Warning: Cannot modify header information - headers already sent by (output started at /home/content/30/8410730/html/index.php:2) in /home/content/30/8410730/html/wp-includes/feed-rss2.php on line 8
The Orlando Doctrine » Force http://orlandodoctrine.com The Network Use of Force Continuum Wed, 28 Jan 2015 18:40:21 +0000 en-US hourly 1 https://wordpress.org/?v=4.1.33 China’s strategy: infowar, poliwar, lawfare http://orlandodoctrine.com/?p=296 http://orlandodoctrine.com/?p=296#comments Fri, 11 Apr 2014 11:29:43 +0000 http://orlandodoctrine.com/?p=296 Deceive spectrum activity at its finest. It doesn’t have to be all political, after all. So China makes dubious legal claims, convinces people that they are real by creating media illusion, and creating political discontent. This is not new, but apparently the west never gave it any great strategic thought…

Bet we haven’t given any serious thought to economic warfare, either. Economics 101 taught me that communism places the means of production in the hands of the people… What if those people are all in China?

http://www.smh.com.au/world/chinas-new-weapon-for-expansion-lawfare-20140411-zqtir.html

]]>
http://orlandodoctrine.com/?feed=rss2&p=296 0
Destroy: Assassination by hacking an automobile – Richard Clarke suggests its been done. http://orlandodoctrine.com/?p=293 http://orlandodoctrine.com/?p=293#comments Sun, 02 Feb 2014 22:49:36 +0000 http://orlandodoctrine.com/?p=293 Ok, so where to begin?

Look we all know that hacking is serious now. Control systems hacks are the in thing at the moment, and what is cooler than hacking a 2000 pound mountain of steel and plastic that can barrel down the road at 100 miles per hour? They did it in SnowCrash, and Shadowrun, after all. The singularity must be nigh, right?

This article in the Daily Record suggests that the death of the journalist who exposed General McChrystal was engineered, per Richard Clarke. Now, I’m not generally the kind of guy who believes in ghost stories. Spooks in the wire are the kind of scary tales that con-goers hear each time they show up at B-Sides, heck, I use those kinds of stories to my advantage all of the time. I imagine it could happen, I know its possible. We saw Charlie Miller’s laptop demo on the Prius last year. So we all know its possible. But the idea that its being done actively feels like security theater. It feels like:

We’re going to take out journalists boys… Lets use an enormously advanced hack that will leave a lot more evidence and exposure to scrutiny, instead of simply screwing with his brakes, it will be good practice.

http://www.dailyrecord.co.uk/news/crime/cyber-predators-could-computer-hackers-3100532

So, this is the ultimate Destroy attack. Assassination by computer. At least according to supposition from a former White House advisor. What do you think? Is this the next step in the “cyber-arms race?” Or, is it just speculation to sell newspapers?

]]>
http://orlandodoctrine.com/?feed=rss2&p=293 0
Military Budget limits cyber weapons proliferation, except in legitimate BUSINESS SELF-DEFENSE http://orlandodoctrine.com/?p=291 http://orlandodoctrine.com/?p=291#comments Thu, 23 Jan 2014 06:41:59 +0000 http://orlandodoctrine.com/?p=291 The Verge reports that the Defense spending bill signed by President Obama back in December, offers funds to help reduce the sale and spread of exploits. The article then uses the term legitimate self-defense, as a valid reason to allow these exploits to continue to be traded. Is this something specific to DIB companies? Is there counter attack from small companies in the future? Can I hire licensed, armed cybersecurity guards, yet?

The $552 billion 2014 military defense budget signed by President Barack Obama will continue to fund high-tech cyber and unmanned aircraft operations. The budget, which grants central Cyber Command $68 million in operational costs alongside more money for research and individual unit operations, instructs agencies to work towards controlling the proliferation of “cyber weapons.” That means stopping the sale or spread of malicious code for “criminal, terrorist, or military activities” while allowing governments and businesses to use it for “legitimate” self-defense.

