NSA Deputy Director Richard Ledgett described a 2014 Russian cyberattack against the US State Department as “hand-to-hand” combat: “It was hand-to-hand combat,” said NSA Deputy Director Richard Ledgett, who described the incident at a recent cyber forum, but did not name the nation behind it. The culprit was identified by other current and former officials. … Read More “Incident Response as “Hand-to-Hand Combat”” »
Category: cyberwar
Auto Added by WPeMatico
An interesting history. Powered by WPeMatico
The New York Times is reporting that the US has been conducting offensive cyberattacks against North Korea, in an effort to delay its nuclear weapons program. EDITED TO ADD (3/8): Commentary. Powered by WPeMatico
WikiLeaks just released a cache of 8,761 classified CIA documents from 2012 to 2016, including details of its offensive Internet operations. I have not read through any of them yet. If you see something interesting, tell us in the comments. EDITED TO ADD: There’s a lot in here. Many of the hacking tools are redacted, … Read More “WikiLeaks Releases CIA Hacking Tools” »
Here’s a nice profile of Citizen Lab and its director, Ron Diebert. Citizen Lab is a jewel. There should be more of them. Powered by WPeMatico
I think this might be the first time it has been openly acknowledged: Sir Michael Fallon, the defence secretary, has said Britain is using cyber warfare in the bid to retake Mosul from Islamic State. Speaking at an international conference on waging war through advanced technology, Fallon made it clear Britain was unleashing its cyber … Read More “UK Admitting "Offensive Cyber" Against ISIS/Daesh” »
Over the past year or two, someone has been probing the defenses of the companies that run critical pieces of the Internet. These probes take the form of precisely calibrated attacks designed to determine exactly how well these companies can defend themselves, and what would be required to take them down. We don’t know who … Read More “Someone Is Learning How to Take Down the Internet” »
When you’re attacked by a missile, you can follow its trajectory back to where it was launched from. When you’re attacked in cyberspace, figuring out who did it is much harder. The reality of international aggression in cyberspace will change how we approach defense. Many of us in the computer-security field are skeptical of the … Read More “Attack Attribution in Cyberspace” »
No one has admitted taking down North Korea’s Internet. It could have been an act of retaliation by the US government, but it could just as well have been an ordinary DDoS attack. The follow-on attack against Sony PlayStation definitely seems to be the work of hackers unaffiliated with a government. Not knowing who did … Read More “Attributing the Sony Attack” »
New paper: “Attributing Cyber Attacks,” by Thomas Rid and Ben Buchanan: Abstract: Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either … Read More “Attributing Cyberattacks” »