★★ Get the Kindle version FREE when purchasing the Paperback! ★★
Learn How to Set Up and Configure Linux from Scratch!
This book has been created to guide you through your very first steps in the Linux environment, whether you are a complete novice or need an in-depth refresher in Linux.
Continue reading “Linux: Installation, Configuration and Command Line Basics”
On November 23, 2013, China's Ministry of National Defense spokesman announced that a new air defense intercept zone (ADIZ) will be established by the government to include the Diaoyu, or Senkaku Islands. Sovereignty over these islands is disputed by Japan, China, and Taiwan. The new ADIZ also included a submerged rock that falls inside overlapping Exclusive Economic Zones (EEZ) claimed by China, Japan, and South Korea. Pundits and policy analysts quickly engaged in a broad debate about whether China's expanded ADIZ is designed to create tension in Asia, or is part of a broader plan to impose a new definition of China's territorial space in the Asia-Pacific region. Meanwhile, to deal with cyber penetrations attributed to the Chinese People's Liberation Army (PLA), the U.S. Departments of Justice, Homeland Security, and State are devising new means to protect intellectual property and secrets from the PLA's computer network operations.
Dr. Larry M. Wortzel's monograph puts these events into perspective. The ADIZ announcement by China, at one level, is an example of the PLA General Political Department engagement in what it calls "legal warfare," part of the PLA's "three warfares." In expanding its ADIZ, China is stretching International Civil Aviation Organization regulations to reinforce its territorial claims over the Senkaku Islands, administered by Japan. China calls these the Diaoyu Islands and, along with Taiwan, claims them for its own. On another level, the Chinese government will use the ADIZ as a way to increase the airspace it can monitor and control off its coast; it already is suing the navy and maritime law enforcement ships to enforce these claims at sea. Additionally, the PLA and the Chinese government have sent a major signal to Taiwan, demonstrating another aspect of the "three warfares." When the Chinese Ministry of National Defense put its expanded ADIZ into effect, the new zone carefully avoided any infringement into Taiwan's ADIZ, signaling that in addition to the improved economic ties with Taiwan, there is room for political improvement across the Taiwan Strait.
Continue reading “Chinese People’s Liberation Army and Information Warfare – PLA, Network-Centric Warfare, Electronic and Cyber Warfare, China Espionage, Implications for United States, Psychological Warfare”
This briefing has been funded and approved for delivery in its present form, in April 2016, to the military, police, and national intelligence services of Denmark. It was also presented in Norway, but less formally. As NATO and a number of countries “re-think” Open Source Intelligence (OSINT), this briefing and the related white paper, should help focus on the essentials that have been neglected for the past quarter century.
It is nothing less than an indictment of 25 years of expensive passive failure associated with the mis-direction of OSINT away from active human sourcing as I originally envisioned, toward passive online searching that is, as one study recently concluded, over 80% absolute garbage.
Continue reading “Open Source Intelligence (OSINT) Done Right: An Indictment of 25 years of expensive passive failure.”
In late November 2014, Sony Pictures unwittingly found itself at the center of a real-life spy caper when its computer systems were hacked by a group calling itself the “Guardians of Peace.” There was immediate speculation that North Korea was behind the attack, a payback for Sony’s new movie “The Interview,” a black comedy that featured a plot to assassinate North Korea’s leader, Kim Jong-un. The attack soon became an international incident, with President Obama threatening retaliation against North Korea and the F.B.I. launching an investigation. Fearing reprisals, Sony canceled the movie’s release and was widely criticized (it later offered a limited run). Perhaps even more devastating for the studio was the exposure of embarrassing emails about some of the world’s biggest movie stars, revealing details about contracts and gender-based salary inequities. This Tbook, a selection of articles from The New York Times, chronicles the fallout of the Sony hacking — one of the most damaging cyberattacks in recent history.