top of page
![](https://static.wixstatic.com/media/57d63d_28d4aa40824844648c5d0da03af30e2f~mv2_d_5472_3648_s_4_2.jpg/v1/fill/w_558,h_372,al_c,q_80,usm_0.66_1.00_0.01,enc_avif,quality_auto/57d63d_28d4aa40824844648c5d0da03af30e2f~mv2_d_5472_3648_s_4_2.jpg)
Blog
Search
![Critical Infrastructure Takes a Critical Hit: M20 SME Review](https://static.wixstatic.com/media/57d63d_c47424a8abea40c6bc02dce35923b2c6~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/57d63d_c47424a8abea40c6bc02dce35923b2c6~mv2.webp)
M20 Associates
May 11, 20214 min read
Critical Infrastructure Takes a Critical Hit: M20 SME Review
Critical Infrastructure Takes a Critical Hit: Largest U.S. pipeline shuts down after ransomware attack By: M20 Associates SME May 11,...
35 views
![](https://static.wixstatic.com/media/57d63d_a3bf0fde9cde4fc98235faeb9308653e~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_a3bf0fde9cde4fc98235faeb9308653e~mv2.webp)
![Cyberthreat’s Most Effective Attack Vector Is the Economy- SME Review](https://static.wixstatic.com/media/57d63d_a3bf0fde9cde4fc98235faeb9308653e~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_a3bf0fde9cde4fc98235faeb9308653e~mv2.webp)
M20 Associates
Feb 12, 20211 min read
Cyberthreat’s Most Effective Attack Vector Is the Economy- SME Review
Cyberthreat's Most Effective Attack Vector Is The Economy By: Robert K. Akerman Link to the article referenced: https://bit.ly/36ZyuMj...
26 views
![SecDef nominee pledges to evaluate information operations - M20 SME Review](https://static.wixstatic.com/media/57d63d_334a51eb7587413a8a3e0481f89c4d42~mv2.png/v1/fill/w_454,h_290,fp_0.50_0.50,q_95,enc_auto/57d63d_334a51eb7587413a8a3e0481f89c4d42~mv2.webp)
M20 Associates
Feb 9, 20211 min read
SecDef nominee pledges to evaluate information operations - M20 SME Review
SecDef nominee pledges to evaluate information operations - M20 SME Review By: Mark Pomerleau Link to article referenced:...
35 views
![](https://static.wixstatic.com/media/57d63d_dd83ff66887748c0928a3e0d99c734bb~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_dd83ff66887748c0928a3e0d99c734bb~mv2.webp)
![CISA Drone Report- SME Review](https://static.wixstatic.com/media/57d63d_dd83ff66887748c0928a3e0d99c734bb~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_dd83ff66887748c0928a3e0d99c734bb~mv2.webp)
M20 Associates
Dec 9, 20202 min read
CISA Drone Report- SME Review
CISA Drone Report- SME Review By: M20 Associates Subject Matter Experts December 2020 The Department of Homeland Security's Cybersecurity...
78 views
![](https://static.wixstatic.com/media/57d63d_655b963a83e14a9babfe0a0ed922384b~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_655b963a83e14a9babfe0a0ed922384b~mv2.webp)
![Texas Driver's License Data Breach Update- SME Review](https://static.wixstatic.com/media/57d63d_655b963a83e14a9babfe0a0ed922384b~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_655b963a83e14a9babfe0a0ed922384b~mv2.webp)
M20 Associates
Nov 19, 20201 min read
Texas Driver's License Data Breach Update- SME Review
Info of 27.7 million Texas drivers exposed in Vertafore data breach By: Catalin Cimapanu Link to article referenced:...
29 views
![](https://static.wixstatic.com/media/57d63d_0b242a1dcdfe4e20b464e6761f50be81~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_0b242a1dcdfe4e20b464e6761f50be81~mv2.webp)
![The Chinese created a database to track American Nuclear Scientist and Military Officers- SME Review](https://static.wixstatic.com/media/57d63d_0b242a1dcdfe4e20b464e6761f50be81~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_0b242a1dcdfe4e20b464e6761f50be81~mv2.webp)
M20 Associates
Nov 10, 20201 min read
The Chinese created a database to track American Nuclear Scientist and Military Officers- SME Review
A Chinese Database Is Tracking American Nuclear Scientists and Military Officers By: Caroline Delbert Link to article:...
71 views
![](https://static.wixstatic.com/media/57d63d_acaf68a755fd4f9ea016c690fedc4fc8~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_acaf68a755fd4f9ea016c690fedc4fc8~mv2.webp)
![Voter Information- SME Review and Thoughts](https://static.wixstatic.com/media/57d63d_acaf68a755fd4f9ea016c690fedc4fc8~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_acaf68a755fd4f9ea016c690fedc4fc8~mv2.webp)
M20 Associates
Nov 3, 20201 min read
Voter Information- SME Review and Thoughts
Iran Using Voter Data to Spoof Floridians, Warn US Intelligence Leaders By: Patrick Tucker Link to Article Referenced:...
