jump to navigation

“US Snipers Changing Warfare” – USAToday May 9, 2012

Posted by Chris Mark in Industry News, terrorism, weapons and tactics.
Tags: , , , , , ,
add a comment

UPDATE: I forgot to hyperlink to the story 😉 There goes my Pulitzer.  You can find the story here.

USAToday published a very interesting and enlightening piece on how US Snipers are being used with great effect in Iraq and Afghanistan.  While I think their assertion that snipers are “changing warfare” is a bit of a stretch, I do agree that the use of snipers is, and always has been, very effective.  I am somewhat disappointed that they didn’t talk about how smart, handsome, dashing, incredibly brave, selfless, and (did I say handsome already?) Marine Scout/Snipers are. (yes…I was a USMC SS but I am NOT biased ;).  The story does give some insight into the training and how snipers are used in warfare.  Overall, a very good read on the subject.

“The Weakest Link”- Insider Foils Underwear Bomb Plot May 8, 2012

Posted by Chris Mark in Risk & Risk Management, terrorism, Uncategorized.
Tags: , , , , , ,
add a comment

I have written extensively about the weakest link in any security program being the actual people responsible.  While we understand this point from a “good guys” perspective, it is just as true for our adversaries.   MSNBC reported today that the underwear bomber who was supposed to blow up a jet liner this month had been working for US and our Allies since day one and was a paid informant.  As stated on MSNBC: “An insider who worked with the United States and an allied security service to thwart an al-Qaida bomb plot hatched in Yemen was the man picked to carry out the suicide attack on a U.S.-bound airliner, U.S. and Yemeni officials tell NBC News. An unidentified Yemeni  government official, speaking on condition of anonymity, said the supposed suicide bomber was working for Western intelligence “from day one.”

The interesting point of this story is that it does not matter whether we are talking about nuclear facilities, cybersecurity, or counter terrorism, the human element always plays a role and is always the most unpredictable.  While the group that sent the man on his suicide mission clearly believed he was a ‘true believer’ willing to give his life for their cause, it appears that he had another agenda.  This is the challenge with security.  Trust but verify is a mantra that rings true in all aspects of security.  Thank goodness the group that tried to blow up the airliner acted on faith and not solid security principles.

Airstrike Kills Al Qaeda Leader wanted in USS Cole Bombing May 6, 2012

Posted by Chris Mark in Industry News, Risk & Risk Management, terrorism.
Tags: , , , , , ,
add a comment

Foxnews reported that an airstrike on Sunday killed an Al Qaeda leader on the FBI’s most wanted list for the 2000 bombing of the USS Cole.  According to Foxnews: ” Fahd al-Quso was hit by a missile as he stepped out of his vehicle, along with another Al Qaeda operative in the southern Shabwa province, Yemeni military officials said. They were speaking on condition of anonymity in accordance with military regulations.” 

“Al-Quso, 37, was on the FBI’s most wanted list, with a $5 million reward for information leading to his capture. He was indicted in the U.S. for his role in the 2000 bombing in the USS Cole in Aden, Yemen, in which 17 American sailors were killed and 39 injured. (more…)

ALERT: CyberAttack Underway Against US Gas Piplines May 6, 2012

Posted by Chris Mark in cybersecurity, Industry News, InfoSec & Privacy, Risk & Risk Management, terrorism.
Tags: , , , , , , ,
1 comment so far

According to stories on MSNBC, CNN, and other major outlets, “A major cyber attack is currently under way aimed squarely at computer networks belonging to US natural gas pipeline companies, according to alerts issued to the industry by the US Department of Homeland Security.”   On March 29th, 2012 the US Department of Homeland Security issued 3 confidential Amber Alerts warning that the US was facing a: “gas pipeline sector cyber intrusion campaign” against multiple pipeline companies.  The attacks, which began 4 months ago, are ongoing today.  The Industrial Control Systems Cyber Emergency Response Team (ICS CERT), which is responsible for helping secure the nation’s industrial control systems said: (more…)

EXTRA! EXTRA! “Bin Laden Documents Published and Available Online” May 3, 2012

Posted by Chris Mark in Industry News, terrorism.
Tags: , , , , , , , ,
add a comment

The Combating Terrorism Center at West Point has published a number of declassified documents taken from the raid that killed Osama Bin Laden.  You can access the documents here.

CNN terrorism analyst Peter Bergen had access to some of the materials while researching his new book, “Manhunt: The Ten Year Search for Bin Laden from 9/11 to Abbottabad.”

“The documents paint a portrait of a man who was simultaneously an inveterate micromanager, but was also someone almost delusional in his belief that his organization could still force a change in American foreign policies in the Muslim world if only he could get another big attack” in the United States, Bergen said on CNN.com this week.