The Verge – US military sees more drones, ‘cyber weapon’ non-proliferation in the future

]]>
http://orlandodoctrine.com/?feed=rss2&p=291 0
Spat between two Dutch companies sparks record-breaking 300Gbps DDoS attack – Yahoo! News http://orlandodoctrine.com/?p=243 http://orlandodoctrine.com/?p=243#comments Thu, 28 Mar 2013 16:30:28 +0000 http://orlandodoctrine.com/?p=243 Spat between two Dutch companies sparks record-breaking 300Gbps DDoS attack – Yahoo! News.

So, Spamhaus blacklists a hosting company, then Spamhaus gets hit by 300 GBPS of DDOS action. Looks like for Cyberbunker, there was immediacy, and there was a proportional response in the Disrupt spectrum, at least if Cyberbunker is doing it.

Why proportional? The blacklisting would have disrupted the business of Cyberbunker.

What do you think?

]]>
http://orlandodoctrine.com/?feed=rss2&p=243 0
Obama Administration Discusses Cyber Attack Capabilities http://orlandodoctrine.com/?p=206 http://orlandodoctrine.com/?p=206#comments Mon, 04 Feb 2013 20:49:13 +0000 http://orlandodoctrine.com/?p=206 Emphasis added

“New policies will also govern how the intelligence agencies can carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code — even if there is no declared war.”

via Broad Powers Seen for Obama in Cyberstrikes – NYTimes.com.

]]>
http://orlandodoctrine.com/?feed=rss2&p=206 0
Indian Firm Hacks Back…in 2007! http://orlandodoctrine.com/?p=205 http://orlandodoctrine.com/?p=205#comments Mon, 04 Feb 2013 20:35:35 +0000 http://orlandodoctrine.com/?p=205 An interesting use of force, compromising the attacker’s machine, but for the purposes of tracking instead of outright disruption/destruction.

“In 2007, the IT team of a Chennai-based drug maker detected heavy traffic on servers connected to its research lab. The company was developing an anti-asthma molecule, and it suspected that a hacker was stealing the research data.

Unable to trace the hacker, the company approached Mahindra Special Services Group MSSG, a security consulting firm, part of the Mahindra & Mahindra group. MSSG experts placed a dummy file containing a virus on the company’s R&D folder that appeared to contain research data, says Dinesh Pillai, MSSG’s CEO.

“When the hacker returned, he went straight for the dummy file and we traced him using the virus,” he says. The hacker turned out to be a 29-year-old Chandigarh resident who was hired by a rival drug maker. Experts say India remains highly vulnerable to cyber attacks on its critical infrastructure. “I do not even know the command and control system for dealing with cyber attacks in the country,” says Pillai.”

via Can cyber attacks on India’s critical infrastructure be thwarted? – Business Today.

]]>
http://orlandodoctrine.com/?feed=rss2&p=205 0
Network Use of Force: Defend http://orlandodoctrine.com/?p=186 http://orlandodoctrine.com/?p=186#comments Mon, 14 Jan 2013 03:31:33 +0000 http://orlandodoctrine.com/?p=186 Defend:

The entity defends its networks by using appropriate prevention controls, technologies and techniques designed to render improbable or impossible an attack by a network assailant. The entity uses a layered defense-in-depth approach to assure that risks to its systems are defended, and that the basic tenets of information security are designed into the network’s protections.

In essence, the Defend Spectrum is the use of traditional defense-in-depth methods to assure the network from a preventive controls and technologies perspective.

Decision basis

The attacker will attempt to assail the network. At a minimum, there should be defenses designed into the network to control for simple entry, the physical analogues are doors with locks. The logic analogue is the firewall. Other standard defense-in-depth approaches include identity and access management methods, ring traversal protections in the trusted computing base, vulnerability and patch management, and general monitoring like intrusion detection systems. All networks connected to the Internet should use the defend spectrum activities at a minimum.

