Author Archive | Spencer

China’s strategy: infowar, poliwar, lawfare

Deceive spectrum activity at its finest. It doesn’t have to be all political, after all. So China makes dubious legal claims, convinces people that they are real by creating media illusion, and creating political discontent. This is not new, but apparently the west never gave it any great strategic thought… Bet we haven’t given any […]

A predictive model for cyber warfare

http://www.pnas.org/content/early/2014/01/08/1322638111.full.pdf+html So this has the potential to be an awesome entry. An analytical tool to figure out the optimal timing of deployment of a zero-day. In short, how to catch your enemy with their cyber pants down. Pretty cool idea. Need to do more than read the abstract to decide if its useful.

Claims that cyberspace is now cyberbattlefield

http://resources.infosecinstitute.com/classified-nsa-exploit-tools-radon-dewsweeper-work/ From the article: Security expert Bruce Schneier is one of the most authoritative experts who revealed that the NSA has a wide-ranging arsenal of zero-day exploits to use for cyber operations. The revelation isn’t surprising, the security community is aware of the great effort spent by governments on cyber operations. Many intelligence agencies have […]

Cyber mass shooter

http://p.washingtontimes.com/news/2013/oct/3/cyber-mass-shooter-poses-future-threat-computer-se/ What a great article. Of course General Hayden’s comments beg the question, how do you stop a criminal, if you can’t defend yourself? This really goes directly to the need to be able to respond to an immediate threat with a proportional use of force in self-defense. Of course, some will argue that it […]

Spat between two Dutch companies sparks record-breaking 300Gbps DDoS attack – Yahoo! News

Spat between two Dutch companies sparks record-breaking 300Gbps DDoS attack – Yahoo! News. So, Spamhaus blacklists a hosting company, then Spamhaus gets hit by 300 GBPS of DDOS action. Looks like for Cyberbunker, there was immediacy, and there was a proportional response in the Disrupt spectrum, at least if Cyberbunker is doing it. Why proportional? […]

Schneier on Security: More on Chinese Cyberattacks

Schneier on Security: More on Chinese Cyberattacks. Schneier disagrees with active defense. From the post: Because espionage unfolds over months or years in realtime, we can triangulate the origin of an exfiltration attack with some certainty. During the fog of a real cyber war attack, which is more likely to happen in milliseconds, the kind […]

Powered by WordPress. Designed by Woo Themes