Browsing All Posts filed under »Intel Intelligencer«

A New Hope…

December 24, 2013 by

0

Dave Aitel has graciously allowed us to run his commentaries before – see Hackers May Help Choose The Next US President and Aitel On Cyberwar. Dave is the founder and Chief [Security|technology|executive][1] Officer of Immunity, Inc, and runs the Daily Dave mailing list, where this article was originally published. It is re-published here with his kind permission. So […]

Banning Feds From DefCon Is Self Defeating. Here’s Why.

July 11, 2013 by

12

If you’re not familiar with DefCon, the hacker confab that has been meeting in Vegas for more than 20 years, you’re not paying attention to hacking. DefCon (and the accompanying conferences like BlackHat and BSides) makes Vegas the nerdiest place in the universe during July. You don’t want to use an ATM, connect to a […]

Strikeback! Commission on IP Theft Report Gets All Ronin On China

May 23, 2013 by

0

A bipartisan group that studies the effects and impacts of IP theft in the US, The Commission on the Theft of American Intellectual Property, has released a report outlining their findings on the scope of the issue and making policy recommendations to combat it. The most interesting proposal among several: strikeback to re-capture stolen IP […]

How We Learn What We Know, to Chart What We Know

April 29, 2013 by

8

I spent an enjoyable 20 minutes today speaking with Hilary Sargent, an OSINT rock-star who had to ask me what OSINT was. That’s not to say that she didn’t know – I’m sure she did. But when I told her that it was Open Source INTelligence, and further explained the difference, say, between that and […]

The City That Became … [How Much] Safer?

November 12, 2012 by

6

I just picked up a copy of the most racy book available to crime analysts this month, The Crime Numbers Game: Management by Manipulation (Advances in Police Theory and Practice) by John A. Eterno and Eli B. Silverman. Eterno was a NYPD officer who rose through the ranks and retired a captain; he and Silverman, […]

II: Reports You Need To Read Now

October 24, 2012 by

3

Three reports you should be aware of – and not just because Dave and I are so busy with warrant work that we’ve had no time to do anything except point to the analysis of others – are covered in this report, and all are worth reading. The first big report, which we were in […]

Cyber-Criminal OPSEC – a Three-Part Series. Part III: TTTP

June 15, 2012 by

6

In Part I of this three-part series, we discussed the most basic of attribution methods, IP address analysis. In Part II, we talked about computer environmentals, and how it’s possible to build a device fingerprint based on what the user presents when they show up to a web server and ask for something and how […]