]]>
http://orlandodoctrine.com/?feed=rss2&p=186 0
Fake Data for Real Hackers http://orlandodoctrine.com/?p=133 http://orlandodoctrine.com/?p=133#comments Sat, 05 Jan 2013 18:07:27 +0000 http://orlandodoctrine.com/?p=133 “Brown Printing Co., which prints popular magazines and catalogues, knew that it had valuable assets in its computer systems and that those assets — online editions and subscriber databases — were increasingly at risk with the proliferation of cyber-espionage.And so, to confront one of the newest and most damaging crimes, it turned to one of the oldest tricks in human history: deception.”

 

“Companies are tired of playing defense. They want to feel like they actually can fight back. Most of us in the industry agree that we ought to push the envelope to protect the rights and properties of U.S. businesses.”

-Michael DuBose, a former chief of the Justice Department’s Computer Crime and Intellectual Property Section now at Kroll Advisory Solutions.

via To thwart hackers, firms salting their servers with fake data – The Washington Post.

]]>
http://orlandodoctrine.com/?feed=rss2&p=133 0
Traditional Use of Force http://orlandodoctrine.com/?p=102 http://orlandodoctrine.com/?p=102#comments Sat, 05 Jan 2013 12:54:35 +0000 http://orlandodoctrine.com/?p=102 Great article from the COPS Office at the US Department of Justice on the use of force.

http://www.cops.usdoj.gov/default.asp?item=1374

Some good quotes from the article:

The International Association of Chiefs of Police (IACP) in its study, Police Use of Force in America 2001, defined use of force as “The amount of effort required by police to compel compliance by an unwilling subject.”

The Bureau of Justice Statistics (BJS) in Data Collection on Police Use of Force, states that “…the legal test of excessive force…is whether the police officer reasonably believed that such force was necessary to accomplish a legitimate police purpose…”

“there are no universally accepted definitions of “reasonable” and “necessary” because the terms are subjective. A court in one jurisdiction may define “reasonable” or “necessary” differently than a court in a second jurisdiction. More to the point is an understanding of the “improper” use of force, which can be divided into two categories: “unnecessary” and “excessive.” The unnecessary use of force would be the application of force where there is no justification for its use, while an excessive use of force would be the application of more force than required where use of force is necessary.”

 

]]>
http://orlandodoctrine.com/?feed=rss2&p=102 0
Is Active Defense a use of force? http://orlandodoctrine.com/?p=135 http://orlandodoctrine.com/?p=135#comments Sat, 05 Jan 2013 05:04:01 +0000 http://orlandodoctrine.com/?p=135 I keep hearing this term Active Defense.  Its catchy, and it implies a level of activity associated with defense.  But what is it, and is it a use of force?

Brandon and I discussed this, and he pointed out that he believed active defense could be distinguished from passive defense, and that it would fall somewhere in the Deceive or Disarm spectra of the use of force continuum.  I can’t argue that, though I believe that the active versus passive description really is a red herring.

It occurs to me that all active defense is a use of force.  Remember the law enforcement use of force continuum, from an officer’s presence to lethal force, it is all a use of force.  The use of force is implicit in the entire spectrum. When an officer arrives on the scene, his presence, including the badge that he wear is a tangible warning against the negative behavior that he defends against, and an implicit threat against an escalation if compliance with the law is not achieved.  When the officer issues a command he is using force to actively defend against a further escalation of , as there is an expectation of immediate compliance with the lawful order to comply with the law.  If there is active resistance to the expectation of compliance, the law enforcement officer may choose to defend himself and the public through the use of a soft force, or an open-hand technique to control the subject, or even a hard technique, like a closed fist if the officer feels threatened, or is at risk of personal injury or injury to the public.  Escalation to less than lethal means of force, such as pepper-spray or batons may be necessary if the actively hostile subject or group continues to threaten.  Finally lethal force may be used in the defense of the officer’s life, or the life of others.

At every point in the continuum, the officer is actively defending himself, the public, or the subject from an escalation of event.  Active network defense is directly analogous.  At each point int he network use of force continuum the defender is actively defending himself, and his company from an assailant.

]]>
http://orlandodoctrine.com/?feed=rss2&p=135 0