Search:

Type: Posts; User: selil; Keyword(s):

Search: Search took 0.03 seconds.

  1. Replies
    119
    Views
    305,558

    My quick comments on investigating digital crime...

    My quick comments on investigating digital crime (less about this and more about general concepts) http://selil.com/archives/6129
  2. Replies
    119
    Views
    305,558

    Great question asked by a lot of people. Not...

    Great question asked by a lot of people. Not being answered either.
  3. Replies
    119
    Views
    305,558

    It looks to me as if there is a significant and...

    It looks to me as if there is a significant and distinct lack of understanding in the world of cyber of how to conduct an investigation. I am continually surprised as I run across "cyber" experts who...
  4. Replies
    119
    Views
    305,558

    The DDOS is one of the lowest forms of disruption...

    The DDOS is one of the lowest forms of disruption you can use. The worm code used was really old, the number of machines infected was really small, and the strategy used was really poor. Not to make...
  5. Replies
    119
    Views
    305,558

    There are a lot of cables out there on the bottom...

    There are a lot of cables out there on the bottom of the ocean. The process of laying sea cables is fairly labor intensive.
  6. Replies
    119
    Views
    305,558

    CIA official: North American power company systems hacked

    There have been several versions of this story starting to escape. It does inform the small wars scholar about possible issues and force multipliers in reconstruction and stabilization operations.
    ...
  7. Replies
    119
    Views
    305,558

    I hate to say it but if you want to bring the...

    I hate to say it but if you want to bring the elite cyber intrusion minds into the mix (in the above scenario not likely), but the elite are motivated simply by cash. The attack methods appear to be...
  8. Replies
    119
    Views
    305,558

    Boeing 787 mayb be subject to hack attack

    As a simple example of computer mediated conflict and terrorism having unlikely avenues of attack, or asymmetric methods to attack, advances in one technology can provide unexpected consequences in...
  9. Replies
    119
    Views
    305,558

    Wowser Jedburgh that is a great link! I had...

    Wowser Jedburgh that is a great link! I had missed this. I had lunch with Ian Foster last week (father of grid computing!) and we were discussing this kind of commodity computing and some the...
  10. Replies
    119
    Views
    305,558

    I wouldn't worry to much about the communication...

    I wouldn't worry to much about the communication paths of criminal elements. With cell phone scramblers, good encryption, and a variety of "criminal" languages the com path for organized crime is...
  11. Replies
    119
    Views
    305,558

    I want to say that as an academic I step all...

    I want to say that as an academic I step all over OPSEC for the fun of it. But, there are places that I tread carefully. I've been having a running battle with some entities and I've been informed...
  12. Replies
    119
    Views
    305,558

    Cyber attacks on the USA (catch all)

    There has long been a discussion about the kinetic nature of cyber warfare. Today CNN brings us video of a largish hole in the power grid. Kinetic effect without the kinetic cost. I wonder what the...
Results 1 to 12 of 12