21 views
![](https://static.wixstatic.com/media/57d63d_9f67f1ce40384191a9c1872abf1ab2b6~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_9f67f1ce40384191a9c1872abf1ab2b6~mv2.webp)
![More nation-states are Cyber Threats - M20 SME Review](https://static.wixstatic.com/media/57d63d_9f67f1ce40384191a9c1872abf1ab2b6~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_9f67f1ce40384191a9c1872abf1ab2b6~mv2.webp)
M20 Associates
Oct 28, 20201 min read
More nation-states are Cyber Threats - M20 SME Review
It is evident that not only cyber-criminals but all four pose a credible threat to any sector of the United States.
31 views
![](https://static.wixstatic.com/media/57d63d_961259f7183846f0affcc5ddb230d2a1~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_961259f7183846f0affcc5ddb230d2a1~mv2.webp)
![Updated: Cartels and Terrorists—Adaptation Cause for Alarm](https://static.wixstatic.com/media/57d63d_961259f7183846f0affcc5ddb230d2a1~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_961259f7183846f0affcc5ddb230d2a1~mv2.webp)
M20 Associates
Sep 27, 20201 min read
Updated: Cartels and Terrorists—Adaptation Cause for Alarm
Download Paper Here Recent Articles US Today: Drug Cartel Drone Attack in the US and Mexico The WarZone: New Details Emerge On The...
28 views
![](https://static.wixstatic.com/media/57d63d_57eaa9ce045a4cd789ac8ca585a47eae~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_57eaa9ce045a4cd789ac8ca585a47eae~mv2.webp)
![China’s Global Aid to Cartels](https://static.wixstatic.com/media/57d63d_57eaa9ce045a4cd789ac8ca585a47eae~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_57eaa9ce045a4cd789ac8ca585a47eae~mv2.webp)
M20 Associates
Sep 15, 20201 min read
China’s Global Aid to Cartels
China’s presence in drug trafficking arenas has been increasing; they are heavily involved in global money laundering & chemical production.
33 views
![](https://static.wixstatic.com/media/57d63d_94fbf014e5de49b1b4857a76dc7ff752~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_94fbf014e5de49b1b4857a76dc7ff752~mv2.webp)
![THE LIMITS OF INTUITION: ARMY INTELLIGENCE SHOULD EMBRACE ANALYTIC TRADECRAFT STANDARDS-SME Review](https://static.wixstatic.com/media/57d63d_94fbf014e5de49b1b4857a76dc7ff752~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_94fbf014e5de49b1b4857a76dc7ff752~mv2.webp)
M20 Associates
Jul 14, 20201 min read
THE LIMITS OF INTUITION: ARMY INTELLIGENCE SHOULD EMBRACE ANALYTIC TRADECRAFT STANDARDS-SME Review
Analytic Standards are very important but need review based on the incorporation (or re-incorporation) of Information Operations, Cyber, Ele
49 views
![](https://static.wixstatic.com/media/57d63d_42119ccc445a44f5ba49617b80248eb8~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_42119ccc445a44f5ba49617b80248eb8~mv2.webp)
![Researchers link APT15 hackers to Chinese military company- M20 SME Review](https://static.wixstatic.com/media/57d63d_42119ccc445a44f5ba49617b80248eb8~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_42119ccc445a44f5ba49617b80248eb8~mv2.webp)
M20 Associates
Jul 7, 20202 min read
Researchers link APT15 hackers to Chinese military company- M20 SME Review
The motivation behind the large scale surveillance operation on ethnic minorities, both within and outside of China.
64 views
![](https://static.wixstatic.com/media/57d63d_89e4d778f1de49ce8a45d3df14a15647~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_89e4d778f1de49ce8a45d3df14a15647~mv2.webp)
![Dozens wounded in Lebanon as protesters demand basic rights](https://static.wixstatic.com/media/57d63d_89e4d778f1de49ce8a45d3df14a15647~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_89e4d778f1de49ce8a45d3df14a15647~mv2.webp)
M20 Associates
Jun 8, 20201 min read
Dozens wounded in Lebanon as protesters demand basic rights
For decades now Hezbollah and Iran have focused on securing their positions within the government of Lebanon.
