monitor “Those analyzing the cyberspies who are trying to infiltrate natural-gas pipeline companies have found similarities with an attack on a cybersecurity firm a year ago. At least one US government official has blamed China for that earlier attack.”  The referenced security firm is RSA.   Again quoting CSM: “Investigators hot on the trail of cyberspies trying to infiltrate the computer networks of US natural-gas pipeline companies say that the same spies were very likely involved in a major cyberespionage attack a year ago on RSA Inc., a cybersecurity company. And the RSA attack, testified the chief of the National Security Agency (NSA) before Congress recently, is tied to one nation: China.”

Anyone who doubt that the US is under attack by  China should read about the attacks against Dupont, RSA, Lockheed Martin, and more.

“I can neither confirm nor deny”; NSA + Google = Glomar Response May 12, 2012

Posted by Chris Mark in News, Risk & Risk Management, terrorism.
Tags: , , , , , , ,
add a comment

In a story on Foxnews it is revealed that a US Federal Appeals court has turned down a request under the Freedom of Information Act that would have forced the National Security Agency to disclose what, if any, relationship it has with Google and specifically a cyberattack against Google which originated in China.  According to the story: “The Electronic Privacy Information Center, which focuses on privacy and civil liberties, sought communications between Google and the NSA, which conducts worldwide electronic surveillance and protects the U.S. government from such spying. But the NSA refused to confirm or deny whether it had any relationship with Google. The NSA argued that doing so could make U.S. government information systems vulnerable to attack.”

Now for some history- In April 1968, the Soviet Union’s K129 nuclear submarine sank.  Seeing an opportunity to get some intelligence, the US CIA’s Special Activities Division came up with a plan known as Project Azorian.  Using Howard Hughes’ company as a front, they commissioned the Hughes Glomar Explorer.  Hughes claimed the ship was designed to extract minerals from the ocean floor.  The HGE was sent to pick up the remains of the submarine and return them to the US.  When the project came to light and the US Government was asked about the project, the response was: “I can neither confirm nor deny” the existence of such a project.  Thus was born the Glomar Response or Glomar Denial…

“Pot…Meet Kettle”…Syria Urges UN to Stop Terrorism in Damascus (cough, cough) May 10, 2012

Posted by Chris Mark in News, terrorism, weapons and tactics.
Tags: , , , , , ,
1 comment so far

I had to comment on an article I just read on MSNBC.com titled: “Syria Urges UN to Stop ‘Terrorism’ Following Damascus Blasts”.  The basis of the article is that Assad’ government is claiming that the two bombs that went off in Damascus yesterday (35 killed and over 300 wounded) is evidence of “foreign terrorism”.  According to the article: “Syria’s foreign ministry said the bombing was a sign the country is facing foreign-backed terrorism and called on the United Nations Security Council to take measures against countries or groups supporting violence in the revolt against President Bashar Assad.”  While I try to keep this blog professional and on the up and up, I do have to say that Syria sure has some…(ahem)…cajones to make a plea like that. “Syria stresses the importance of the UNSC taking measures against countries, groups and news agencies that are practicing and encouraging terrorism,” the state news agency SANA quoted the ministry as saying in a letter addressed to the Security Council.  Lets take a spin over to the Council on Foreign Relations website to investigate our friends in Syria. (not the citizens but the government). 

Does Syria support terrorism? (from the CFR website) (more…)