Domestic “Drones” Are the Latest Object of Threat Inflation


Recently, several news outlets reported on a supposed plot by a Moroccan national to use remote controlled model airplanes as flying bombs. The story seems to lend credibility to speculation that model airplanes could be the next terrorist threat. In reality, however, these fears are part of a larger pattern of threat inflation about domestic […]

Couldn’t Attend @FedCyber? Catch What You Can Here

fedcyber (7)

FedCyber hosts events that are off the record. We do that because this is a gathering to work big issues and we need an environment where real decision-makers can feel free to speak their mind. Attendees capture info to take back to their organizations, and some summary minutes and action items are captured, but that […]

Is DHS’ acquisitions program becoming unaffordable? U.S. Energy Department spends $30M to bolster utility cybersecurity tools and more

Here are the top cyber news and stories of the day. Is DHS’ acquisitions program becoming unaffordable? The DHS is under a lot of intense scrutiny lately to re-vamp their acquisition processes in the face of allegations and revelations of inefficiencies and waste. One specific example was from the $3B expenditure on radio upgrades, 8,000 […]

How Not To Be Paralyzed By NSA Revelations

download (1)

This semester at the University of Utah I am teaching Communication 5620, International Communication. In our Thursday sessions, we do a round-up of weekly news items from the previous week, chosen by the students, that relate to international communication. Not surprisingly, most of the stories chosen for this week related to revelations of NSA surveillance, […]

Security-Focused Innovators From Industry, Government and Academia Gathering 6 August in New York


We have previously written about the very virtuous activities of the Security Innovation Network (SINET). This widely known, highly respected collaborative group seeks to advance the state of innovation in the cyber security domain. Information on a coming event you will want to track is provided below. I hope to see you there. From: Event: […]

The Reality of Single Actor Cyber Attacks

Editor’s note: Timothy W. Coleman is a prolific writer and analyst who publishes frequently on topics of interest to operational technologists as well as strategic technology thinkers. Olivia Wilson is an award winning literary theorist. We will be bringing you more of their writings in the coming days.- ed. “The security of our IT systems […]