The week started off with a clean up of the previous weeks dustbin news. Not an unusual amount to hit on Monday, but the breadth was interesting. The continued mixing of cyber security issues with main stream media presentations of…
Author: Samuel Liles
This week in cyber conflict: June 13th to June 17th
It appears that national governments have started rounding up hackers for prosecution. This is an interesting development but not unexpected. It will be interesting to see what kind of evidence is used. It is not lost upon the aware observer…
Hanging the head of advanced persistent threat on a pike
If I am a major corporation and I feel I may be a target, or know that I have been a target I want to have some idea about reducing my risk to attacks. The consistent hum and noise of…
Interesting shift in infosec
Early reports on LulzSec cyber attacks are interesting if not surprising. A continuous thread through the media reports if you are looking for the root cause analysis it is poor computing practices by the companies. Now, to be fair this…
This week in cyber conflict: June 6th to June 10th
A busy weekend opened on a busy week. It looks like the rhetoric continues to heat up between China and the United States as regards cyber warfare. The thread of the latest Google hacks has appeared to center around White…
From near earth orbit: How to analyze Usama Bin Laden’s Porn Collection
All right so the title is total link bait. The United States seized some number of computers and peripherals from the compound in Pakistan. Those materials will be evaluated and analyzed for intelligence purposes and perhaps used in planning future…
This week in cyber conflict: May 30th to June 3rd
The fact China has a cyber warfare unit really splashed heavily Monday in the news media. I am kind of surprised that we make such a big deal about this since we have an entire military organization called “cyber command”.…
Getting back to running
The last year has been pretty hard on my running career. In July while sparring a youngster in Tae Kwon Do I turned in to sweep (light to no contact) and he turned in and hit the side of my…
This week in cyber conflict: May 23rd to May 27th
An enormous amount of anti-China rhetoric in the press this week. From calls that governments are coddling China and allowing China to invade American systems to simply the American government is not capable of protecting citizens. The rhetoric is definitely…
This week in cyber conflict: May 16th to May 20th
An interesting trend is very visible this week as the words used by journalists is slowly changing. Since I started tracking the stories through google I haven not seen such a wild and quick swing. For the last few years…
The User #1 Initiative
Having read many cyber security initiatives and reports I thought I might throw a few ideas up against the wall listed in problem and solution format. Consider the following more from the ideologically free position and not looking to sell…
CDC: On the zombie apocalypse
Commentary: The International Strategy for Cyberspace
The following is a critique of the new policy document introduced by the Whitehouse on May 16th. All elements of the attribution policy of this blog/website apply. Though I’m critical of the document in general it is consistent with previous…
Cyber conflict: Weekend Edition May 14th/15th
Weekend discussion of the cyber conflict spectrum seemed to revolve around three themes. The first theme was the PlayStation Hack. It seems that it is coming back online and people are pretty happy to see that. Well teenage boys without…
This week in cyber conflict: May 8th to May 13th
This week we have seen the swing from discussion of cyber warfare between North Korea and South Korea swing to analysis of pending United States legislation. As to the Koreas whether a possible nation state hack on a bank is…