-
Recent Posts
Archives
Categories
Blogroll
- 3 Quarks Daily
- AlterNet
- AMERICAblog
- Armed and Dangerous
- Bad Astronomy
- cantankerous
- Cosmic Variance
- Crooks and Liars
- Daily Kos
- Dan Froomkin
- David Frum
- DeepCapture
- Digby
- E. J. Dionne
- Edge.org
- Egberto Willies
- Eugene Robinson
- Frank Bruni
- Glenn Greenwald
- Hightower Lowdown
- Hullabaloo
- Improbable Research
- Jeremy Scahill
- Kevin Drum
- Matt Taibbi
- Media Matters for America
- Moneybox
- naked capitalism
- Paul Krugman
- Peter Maass
- Sam Harris
- Scott Adams
- ShadowProof
- Shadowproof
- Skeptic
- skepticblog
- Stonekettle Station
- Stuff That Needs To Be Said
- Swampland
- Tenable Blog
- The BRAD BLOG
- The Dish
- The Dissenter
- The Great Artistic Whatever
- The Maddow Blog
- The Raw Story
- The WAWG Blog
- TomDispatch
- Wall of Separation
- War Room – Salon
- What There Is and Why There Is Anything
- Why Evolution Is True
- Wonkblog
- Wonkette
News and Commentary
- ALEC Exposed
- BBC News
- Center for Inquiry
- Chilling Effects Clearinghouse
- Democracy Now!
- Financial Times
- Foreign Affairs
- Foreign Policy
- McClatchy
- Mother Jones
- National Affairs
- New Statesman
- New York Times
- Open Secrets
- Point of Inquiry
- Politico
- PR Watch
- Project Reason
- ProPublica
- Religion Dispatches
- Reuters
- Science Progress
- Slate
- Talking Points Memo
- Tampa Bay Times PolitiFact
- Techdirt
- The Atlantic
- The Christian Science Monitor
- The Cultural Cognition Project
- The Daily Beast
- The Economist
- The Guardian
- The Intercept_
- The Moderate Voice
- The Nation
- The New Atlantis
- The New Republic
- The New Statesman
- The Pew Forum on Religion & Public Life
- ThinkProgress
- truthout
- Washington Post
Security (National and Information), Privacy and Civil Liberties blogs and sites
- Archives of Risks Digest
- Cryptome
- CSIRT
- Curmudgeonly Ways
- Danger Room
- Dark Reading
- Dragon News
- emptywheel
- FireEye Threat Research Blog
- Freedom to Tinker
- Gene Spafford
- Just Security
- Krebs on Security
- LeakSource
- Light Blue Touchpaper
- Marcus Ranum
- Naked Security
- Schneier on Security
- Shadowserver blog
- Steve Bellovin
- Threat Level
Category Archives: Risk Management
The Wikileaks Brouhaha: Shooting the Messengers and Ignoring the Elephants, Part 5
In this series, we looked at the incompetence and negligence in the Departments of Defense and State that provided an operating environment that enabled Bradley Manning to copy hundreds of thousands of documents without ever being detected. The intent was … Continue reading
The Wikileaks Brouhaha: Shooting the Messengers and Ignoring the Elephants, Part 4
So far in our story, we have focused on the role of the Department of Defense in facilitating Bradley Manning’s opportunity to acquire and export so much classified information. In Part 4, we will shift focus to the Department of … Continue reading
The Wikileaks Brouhaha: Shooting the Messengers and Ignoring the Elephants, Part 3
In Part 2, we looked at the security environment at FOB Hammer and discovered that there was effectively none. That was the first component of the “perfect storm” that enabled Pfc. Manning to collect the video and documents that were … Continue reading
The WikiLeaks Brouhaha: Shooting the Messengers and Ignoring the Elephants, Part 2
Part 1 of this series revisited Pfc. Manning’s activities at Forward Operating Base Hammer with a focus on indicators that provided information about the level of oversight and risk management with respect to protecting Secret and Top Secret-level data. In … Continue reading
The WikiLeaks Brouhaha: Shooting the Messengers and Ignoring the Elephants, Part 1
Introduction Amidst the Sturm und Drang following WikiLeaks’ publication of the State Department cables, Chelsea Manning and Julian Assange drew fire from the DoD, the State Department, the DoJ, Congress and the mainstream media. But with the exception of a few … Continue reading