Creating an effective cyber espionage operation

Creating an effective cyber espionage operation

The means and tools of cyber espionage are well known and used widely in practice. But has the United States intelligence community put into practice a structured operation to gather both open source and private intelligence and properly analyze and distribute it? This post proposes one such operational structure.  The tools and methods are described including the use of custom Trojans, back hacking, infiltration, exfiltration, recruitment, IP signal intelligence, seeding, and poisoning.  It describes the scope of the data handling and analysis problem and suggests best practices for sharing and analyzing cyber intelligence.  Getting actionable intelligence into the right hands, the hardest task of all, is addressed.
http://www.threatchaos.com/home-mainmenu-1/16-blog/572-creating-an-effective-cyber-espionage-operation

venerdì 18 marzo 2011
social:

Sei iscritto alla members area? Fai il login, oppure iscriviti.










Misura antispam: Quanto fa più 8?