18/03/2011
Creating an effective cyber espionage operation

The means and tools of cyber espionage are well known and used widely in practice. But has the United States intelligence community put into practice a structured operation to gather both open source and private intelligence and properly analyze and distribute it? This post proposes one such operational structure.  The tools and methods are described including the use of custom Trojans, back hacking, infiltration, exfiltration, recruitment, IP signal intelligence, seeding, and poisoning.  It describes the scope of the data handling and analysis problem and suggests best practices for sharing and analyzing cyber intelligence.  Getting actionable intelligence into the right hands, the hardest task of all, is addressed.

17/03/2011
Happy Birthday ITALIA..!

VIVA L´ITALIA..!

14/03/2011
Identifying ┬┤anonymous┬┤ email authors

A team of researchers from Concordia University has developed an effective new technique to determine the authorship of anonymous emails. Tests showed their method has a high level of accuracy – and unlike many other methods of ascertaining authorship, it can provide presentable evidence in courts of law. The new technique is profiled in a study published in Digital Investigation.

11/03/2011
Cyber-Security: International Controls and Standards

William Hague´s speech at the Munich Security Conference highlighted the importance of cyber-security in international relations, and raised questions of an appropriate international response to the increasingly viable threat.

04/03/2011
Sun Tzu and Cyber War

Cyberspace is a new warfare domain. Computers and the information they contain are prizes to be won during any military conflict. But the intangible nature of cyberspace can make victory, defeat, and battle damage difficult to calculate. Military leaders today are looking for a way to understand and manage this new threat to national security. The most influential military treatise in history is Sun Tzu‟s Art of War: its recommendations are flexible and have been adapted to new circumstancesfor over 2,500 years. This article examines whether Art of War is flexible enough to encompass cyber warfare. It concludes that Sun Tzu provides a useful but far from perfect framework for the management of cyber war, and urges modern military strategists to consider the distinctive aspects of the cyber battlefield.


1 |  2 |  3 |  4 |  5 |  6 |  7 |  8 |  9 |  10 |  11 |  12 |  13 |  14 |  15 |  16 |  17 |  18 |  19 |  20 |  21 |  22 |  23 |  24 |  25 |  26 |  27 |  28 |  29 |  30 |  31 |  32 |  33 |  34 |  35 |  36 |  37 |  38 |  39 |  40 |  41 |  42 |  43 |  44 |  45 |  46 |  47 |  48 |  49 |  50 |  51 |  52 |  53 |  54 |  55 |  56 |  57 |  58 |  59 |  60 |