source:  submitted by Artemus FAN, Jim Gossler


Attached is the recently published unclassified version of "Cyber as a Strategic Capability", a product of the Defense Science Board where our own FAN. Jim Gossler was a co-chair.  For those interested in digging deeper into cyber issues, this study along with another 13 cyber related DSB studies can be found on the DSB website.  The classified versions of these reports are available through proper channels by contacting the DSB office. 
Thanks to Jim for providing the report!

   source:  (contributed by Artemus FAN, Steve Jones)


A fascinating, perhaps somewhat disturbing but nevertheless ponderous video contributed by our own FAN, Steve Jones (Thank you, Steve!).  If this doesn't make you say "hmmmmmm", nothing will.  We'd love to hear your thoughts on this topic.  Simply click the link labeled "Autonomous Weapons" below.  It will take you to the video on


Autonomous Weapons


During the week of Black Hat and Defcon, tens of thousands of security experts and hackers flock to Las Vegas for the back-to-back conferences. They hold discussions on issues like smart cities getting hackedtwo-factor authentication, and security issues with voice assistants.

It can all get a little technical. But with so much cybersecurity knowledge in one place, I decided to ask individual experts for a single useful cybersecurity tip for the average person.

One of these tips may end up making all the difference when a hacker comes after you. Learning a little about how to protect yourself is increasingly critical at a time when hacker attacks on companies like Equifax and Yahoo can expose your personal information. But cybersecurity advice tends to be technical or inconvenient, which is why a lot of people tend to ignore it.

Think about how many 32-character passwords you really have, or how often you reuse your passwords. It's a Cybersecurity 101 practice, but might not be simple for everyone. As a parallel, think about how often dentists say you should floss twice every day, and how you lie every time by saying that you do.


"Security people are rarely the best people to advise about mass usability," Parisa Tabriz, Google's director of engineering, said in her keynote speech at the Black Hat cybersecurity conference Aug. 8.

So here's our roundup of advice on cybersecurity from the experts at Black Hat and Defcon. See for yourselves which tips you think are actually usable.

Parisa Tabriz, director of engineering at Google

Use Chrome.

I'm obviously biased, but Chrome stays up-to-date, and there are a lot of things we build in to keep people from ever encountering a phishing site or a site that's going to download malware. We definitely invest in making it the most secure browser from an exploitation standpoint.

Think about the software you're using in the same way that you'd look at a safety report for a car you're going to buy.

Marcela A. Denniston, vice president of field engineering at ShieldX Networks

Use dual-factor authentication and biometrics as often as possible to make gaining access to personal accounts, systems and data more difficult for hackers.


For Putin and company, election season in America is open season for meddling.

Earlier this month, Facebook announced it had detected and shut down more than 30 Russia-linked fake pages created as part of a campaign to influence the U.S. midterm elections. In case there was any doubt, Russia’s effort to influence American politics continues.

The Russian government has one overriding objective with regard to the United States: to weaken America so that it loses its will and ability to counter Russian objectives, including establishing a sphere of influence in eastern Europe. To that end, the Kremlin actively exploits and deepens political, cultural, economic, racial, and other societal rifts in America. If Americans are fighting one another, they are less likely to notice, much less press, the government to block Russian action in places like Ukraine, Georgia, or Syria.

Today, the Kremlin is likely employing a three-pronged strategy to achieve its aims: supporting U.S. political candidates friendly to Russian President Vladimir Putin, buying favor by injecting money into U.S. politics and lobbying, and conducting cyberattacks on election systems. Americans also cannot dismiss the possibility that the Russian government will attack critical U.S. infrastructure, or that it may have unpredictable tricks up its sleeve.  

First, Moscow will continue to assist Putin-friendly U.S. candidates and seek to hurt his critics through methods such as messaging tailored to suppress voter participation. Russia pulled this off in 2016, targeting African Americans with negative claims about Hillary Clinton. Already in 2018, Russians have continued to support efforts to undermine the Democratic Party. The #WalkAway campaign, purportedly an organic campaign of lifelong Democrats leaving the party, has been amplified by Russian social-media accounts and featured on the Russian propaganda outlet RT. Between now and the election, the Kremlin may set up websites through third parties and post misleading or incorrect information about voting locations and times, or derogatory information about candidates. It could continue to organize demonstrations through Russian agents or unwitting citizens.