There are three forms of attribution: 1) Political attribution based on the actors motives and goals. 2) Technical attribution based on tactics, techniques and means of an entity. 3) Forensic attribution based on the evidence of behaviors and facts.
Category: Technology
The term “technology” does not follow the same linguistic pattern as “biology” and “geology” because its etymology is different. While “biology” and “geology” are derived from Greek roots, with “bio” meaning life and “geo” meaning Earth, “technology” has Latin roots.
“Technology” comes from the combination of two Greek words: “techne,” meaning skill or art, and “logia,” meaning study or science. So, the term “technology” literally means the study or science of skills or arts. It reflects a broader concept that goes beyond the study of a specific substance (like life or the Earth) to encompass a wide range of human-made tools, systems, and techniques.
Comparing two stories… Dope Smoking STEM
Comey: FBI ‘Grappling’ With Hiring Policy Concerning Marijuana “James B. Comey said Monday that if the FBI hopes to continue to keep pace with cyber criminals, the organization may have to loosen up its no-tolerance policy for hiring those who…
Garmin iPhone application for motorcycle rallies
This is a quick description of how I use my iPhone on motorcycle rallies. I also use two BMW Navigator IV GPS but the iPhone is actually a faster processor, better GPS, and shows up better in daylight. In my…
Tools used against the enterprise Part 3
x x x x x x x x x
If the job sucks be awesome
I see a lot of discussion at hacker cons or security cons depending on your predilection that says something to the effect “I’m burned out and drink to much.” The information security community has a hidden underbelly that hangs over…
U.S. Bank of Cyber: An analysis of Cyber Attacks on the U.S. Financial System
This gallery contains 1 photo →
Research Note: Security, privacy, insider threats, and espionage
I am concerned about how this discussion has evolved, and it is influenced heavily by political and ideological biases. More importantly, it is in a box, which does not reflect a stern reality. I have been told that “Privacy is…
Events over time as applied to OSI 7 layer model…
If you track the events reported (insert numerous caveats) they can be associated to a particular OSI layer and give you an idea of what is going on year to year. However, even with this raw data you can see significant…
Strat pack fall down go boom
I’ve been watching the response to Adam Elkus recitation of issues of blogging on grand strategy. I have been following the writing of Adam since he was at Occidental College. I have been following many writers as they start out…
Cyberspace is NOT a man made domain
The fallacy I read on a daily basis about cyberspace being a man made domain just peeves me off. What the assertion that cyberspace is the first man made domain is actually doing is mixing up the tools of exploitation…
BLUF: Writing for government senior leadership
The acronym BLUF stands for bottom line up front. The inverted pyramid and BLUF style of writing is a tool used to communicate to leadership quickly, in times of stress, or when the topic is fairly controversial. These writing tools focus…
iPad iOS 7 Forensics Approach Using AccessData Software
Abstract With the fast growth of sold iPad since it was introduced in 2010, we knew by now that it is almost everywhere. Nowadays, iPad can replace Personal Computers especially if its equipped with some applications to process documents that…
Forensic analysis of a JVC KD-HDR receiver
Forensic analysis of a JVC KD-HDR receiver Abstract I sought to discover what things of forensic interest can be extracted from a JVC KD-HDR50 automobile receiver. As the device has multiple inputs and a persistent storage mechanism, there should be…
Forensic Analysis of a Roku XS 2
Abstract The Roku XS 2 is digital media streaming devices made by Roku Incorporation. The Roku is a relatively new device. The first generation of Roku was introduced on May 20th, 2008 (Roku Inc. Press Release, 2008). The current…
Microsoft Surface RT 2 Tablet
Abstract The following paper is a report detailing an attempt at digital forensic data acquisition and analysis of Microsoft’s Surface RT 2 tablet with Windows 8.1 operating system. The paper details the specifications of the tablet device listing its…