Archive for cyber-warfare

You are browsing the archives of cyber-warfare.

British Army “Twitter Brigade”

During World War II, the British Army created a commando/special forces unit called the “Chindits” that operated in Burma and India, using guerrilla warfare tactics to operate deeply behind Japanese lines. They were formally known as the 77th Indian Infantry Brigade and operated on foot, getting resupplied by parachute drops. They were known for collecting […]

Cyber-Attack Psychology

We already know that cyber attackers have a methodology. They usually perform variations on the following theme: Reconnaissance Penetration Entrench Pivot Disrupt Counter Defense is mixed in throughout But it’s also useful to consider their psychology because it is often different from the thinking used by defenders. When this is true, defenders trying to study […]

Th3J35t3r – Lonewolf Hacker

The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare – [sans.org] 2. Background On December 30, 2010, a patriot hacker posted a message to an Internet Chat Relay (IRC) Server. Quoting Steve Jobs, the hacker typed: “A small team of A players can run circles round a giant team of B and C players” […]

US – Australia – Cyber Treaty

U.S., Australia to add cyber realm to defense treaty – [reuters.com] (Reuters) – The United States and Australia will take the rare step on Thursday of declaring the cyber realm as part of a mutual defense treaty, meaning that a cyber attack on one could lead to a response by both nations. U.S.-Australia Ministerial Consultations […]

Cyberwarfare

The metaphor of warfare used to apply to cyber-conflict is strained, but is still the paradigm most often used in discussions of this area by government and military. The concepts of “target” and “territory” are vastly different in a network. Likewise, the meanings of terms like: capture, destroy, defend, attack, hold, flank, surround, and many […]

PRC Cyber Capabilities Study

A report prepared by Northrop Grumman on Chinese capability to wage information warfare offers some valuable insights into the nature of professional and national security cyber-attack teams. REPORT ON CHINESE CYBER WARFARE & ESPIONAGE – [uscc.gov] “Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation” Prepared for The US-China […]

APT (more)

A new paper that discussed Advanced Persistent Threat (APT) has been released by Mandiant and has sparked new interest in the topic. excerpt from the original post on APT APT or Advanced Persistent Threat describes cyber attacks mounted by organizational teams that have deep resources, advanced penetration skills, specific target profiles and are remarkably persisent […]

Cyberwar Plan

US cyber-warfare planning and activities have advanced beyond defensive measures. At some point, simply sitting back and waiting for an attack while piling resources into massive firewalls and other defenses, like the Maginot Line in WWII, no longer makes sense. It becomes necessary to develop at least an awareness of offensive techniques in order to […]

Mossad Hack

German magazine Der Spiegel describes how a computer hack by the Israeli foreign intelligence agency, the Mossad, enabled Israel to identify and eventually destroy a Syrian nuclear installation. How Israel Destroyed Syria’s Al Kibar Nuclear Reactor – [spiegel.de] In late 2006, Israeli military intelligence decided to ask the British for their opinion. But almost at […]

Cyber Challenge

DOD, SANS, CSIS, several universities and other partner organizations are collaborating to find students with cyber abilities and train them to become future cyber warriors. Pentagon Seeks High School Hackers – [forbes.com] The so-called Cyber Challenge, which will be officially announced later this month, will create three new national competitions for high school and college […]