Where is the tech world headed? Where and what will be the enterprise of the future? We are in a post-converged world swimming in a sea of devices and moving into the world of trans-convergence. Where trans refers to changing…
Tag: Research Note
Research Note: Tracing the Twitter card phenomenon
In a Twitter discussion (>140 characters at a time) with Chris J @rattis about tracing credit cards from pictures on Twitter posted by users, to dissemination, and subsequent use. The following experimental protocol was developed. The scenario being examined is…
Research note: Cyber defense of tactical networks
Why this word cyber? There are dozens of government definitions for cyberspace the environment defined by the concept of cyber itself. Such a nebulous concept such as cyber is going to cause angst and at any major hacker conference and…
Research note: A new way to think about insider threats
We talk about motivation often when thinking about the insider threat to information assets. The concept of a turn cloak, spy, or trusted individual turning against the interests of an organization has always been a risk. We vilify, and in…
Research Note: Defining attacker knowledge, skill, and ability
Introduction There exists an area of undiscovered value within the intersection of information assurance and security, standardized education, cognitive methods, and assessments of cognitive methods. At this intersection are the basics of profiling and evaluating the knowledge, skills and abilities…
Research Note: After Carshark and into ICS, SCADA, and embedded systems
After DefCon this year and CarShark last year I don’t know if there is any interest in exploring this aspect of cyberspace further, but thought we might look at a few things. The reason you should care is though there…
Research Note: Strategic, operational, and tactical cyber intelligence
Some notes on operational level of war as it can be applied to cyber intelligence processes. As a factor in the process of conflict the inteligence gathering process is harder for some to understand in the context of cyber, and…
Evidentiary and Forensic Analysis of Wireless Signals
Abstract This paper discusses as an overview of the current methods and practices available to forensics investigator in order to ascertain whether a radio frequency device has been participating in a wireless network. Though many of the techniques are applicable…