25 views
![](https://static.wixstatic.com/media/57d63d_bb1a962a15294b3181fa94a33604db03~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_bb1a962a15294b3181fa94a33604db03~mv2.webp)
![Why China’s Technology Theft Poses a Bigger Challenge Than That of the Soviet Union](https://static.wixstatic.com/media/57d63d_bb1a962a15294b3181fa94a33604db03~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_bb1a962a15294b3181fa94a33604db03~mv2.webp)
M20 Associates
Jun 2, 20201 min read
Why China’s Technology Theft Poses a Bigger Challenge Than That of the Soviet Union
China has demonstrated the skill to not only steal technology, and intellectual property at an accelerated rate over the past decade.
26 views
![](https://static.wixstatic.com/media/57d63d_3fd8c6da2c914cdb8824f2b7714abb00~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_3fd8c6da2c914cdb8824f2b7714abb00~mv2.webp)
![Iran picks cyber fight with Israel as both sides target critical infrastructure](https://static.wixstatic.com/media/57d63d_3fd8c6da2c914cdb8824f2b7714abb00~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_3fd8c6da2c914cdb8824f2b7714abb00~mv2.webp)
M20 Associates
May 27, 20201 min read
Iran picks cyber fight with Israel as both sides target critical infrastructure
This topic is something that security experts have been warning about.
34 views
![](https://static.wixstatic.com/media/57d63d_efa34cf4cfa8425598117cb88c1fffb6~mv2_d_3840_2160_s_2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_efa34cf4cfa8425598117cb88c1fffb6~mv2_d_3840_2160_s_2.webp)
![BGP Hijacking: In today’s world a real concern](https://static.wixstatic.com/media/57d63d_efa34cf4cfa8425598117cb88c1fffb6~mv2_d_3840_2160_s_2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_efa34cf4cfa8425598117cb88c1fffb6~mv2_d_3840_2160_s_2.webp)
M20 Associates
Apr 16, 20201 min read
BGP Hijacking: In today’s world a real concern
Russian Telco Hijacked Internet Traffic of Major Networks - Accident or Malicious Action? By: Kevin Townsend Link to the article...
25 views
![](https://static.wixstatic.com/media/57d63d_7770591427fb401f8321935a6ab49871~mv2_d_5000_3334_s_4_2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_7770591427fb401f8321935a6ab49871~mv2_d_5000_3334_s_4_2.webp)
![U.S. dependence on China's rare earth: Trade war vulnerability- M20 SME Article Review](https://static.wixstatic.com/media/57d63d_7770591427fb401f8321935a6ab49871~mv2_d_5000_3334_s_4_2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_7770591427fb401f8321935a6ab49871~mv2_d_5000_3334_s_4_2.webp)
M20 Associates
Jul 2, 20191 min read
U.S. dependence on China's rare earth: Trade war vulnerability- M20 SME Article Review
U.S. dependence on China's rare earth: Trade war vulnerability By: Simon Webb, Lisa Shumaker and Jonathan Oati Link to article...
16 views
![](https://static.wixstatic.com/media/57d63d_67eb310661da47c9b554e980f6897811~mv2_d_3648_3000_s_4_2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_67eb310661da47c9b554e980f6897811~mv2_d_3648_3000_s_4_2.webp)
![Election Rules Are an Obstacle to Cyber Security of Presidential Campaigns- M20 SME Article Review](https://static.wixstatic.com/media/57d63d_67eb310661da47c9b554e980f6897811~mv2_d_3648_3000_s_4_2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_67eb310661da47c9b554e980f6897811~mv2_d_3648_3000_s_4_2.webp)
M20 Associates
Jun 10, 20191 min read
Election Rules Are an Obstacle to Cyber Security of Presidential Campaigns- M20 SME Article Review
Election Rules Are an Obstacle to Cyber Security of Presidential Campaigns By: Nicole Perlroth and Matthew Rosenberg Link to article...
20 views
![](https://static.wixstatic.com/media/57d63d_a513afe0c27c4e319b2ccc6ea410fe4a~mv2_d_6000_3000_s_4_2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/57d63d_a513afe0c27c4e319b2ccc6ea410fe4a~mv2_d_6000_3000_s_4_2.webp)
![Cyber Warfare In The Grey Zone: Wake Up, Washington- M20 SME Article Review](https://static.wixstatic.com/media/57d63d_a513afe0c27c4e319b2ccc6ea410fe4a~mv2_d_6000_3000_s_4_2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/57d63d_a513afe0c27c4e319b2ccc6ea410fe4a~mv2_d_6000_3000_s_4_2.webp)
M20 Associates
Apr 24, 20191 min read
Cyber Warfare In The Grey Zone: Wake Up, Washington- M20 SME Article Review
Cyber Warfare In The Grey Zone: Wake Up, Washington By: Sydney J. Freedberg Jr. Link to the article that is referenced: ...
36 views
bottom of page