Attribution is Hard, Part 1 | Tenable Network Security

To accurately establish attribution, you need evidence and understanding: Evidence linking the presumed attacker to the attack An understanding of the attacker’s actions, supporting that evidence Evidence collected from other systems that matches the understanding of the attacker’s actions An understanding of the sequence of events during the attack, matching the evidence via Attribution is […]

China’s strategy: infowar, poliwar, lawfare

Deceive spectrum activity at its finest. It doesn’t have to be all political, after all. So China makes dubious legal claims, convinces people that they are real by creating media illusion, and creating political discontent. This is not new, but apparently the west never gave it any great strategic thought… Bet we haven’t given any […]

A predictive model for cyber warfare

http://www.pnas.org/content/early/2014/01/08/1322638111.full.pdf+html So this has the potential to be an awesome entry. An analytical tool to figure out the optimal timing of deployment of a zero-day. In short, how to catch your enemy with their cyber pants down. Pretty cool idea. Need to do more than read the abstract to decide if its useful.

Claims that cyberspace is now cyberbattlefield

http://resources.infosecinstitute.com/classified-nsa-exploit-tools-radon-dewsweeper-work/ From the article: Security expert Bruce Schneier is one of the most authoritative experts who revealed that the NSA has a wide-ranging arsenal of zero-day exploits to use for cyber operations. The revelation isn’t surprising, the security community is aware of the great effort spent by governments on cyber operations. Many intelligence agencies have […]

Cyber mass shooter

http://p.washingtontimes.com/news/2013/oct/3/cyber-mass-shooter-poses-future-threat-computer-se/ What a great article. Of course General Hayden’s comments beg the question, how do you stop a criminal, if you can’t defend yourself? This really goes directly to the need to be able to respond to an immediate threat with a proportional use of force in self-defense. Of course, some will argue that it […]

Malware Attribution is a Waste of Time

According to Ellyne Phneah‘s piece at ZDNet, Rob Rachwald, senior director of research at FireEye observed that the security industry today is keen on attributing malware to a specific region or group in an effort to assign blame. [H]e pointed out attribution to malware was not key in combating cybercrime because it did little to […]

When guns are outlawed…

…then only outlaws will have guns. Or so goes the old saying. The Senate Armed Services Committee wants to get control of those pesky cyber weapons that are available for purchase by just about anyone by establishing an arms control regime along the lines of what’s done for missiles, tanks, and fighter jets. via The […]

Powered by WordPress. Designed by Woo Themes