Quantcast
Channel: ICTTF International Cyber Threat Task Force: Government and Policy Blogs
Browsing latest articles
Browse All 13 View Live

AL-CIA-DUH MYTH UNRAVELLING?

Double murder-accused US official Raymond Davis has been found in possession of top-secret CIA documents, which point to him or the feared American Task Force 373 (TF373) operating in the region,...

View Article


Domestic Efforts to Combat Cyberterrorism

In this section, I evaluate whether government agencies and the private sector are for implementing counterterrorism measures to combat cyberterrorism.   Government Agencies and the Private Sector...

View Article


U.S. Policy to Prevent a Cyber Attack – Part 1

Technology has outpaced policy in cyberspace. Today’s cyber criminals are technologically agile, perceptive, and evasive. To beat them, there must a unified effort between government and the private...

View Article

U.S. Policy to Prevent a Cyber Attack – Part 2

Difficulties and Needs of a Computer Forensics Program   Legal Evidence.  By most estimates, 90 percent of legal evidence resides in computer systems rather than on paper. Cases involving corporate...

View Article

Child Porn in Ireland

Child Porn in Ireland   Okay this is a topic I get asked about usually in hushed tones by worried looking parents at the end of a seminar. Firstly, need to set some context, any opinions I express here...

View Article


Laptops, Electronic Devices may be taken upon entry to the US

This is a scary new addition to the ongoing powers being given to US officials with regard to DATA. It appears that last week legislation was passed allowing U.S. borders to seize electronic goods...

View Article

Dutch Cyber Security Council Invested

As part of the Dutch National Cyber Security Strategy that was launched earlier this year, one of the two new entities has officially been stood up. On June 30th of this year, Dutch minister Ivo...

View Article

Cyber Diplomacy

Hello everybody,    I have a new topic for you: cyber diplomacy. Few months ago I decided to have cyber diplomacy as my main domain of expertise (master studies on Security and Diplomacy). It's a new...

View Article


SOPA or NOPE-A

SOPA...yes or no? It's never quite so black & white is it?   Copyright infringement- well sure - however does this open the door on the likes of Government censorship like we see in China...I'm...

View Article


THINGS FALL APART, THE CENTRE CANNOT HOLD … – A security perspe

THINGS FALL APART, THE CENTRE CANNOT HOLD … – A security perspective   "Things fall apart; the centre cannot hold..." part of a poem by William Butler Yeats. It's called "The Second Coming" and it was...

View Article

Israel and Iran, expense, capabilities and cyber strategies

In recent days the discovery of Flame malware  has captured the attention of the media, the internet is monopolized by related news, many experts have identified Israel as the author of the tec...

View Article

UK cyber strategy discussed in ISC report 2011/2012

The elaboration of a proper cyber strategy is one the main target of intelligence services all around the world. We often discuss of US and Israel, but also European governments are pushing to...

View Article

Russian government wants to strengthen its cyber defense,what’s

Russian President Vladimir Putin is considered one of the political figures most attentive to the development of a suitable cyber strategy to protect his countries from cyber attacks. Putin is an...

View Article

Browsing latest articles
Browse All 13 View Live