Identifying Aggressors in the Global Cyber Threatscape
Independent hacker groups and cyber militias who conduct network attacks complicate international relations between governments. President Obama, at the conclusion of his historic talks with President...
View ArticleRussian Security Services lab tied to U.S. industrial espionage case in Texas
Taia Global publishes a subscription-only monthly report for our customers which is normally not available to the public. However in this case I thought that the content merited wide-spread release so...
View ArticleDefending Against a Targeted Insider Attack (aka The Snow Job)
Everyone is familiar with the marketing buzzword APT (Advanced Persistent Threat) which has become synonymous with what's known as a targeted attack. What I'm writing about today is a targeted Insider...
View ArticleNote to U.S. Officials - Stop Whining over IP theft
Here's some un-solicited advice to pretty much everyone inside the Beltway. Please stop whining about China's hacking activities while rationalizing our own. No one else in the world has committed the...
View ArticleRussia's Federal Security Service (FSB) Hacks Facebook Servers
On June 18th, the Moscow trial of ChronoPay owner Paul Wroblewski revealed that the Federal Security Service of Russia (FSB Russia) hacked into Facebookservers to collect information used in...
View ArticleFrance Outraged over NSA spying. How do you say "Glass Houses" in French?
The hypocrisy of French Foreign Minister Laurent Fabius' outrage over U.S. spying allegations is stunning. France's record on espionage is well-known and long-standing. Here are just a few...
View ArticleMy First-hand Experience with China's Most Successful Technology Transfer...
There's no doubt that China is on an aggressive technology acquisition track and has been for 20+ years. Way too much emphasis has been placed on the vacuuming of data from U.S. companies through...
View ArticleChinese and Russian Information Security and Aeronautics R&D Luncheon
Announcing the first Suits and Spooks Adversary R&D luncheon at the Ritz Carlton Tysons Corner in McLean, VA on Sept 10, 2013 from 11:30am – 1:30pm. A limited number of attendees will enjoy a...
View ArticleTaking a Deep Dive into China's Cyber Threat Landscape
The cyber threat landscape is so much more complex than is commonly reported by the media, the government, and especially by information security vendors. China is no different. The goal of the Suits...
View ArticleAviation companies twice as likely to be hacked if they do business in China
The COMAC C919 Passenger JetIn anticipation of speaking at the AIAA conference in Los Angeles on August 12-14, I've been researching aviation companies with joint ventures in China and how many of them...
View ArticleWhat kind of military cyber team can't tell a fake ICS plant from a real one?
Evidently, the PLA is either the most incompetent Army in the world or is tasked with exploiting anything and everything that they can, including obvious honey pots. A paper and BlackHat talk by Kyle...
View ArticleHigh Speed. Low Drag: Attack Efficiencies against U.S. Aerospace Joint...
My team and I have completed a report (High Speed. Low Drag: Attack Efficiencies against U.S. Aerospace Joint Ventures) on how much more vulnerable U.S. companies are to being hacked if they engage in...
View ArticleThe Cyber Kill Chain: Trademarked by Lockheed Martin?
I just learned that Lockheed Martin (NYSE:LMT) filed a trademark for "Cyber Kill Chain" (here and here). That came as quite a surprise since, as far as I know, I was the first to coin and publish that...
View ArticleRussian Institute Solicits Foreign Companies But Masks Ties with Russia's...
My company recently published a report which discovered that aerospace companies with joint ventures in Russia and China are hacked 2.4 times more often than those companies who don't. However, hacking...
View ArticleDr. David Kilcullen: Speaking at Suits and Spooks NY on feral cities and...
I recently heard Dave Kilcullen speak at the Google INFO Summit on illicit trafficking during the summer of 2012 and ever since then I've been trying to find a way to bring his experience and novel...
View ArticleSyrian Electronic Army's Latin American Connection
There's been a lot of press today about how the Syrian Electronic Army is using Russian servers and who some of it's early website administrators are. One of Digital Dao's readers sent me an email this...
View ArticleNon-Lethal Option for Syria: Interrupt Energy and Telecommunications Services
Figure 1: Syria's national power grid (1)What we know: Someone in Syria used Sarin gas and killed an estimated 100,000 people. What we don't know: Who did it. So far, no evidence has been collected...
View ArticleSyrian Gov't Looking to Hire Hackers and DFIR engineers
Syria's Ministry of Communications and Technology website is soliciting "experts in the field of Informatics" including in the areas of ethical hacking, computer forensics, incident response, malware...
View ArticleCall for Papers: Suits and Spooks DC 2014 and Suits and Spooks Singapore 2014
Suits and Spooks DC is coming up on January 20-21, 2014 and Suits and Spooks Singapore will be March 20-21, 2014. The theme for both conferences will be on how companies can safely conduct business...
View ArticleLet's defeat Lockheed Martin's attempt to trademark "Cyber Kill Chain" and...
I'm organizing a complaint to the US Patent and Trademark Office which says that Lockheed Martin (NYSE: LMT) shouldn't be granted a trademark for "Cyber Kill Chain" because it is in common usage. As I...
View Article