Parsing Cyberwar – Part 1: The Battlefield
Summary of this post by Marcus Ranum: This series is based on a lecture I presented at RSA Conference in March 2012. In it, I will attempt to isolate some of the strategic elements of the “cyber”...
View ArticleParsing Cyberwar – Part 2: The Logistical Train
Summary: In the previous part of this series, Marcus Ranum dissected the various subtypes of cyberwar into four specializations: cybercriminals, cyberspies, cyberterrorists, and cyberwarriors, so that...
View ArticleParsing Cyberwar – Part 3: Synergies and Interference
Summary: As the cyberwar with Iran continues, we cheer to the news media’s reporting information and misinformation about this next frontier of war. All fodder for laughter at a future version of The...
View ArticleParsing Cyberwar, part 3: Patch #1 – Lessons from the Gauss malware
Summary: In “Parsing Cyberwar – Part 3” Marcus Ranum discussed the logistical problems implicit in cyberweapons. We now have a case-study showing how quickly a new cyberweapon technology obsoletes...
View ArticleParsing Cyberwar – Part 4: The Best Defense is A Good Defense
Summary: In this series, Marcus Ranum, walks us through the basics of cyberconflict, in its various forms: the nature of the battlefield, logistics, and dynamics. Today he looks at methods of defense....
View ArticleCyberwar, the Power of Nightmares
Summary: Today’s post by Marcus Ranum discusses Adam Curtis’ brilliant BBC documentary series “The Power of Nightmares”. Cutris deconstructs the dynamic of government as protector against unknown...
View ArticleAbout American exceptionalism – what it really means
Summary: As an afterword to the campaign, Marcus Ranum takes a look at American Exceptionalism. While either false or daft as a doctrine, every presidential candidate had to profess allegiance to it....
View ArticleWhat they mean when the government says “We do not have ‘direct’ access to...
Summary: Even the best journalists and national security experts have difficulty with technical stories like the recent NSA revelations. Today Marcus Ranum (bio) cuts through the government’s lies,...
View ArticleSomeone call Nixon’s plumbers. We need them again.
Summary: Marcus Ranum looks to our past — the government’s history of surveillance — to see the future which the government’s vast surveillance machinery makes possible, and perhaps will help bring...
View ArticleThe Empire Strikes Back: The Demonization of Snowden Begins
Summary: Marcus Ranum, our in-house cyber-expert, looks at the next stage of the government’s defense against the revelations of NSA surveillance. Like the surveillance itself, they rely on...
View ArticleCruel, deliberate, and unusually vicious. It’s us.
Summary: Today, one of the bloggers that I follow regularly linked to Charles Pierce’s angry opinion piece on the State Of Oklahoma’s execution of Clayton Lockett: Barbarians In Oklahoma. Because I’ve...
View ArticleIn cyberspace you don’t see your attacker (that’s why we don’t know who...
Our hawks (aka warmongers), with their loyal journalist-enablers, have sparked a new round of hysteria about North Korea’s cyber-attack on Sony. Kim Zetter at Wired gives a good analysis in “North...
View ArticleHow do we identify our attackers in cyberspace?
Summary: The news overflows with confident identification of cyberattackers. Today we have an account of hacking from a defender’s perspective, explaining the difficulty of attribution, written by our...
View ArticleThe horror of cyberspace: we can’t easily identify our attackers.
Summary: In this last of Marcus Ranum’s 2 posts about identifying cyber-attackers, he explains why the usual methods we read in the news are quite fallible — no matter how confidently they’re stated....
View ArticleThe Best Defense Is a Strong Defense. Never Fight a Land War in Cyberspace.
Summary: Why defense experts obsess about the relative advantages of different military hardware (e.g., the A-10 vs the F-35), the US has unleashed the tools of cyberwar on Iran. We can expect more in...
View Article
More Pages to Explore .....