Results 1 to 20 of 34

Thread: ISIS & media (catch all)

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1
    Council Member
    Join Date
    Oct 2005
    Posts
    3,169

    Default

    It was only a matter of time until something of this scale happened, and I suspect it will only get worse. It will also only be a matter of time until they employ advanced conventional weapons and unconventional weapons in the West.

  2. #2
    Council Member davidbfpo's Avatar
    Join Date
    Mar 2006
    Location
    UK
    Posts
    13,366

    Default

    Once this "genie is out of the bottle" then this tactic can be used. Nor should we overlook the widely reported suspicion that the nation-state - a broad label - have used it too, Stuxnet comes to mind.
    davidbfpo

  3. #3
    Council Member
    Join Date
    Oct 2005
    Posts
    3,169

    Default

    and the attack on Sony allegedly by North Korea.

    A few more examples in this article:

    http://www.reuters.com/article/2015/...0MY06Z20150407

    At security company Trend Micro Inc. , which compiled the report for the OAS, Chief Cybersecurity Officer Tom Kellermann said additional destructive or physical attacks came from political activists and organized crime groups.

    “We are facing a clear and present danger where we have non-state actors willing to destroy things,” he said. “This is going to be the year we suffer a catastrophe in the hemisphere, and when you will see kinetic response to a threat actor.”
    Those thinking about cyber defense are considering taking the offensive, since defensive tactics and technology have proved inadequate. The following article includes the rare occurrence of a British citizen complementing the U.S. :-).

    http://www.tripwire.com/state-of-sec...sive-security/

    The fact of the matter simply put are, we are seeing far too many successful attacks take place against organisations who are actually spending small fortunes on their security defences and capabilities, which at the same time are still leaving them insecure post the granting of a valued ‘tick’, which leave the assessed organisation still exposed to the nightmare of their unknown unknowns – enter Offensive Security.

    When we refer to the subject of Offensive Security, we look beyond what is seen as red-team testing, and embrace an activity which encompasses the dark-arts of our adversaries, which goes well before the world of penetration testing, and over focuses on what we already know, or think we need – to subject it to a programme of security testing. In fact, here when representing a client, I asked the assigned penetration tester what they felt the client should include in the testing schedules, and they responded: “Just tell us the IP range, and we will run this testing based on that input.”

  4. #4
    Council Member AdamG's Avatar
    Join Date
    Dec 2005
    Location
    Hiding from the Dreaded Burrito Gang
    Posts
    3,096
    A scrimmage in a Border Station
    A canter down some dark defile
    Two thousand pounds of education
    Drops to a ten-rupee jezail


    http://i.imgur.com/IPT1uLH.jpg

Similar Threads

  1. Syria under Bashir Assad (closed end 2014)
    By SWJ Blog in forum Middle East
    Replies: 903
    Last Post: 12-31-2014, 11:08 PM
  2. Replies: 1
    Last Post: 10-28-2014, 09:43 PM
  3. New Paper: Herding cats: the evolution of the ADF’s media embedding program
    By Spud in forum Media, Information & Cyber Warriors
    Replies: 0
    Last Post: 07-12-2013, 01:06 AM
  4. COIN & The Media (catch all)
    By Jedburgh in forum Media, Information & Cyber Warriors
    Replies: 79
    Last Post: 02-28-2009, 11:55 AM
  5. The Al-Qaeda Media Nexus
    By Jedburgh in forum Media, Information & Cyber Warriors
    Replies: 1
    Last Post: 04-15-2008, 10:59 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •