Hidden but important truths from the presidential debate

Summary: The last debate was mostly chaff, like the campaign mostly entertaining demonstrations of the obvious. But there were moments revealing deep truths about our government and us. They were, of course, ignored. Here is the story of one such moment, a statement by Hillary Clinton that is rich with useful insights -- if we … Continue reading Hidden but important truths from the presidential debate

Advertisements

We Must Stop The Race to Attribution After Each Cyberattack

Summary: Cybersecurity expert Emilio Iasiello discusses one of the key issues in cybersecurity -- how do we determine who attacked us? Each attack brings forth rapid declarations by the government that the attacker is one of their favorite foes. Should we believe them? The Race to Attribution Needs to Stop By Emilio Iasiello Posted at … Continue reading We Must Stop The Race to Attribution After Each Cyberattack

Determining guilt in cyberspace: difficult now, but there’s hope for the future

Summary: We see the nature of modern America in our response to cyberattacks. The government quickly points to one of the usual suspects, and Americans believe. Reminders of past government lies have no effect, nor do experts' warnings that attribution in cyberspace ranges from difficult to impossible. For a change of pace, today cybersecurity expert … Continue reading Determining guilt in cyberspace: difficult now, but there’s hope for the future

Identifying the guilty: tying nation states to cyber espionage

Summary:  It's the cycle of our time. Cyberattack on us. The government points a figure, without evidence and encumbered by their history of lies (and of committing similar deeds).  Today cyber intelligence analyst Emilio Iasiello explains why attribution is so important but difficult to do.  (2nd of 2 posts today.) "Attempt the end and never … Continue reading Identifying the guilty: tying nation states to cyber espionage

The horror of cyberspace: we can’t easily identify our attackers.

Summary: In this last of Marcus Ranum's 2 posts about identifying cyber-attackers, he explains why the usual methods we read in the news are quite fallible -- no matter how confidently they're stated. Our difficulty with this is a common if scary aspect of modern warfare and crime.  {2nd of 2 posts today.} Attribution is … Continue reading The horror of cyberspace: we can’t easily identify our attackers.

How do we identify our attackers in cyberspace?

Summary: The news overflows with confident identification of cyberattackers. Today we have an account of hacking from a defender's perspective, explaining the difficulty of attribution, written by our co-author Marcus Ranum. After reading this, you'll regard the news about these things more skeptically. {2nd of 2 posts today.} By Marcus Ranum, Senior Strategist at Tenable … Continue reading How do we identify our attackers in cyberspace?

Cyberwar: About Attribution (identifying your attacker)

Summary:  Identifying the attacker is the key to modern military defense, so one can launch a reprisal or counter-strike.  But attributing cyberattacks is difficult because nothing in cyberspace has to look like anything familiar. How do you attribute a weapon that was created out of thin air and used by an enemy that has no physical … Continue reading Cyberwar: About Attribution (identifying your attacker)