New paper: “Attributing Cyber Attacks,” by Thomas Rid and Ben Buchanan: Abstract: Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either … Read More “Attributing Cyberattacks” »
Category: Security technology
Auto Added by WPeMatico
In Kyoto, taxi drivers are encouraged to loiter around convenience stores late at night. Their presence reduces crime. In Kyoto about half of the convenience stores had signed on for the Midnight Defender Strategy. These 500 or so shops hung posters with slogans such as “vigilance strengthening” written on them in their windows. These signs … Read More “Loitering as a Security System” »
Stewed squid with tomatoes, sauteed squid with parsley and garlic, and braised squid with garlic and herbs. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
Those of you unfamiliar with hacker culture might need an explanation of “doxing.” The word refers to the practice of publishing personal information about people without their consent. Usually it’s things like an address and phone number, but it can also be credit card details, medical information, private e-mails — pretty much anything an assailant … Read More “Doxing as an Attack” »
An analysis of the timestamps on some of the leaked documents shows that they were downloaded at USB 2.0 speeds — which implies an insider. Our Gotnews.com investigation into the data that has been released by the “hackers” shows that someone at Sony was copying 182GB at minimum the night of the 21st — the … Read More “More Data on Attributing the Sony Attack” »
I haven’t seen much press mention about the leaked CIA documents that have appeared on WikiLeaks this month. There are three: The CIA review of high-value target assassination programs, classified SECRET, from 2009. The CIA’s advice for agents going through airport security and surviving secondary screening, classified SECRET, from 2011. The CIA’s advice for agents … Read More “Leaked CIA Documents” »
Spiegel published a long article today on the NSA’s analysis capabilities against encrypted systems, with a lot of new documents from the Snowden archive. I’m not going to have time to look at this for a few days. Describe anything interesting you find — with links to the documents — in the comments. EDITED TO … Read More “New Documents on NSA's Cryptanalysis Capabilities” »
“St. George, the Dragon, and the Squid: A Preservation Mumming,” by the American Folklife Center. As usual, you can also use this squid post to talk about the security stories in the news that I haven’t covered. Powered by WPeMatico
On Christmas eve the NSA relesed a bunch of audit reports on illegal spying using EO 12333 from 2001 to 2013. Bloomberg article. The heavily-redacted reports include examples of data on Americans being e-mailed to unauthorized recipients, stored in unsecured computers and retained after it was supposed to be destroyed, according to the documents. They … Read More “Merry Christmas from the NSA” »
He sees you when you’re sleeping. He knows when you’re awake. He’s everywhere. And that’s the whole point of the Elf on the Shelf, the bright-eyed, Kewpie-esque doll that millions of parents display around their homes in December as a reminder to children to behave. The elf, the story goes, is an agent reporting back … Read More “"Santa Claus and the Surveillance State"” »