"... suggests transnational or network of such using energy related and financially derived revenue to seed the cyber takeover of global command and control. Their biggest competitive threat is the rapidly declining nation-state 'superpower'. Accelerating that decline is a very high priority and, at the moment, seems to be going as scheduled."
Yes, that AFB. This is it, Toto. |
"The communication technology piece ties it together and provides the state-of-the-art 'firewall' to keep it covert. Conspicuous by its absence - any public disclosure of breaches in the cloak.
This 'squeaky-clean' anomaly is starting to draw attention. Especially given the criminal prosecution history and decades old world stage presence."
This 'squeaky-clean' anomaly is starting to draw attention. Especially given the criminal prosecution history and decades old world stage presence."
"Whistleblowing, in particular would be devastating to an organization heavily reliant on secrecy. As would certain sustained technical disruptions." Think about what a power outage alone could accomplish. But, of course, extensive back-up power systems preclude that option.
"But I think the thought-experiment has merit. Distributed security is vulnerable because of the need to secure more than one site. Centralized security is vulnerable because it is a single target. Avoiding detection is bound to leave large trails that must be hidden from view, one way or another.
"Our problem continues to be a lack of certainty that the resources on which we depend have not been infiltrated by the target or are leaking timing intelligence to it."
"But I think the thought-experiment has merit. Distributed security is vulnerable because of the need to secure more than one site. Centralized security is vulnerable because it is a single target. Avoiding detection is bound to leave large trails that must be hidden from view, one way or another.
"Our problem continues to be a lack of certainty that the resources on which we depend have not been infiltrated by the target or are leaking timing intelligence to it."
© 2011 Buzz Hill
No comments:
Post a Comment