Deceive spectrum activity at its finest. It doesn’t have to be all political, after all. So China makes dubious legal claims, convinces people that they are real by creating media illusion, and creating political discontent. This is not new, but apparently the west never gave it any great strategic thought… Bet we haven’t given any […]
Author Archive | Spencer
Ok, so where to begin? Look we all know that hacking is serious now. Control systems hacks are the in thing at the moment, and what is cooler than hacking a 2000 pound mountain of steel and plastic that can barrel down the road at 100 miles per hour? They did it in SnowCrash, and […]
The Verge reports that the Defense spending bill signed by President Obama back in December, offers funds to help reduce the sale and spread of exploits. The article then uses the term legitimate self-defense, as a valid reason to allow these exploits to continue to be traded. Is this something specific to DIB companies? Is […]
http://www.pnas.org/content/early/2014/01/08/1322638111.full.pdf+html So this has the potential to be an awesome entry. An analytical tool to figure out the optimal timing of deployment of a zero-day. In short, how to catch your enemy with their cyber pants down. Pretty cool idea. Need to do more than read the abstract to decide if its useful.
http://resources.infosecinstitute.com/classified-nsa-exploit-tools-radon-dewsweeper-work/ From the article: Security expert Bruce Schneier is one of the most authoritative experts who revealed that the NSA has a wide-ranging arsenal of zero-day exploits to use for cyber operations. The revelation isn’t surprising, the security community is aware of the great effort spent by governments on cyber operations. Many intelligence agencies have […]
http://p.washingtontimes.com/news/2013/oct/3/cyber-mass-shooter-poses-future-threat-computer-se/ What a great article. Of course General Hayden’s comments beg the question, how do you stop a criminal, if you can’t defend yourself? This really goes directly to the need to be able to respond to an immediate threat with a proportional use of force in self-defense. Of course, some will argue that it […]
hp’s Rafal Los, the WhiteRabbit on why hackback is a bad idea. No argument. Its probably a bad idea to hackback, unless you are reasonably certain that: a) you are the toughest kid on the playground; or B) you have nothing left to lose, because it is a matter of life or death. Much like […]
Spat between two Dutch companies sparks record-breaking 300Gbps DDoS attack – Yahoo! News. So, Spamhaus blacklists a hosting company, then Spamhaus gets hit by 300 GBPS of DDOS action. Looks like for Cyberbunker, there was immediacy, and there was a proportional response in the Disrupt spectrum, at least if Cyberbunker is doing it. Why proportional? […]
Active Cyber Defense: A Framework for Policymakers | Center for a New American Security. Weekend reading material. Enjoy RSA Conference!
Schneier on Security: More on Chinese Cyberattacks. Schneier disagrees with active defense. From the post: Because espionage unfolds over months or years in realtime, we can triangulate the origin of an exfiltration attack with some certainty. During the fog of a real cyber war attack, which is more likely to happen in milliseconds, the kind […]