Call for Papers: Suits and Spooks Singapore: Dec 2-3, 2013
Suits and Spooks SingaporeThe Mandarin Oriental HotelDecember 2-3, 2013Call For PapersTaia Global's hit conference series Suits and Spooks will hold its first international conference in Singapore this...
View ArticleChina Operates the World's Most Successful HoneyPot
The Chinese government has been on a focused mission to increase its technological development for many years. One of the best and most efficient ways that it has of doing this is by making it...
View ArticlePlease take and share this "Hacker Deception Survey" (Now Updated with Results)
When it comes to blaming cyber attacks on any given nation state, many times the evidence given includes WHOIS registration data. There's been a surprising (at least to me) amount of credibility given...
View ArticleMandiant's APT1 "Mission" problem
Mandiant's APT1 report's table of proof listed six categories that Mandiant deduced tied APT1 to PLA Unit 61398. The first, which Mandiant called the Mission area, made the claim that PLA Unit 61398...
View ArticleAPT1, Shanghai Jiao Tong university, and Xenophobia
A few things have caught my attention recently which I'd like to share with you all in a somewhat abbreviated manner (meaning I'm swamped but this is important):A Security Engineer's Forensic Review of...
View ArticleRep. Wolf's Flawed Approach to Supply Chain Security
According to this article in today's Politico, Rep. Wolf has inserted language in a budget stopgap bill that is "meant to ensure Chinese companies certify their independence from official Beijing...
View ArticleU.S. superiority in network-centric warfighting may be in jeopardy. Join the...
Network-centric Warfare has become the de facto standard for many nations, not just the U.S. Unfortunately, thanks to the exponential growth of global networks and the accompanying security...
View ArticleCyber Security Vendors Who May Benefit From Increased Gov Spending in 2013-14
According to Bloomberg, the following companies may see a piece of Obama's request to increase cyber security spending for the next fiscal year beginning Oct 1, 2013."The overall cybersecurity spending...
View ArticleClosing the Loop: Part of an Assumption of Breach Security Paradigm
Tim O'Reilly gave a talk recently at Stanford University on the importance for startup companies to "close the loop" with their customers. Uber was used to demonstrate the concept. Both the Uber driver...
View ArticleSyrian Electronic Army: Background, Operations, Gov't Affiliations
The Syrian Electronic Army (originally called Syrian Electronic Soldiers) was created in May 2011 by the Syrian Computer Society who registered the domain Syria-es.com and .org with Network Solutions....
View ArticleChimera: Know Your Targets
In today's digital landscape, threats are expanding and your intellectual property and trade secrets are their targets. You may not know the threat actor, but you can know what they're...
View ArticleChallenges with Threat Intelligence, Attribution, and Active Defense are on...
We've got a tremendous speaker line-up including John Caruthers, the head of the FBI's National Security Cyber Program at the San Diego field office, while on intelligence matters, we have RADM Andy...
View ArticleDOD Using Chinese satellites underscores the need to negotiate a cyber...
On March 15, 2013 I wrote an article for Slate magazine ("The U.S. response to Chinese cyberespionage is going to backfire") wherein I said:The anti-China sentiment on the Hill, in the Pentagon, and at...
View ArticleBoston or New York for the next Suits and Spooks?
We try to host a Suits and Spooks event in different cities (other than Washington DC which remains a constant). Our Boston attendance was quite good last year, however I've been asked several times if...
View ArticleThe Focus Areas of 26 Chinese State Key Labs for Information Technology Research
This image is a tag cloud representing the Information Technology focus areas of 26 Chinese State Key Labs. It represents a fraction of the data that we're mining for our Chimera network defense...
View ArticleHigh Visibility, Low Cost Sponsorship Opportunity for Suits and Spooks La Jolla
Whether you"re coming to Suits and Spooks La Jolla or not, you can become a "Friend of Suits and Spooks" and have your name or your company's name listed on the inside cover of our program. The listing...
View ArticleNew 007-inspired logo design for Suits and Spooks
3 weeks before our 6th Suits and Spooks conference (to be held in La Jolla), I'm pleased and proud to unveil our brand new logo created by gifted artist Angela Felan. Angela also created our Chimera...
View ArticleCritique of IP Commission's Cyber Security Recommendations
The National Bureau of Asian Research published (and assisted in writing) "The IP Commission Report: The report of the Commission on the theft of American intellectual property" (.pdf). The Commission...
View ArticleOpen letter to President Obama on the eve of his Summit with President Xi
Dear President Obama,I've spent the last five years working exclusively in the identification and cataloging of threat actors in cyberspace. I've participated in incident response investigations for...
View ArticleIBM Acquires SoftLayer - Who cares that it serves a shit-ton of malware?
The SoftLayer - StopGeorgia.ru Network (Source - Inside Cyber Warfare, p.107)During the Russia-Georgia war in August, 2008, Russian hackers created a forum called StopGeorgia.ru to conduct recruitment,...
View Article