Archive | Force

China’s strategy: infowar, poliwar, lawfare

Deceive spectrum activity at its finest. It doesn’t have to be all political, after all. So China makes dubious legal claims, convinces people that they are real by creating media illusion, and creating political discontent. This is not new, but apparently the west never gave it any great strategic thought… Bet we haven’t given any […]

Spat between two Dutch companies sparks record-breaking 300Gbps DDoS attack – Yahoo! News

Spat between two Dutch companies sparks record-breaking 300Gbps DDoS attack – Yahoo! News. So, Spamhaus blacklists a hosting company, then Spamhaus gets hit by 300 GBPS of DDOS action. Looks like for Cyberbunker, there was immediacy, and there was a proportional response in the Disrupt spectrum, at least if Cyberbunker is doing it. Why proportional? […]

Obama Administration Discusses Cyber Attack Capabilities

Emphasis added “New policies will also govern how the intelligence agencies can carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code — even if there is no declared war.” via Broad Powers Seen for Obama […]

Indian Firm Hacks Back…in 2007!

An interesting use of force, compromising the attacker’s machine, but for the purposes of tracking instead of outright disruption/destruction. “In 2007, the IT team of a Chennai-based drug maker detected heavy traffic on servers connected to its research lab. The company was developing an anti-asthma molecule, and it suspected that a hacker was stealing the […]

Network Use of Force: Defend

Defend: The entity defends its networks by using appropriate prevention controls, technologies and techniques designed to render improbable or impossible an attack by a network assailant. The entity uses a layered defense-in-depth approach to assure that risks to its systems are defended, and that the basic tenets of information security are designed into the network’s […]

Fake Data for Real Hackers

“Brown Printing Co., which prints popular magazines and catalogues, knew that it had valuable assets in its computer systems and that those assets — online editions and subscriber databases — were increasingly at risk with the proliferation of cyber-espionage.And so, to confront one of the newest and most damaging crimes, it turned to one of […]

Traditional Use of Force

Great article from the COPS Office at the US Department of Justice on the use of force. http://www.cops.usdoj.gov/default.asp?item=1374 Some good quotes from the article: The International Association of Chiefs of Police (IACP) in its study, Police Use of Force in America 2001, defined use of force as “The amount of effort required by police to […]

Is Active Defense a use of force?

I keep hearing this term Active Defense.  Its catchy, and it implies a level of activity associated with defense.  But what is it, and is it a use of force? Brandon and I discussed this, and he pointed out that he believed active defense could be distinguished from passive defense, and that it would fall somewhere […]

Powered by WordPress. Designed by Woo Themes