We talk about motivation often when thinking about the insider threat to information assets. The concept of a turn cloak, spy, or trusted individual turning against the interests of an organization has always been a risk. We vilify, and in…
Category: Technology
The term “technology” does not follow the same linguistic pattern as “biology” and “geology” because its etymology is different. While “biology” and “geology” are derived from Greek roots, with “bio” meaning life and “geo” meaning Earth, “technology” has Latin roots.
“Technology” comes from the combination of two Greek words: “techne,” meaning skill or art, and “logia,” meaning study or science. So, the term “technology” literally means the study or science of skills or arts. It reflects a broader concept that goes beyond the study of a specific substance (like life or the Earth) to encompass a wide range of human-made tools, systems, and techniques.
Social Media: Benefit and costs
I have been flirting on and off with social media for quite some time. Between this blog in the various versions of the years, and traditional post dot bomb incarnations of social media I have had a varying presence. Currently…
Next big thing: Personal clouds in your home
The asserted revelations of the national spy apparatus has created an interesting set of conundrums for business and individuals. Putting away the trivialities of those who say “If you have nothing to hide you have nothing to worry about.” There…
2013 Adobe Data Breach (on going analysis)
This gallery contains 1 photo →
Research Note: Defining attacker knowledge, skill, and ability
Introduction There exists an area of undiscovered value within the intersection of information assurance and security, standardized education, cognitive methods, and assessments of cognitive methods. At this intersection are the basics of profiling and evaluating the knowledge, skills and abilities…
Concept mapping: Cloud forensics
This gallery contains 4 photos →
National Geographic Channel Docudrama Blackout: Comments on veracity and thought on issues
I’m getting lots of media interview requests and anybody who knows me knows I don’t like cameras. So, I thought I’d put up some comments on the idea of a multi-week power outage across the United States and even across…
Research Note: After Carshark and into ICS, SCADA, and embedded systems
After DefCon this year and CarShark last year I don’t know if there is any interest in exploring this aspect of cyberspace further, but thought we might look at a few things. The reason you should care is though there…
Crude Faux: An analysis of cyber conflict within the oil and gas industries
This gallery contains 1 photo →
Where will the NSA be in 5 to 10 years?
I’ve been thinking about how the structure of the intelligence community and specifically technical collection activities are understood. The departure of General Alexander and the current budget fights are policy fulcrum points that can be used for change. I have…
Forensic analysis of a Garmin Nuvi 1390
Abstract A Garmin Nuvi 1390 was accessed using three different software methods; Cellebrite Physical Analyzer s FTK Imager, and Linux command line. All three methods are capable of producing an image of the device. The device stores user favorites and…
Forensic Analysis on a Nintendo Wii
Forensic Analysis of a Nikon Coolpix Digital Camera
Abstract This lab exercise, which involved acquiring and analyzing the data from the internal storage of a Nikon Coolpix E4600 digital camera, provides an opportunity to become more familiar with conducting forensic acquisitions and analysis on this type of device.…
Forensic Analysis of an iPod Touch
Abstract Forensic analysis of an iOS device can be performed by using the backup files available with the corresponding account at iTunes. This backup can provide access to the file structure and folders without altering the original backup files, making…
Kindle 2 International – Acquisition Analysis
Abstract Embedded devices are becoming more and more pervasive in the daily affairs of the average individual. Modern appliances from coffee pots to refrigerators and even washing machines are now running on embedded systems, sometimes operating trimmed down versions of…