Summary: The last debate was mostly chaff, like the campaign mostly entertaining demonstrations of the obvious. But there were moments revealing deep truths about our government and us. They were, of course, ignored. Here is the story of one such moment, a statement by Hillary Clinton that is rich with useful insights -- if we … Continue reading Hidden but important truths from the presidential debate
Summary: Cybersecurity expert Emilio Iasiello discusses one of the key issues in cybersecurity -- how do we determine who attacked us? Each attack brings forth rapid declarations by the government that the attacker is one of their favorite foes. Should we believe them? The Race to Attribution Needs to Stop By Emilio Iasiello Posted at … Continue reading We Must Stop The Race to Attribution After Each Cyberattack
Summary: We see the nature of modern America in our response to cyberattacks. The government quickly points to one of the usual suspects, and Americans believe. Reminders of past government lies have no effect, nor do experts' warnings that attribution in cyberspace ranges from difficult to impossible. For a change of pace, today cybersecurity expert … Continue reading Determining guilt in cyberspace: difficult now, but there’s hope for the future
Summary: It's the cycle of our time. Cyberattack on us. The government points a figure, without evidence and encumbered by their history of lies (and of committing similar deeds). Today cyber intelligence analyst Emilio Iasiello explains why attribution is so important but difficult to do. (2nd of 2 posts today.) "Attempt the end and never … Continue reading Identifying the guilty: tying nation states to cyber espionage
Summary: In this last of Marcus Ranum's 2 posts about identifying cyber-attackers, he explains why the usual methods we read in the news are quite fallible -- no matter how confidently they're stated. Our difficulty with this is a common if scary aspect of modern warfare and crime. Article deleted at author's request. Copyright … Continue reading The horror of cyberspace: we can’t easily identify our attackers.