Category Archives: Uncategorized

My Talk for the Centre for Security Governance on Assumption of Breach, Attribution, and Collaboration

   post

This clip contains my remarks for an eConference hosted by the Centre for Security Governance. I address the need for international collaboration between the U.S. and other countries when it comes to protecting critical infrastructure, the necessity of adopting an “assumption of breach” defense paradigm, and the irrelevance of attribution for corporations.

Read Full Story

Former Classified Presidential Directive to anticipate foreign cyber and tech developments

   post

On January 9, 2008, President Bush signed National Security Presidential Directive (NSPD) 54 / Homeland Security Presidential Directive (HSPD) 23 which back then was classified TOP SECRET. That document was declassified with some redacted material by the NSA on June 5, 2014 thanks to an FOIA request. The purpose of NSPD 54 was to enhance […]

Read Full Story

Classification of Valuable Data for Assumption of Breach

   post

Here’s my paper written for the Georgetown Journal of International Affairs (March 2014) on the importance of classifying your valuable data.

Read Full Story

ODNI must improve Global R&D monitoring (our focus since 2010)

   post

Chances are good that you haven’t heard of S&TI. It’s not one of the INTs that IC watchers love to write about. It’s not in vogue like SIGINT and it’s definitely not as sexy as HUMINT. It is, however, what I and my fellow researchers at Taia Global have been engaged in since 2010 and […]

Read Full Story

An Advance Look at our New Ad

   post

Here’s an early look at our new ad campaign for our commercial database on adversary/rival state R&D projects.

Read Full Story

National Commission Stresses Need for Increased Scientific and Technical Intelligence

   post

“Failure to properly appraise the extent of scientific developments in enemy countries may have more immediate and catastrophic consequences than failure in any other field of intelligence.” —Task Force Report on National Security Organization (the Eberstadt Report) (1948) “Failure to properly resource and use our own R&D to appraise, exploit, and counter the scientific and […]

Read Full Story