This has some interesting implications to hacking groups, both financially and politically motivated. While sending a Hellfire-equipped Predator drone after hacktivists is typically regarded in polite society as "a bit much," the lessons learned here can be grafted to the online world with some modification.
The list is certainly not exhaustive in terms of case studies, but it is valuable for the framework of tracking a tango group from cradle-to-grave, with time and cause of death available.
http://www.rand.org/pubs/monographs/MG741-1/
February 23, 2009
911.gov project site at UMaryland
http://www.cs.umd.edu/hcil/911gov/index.shtml
This is an interesting project that seeks to exploit the capabilities of the web to enable better communications between citizens and government during a crisis (ideally a two-way street...)
This is rife with possibilities and of course security challenges, well worth a look.
This is an interesting project that seeks to exploit the capabilities of the web to enable better communications between citizens and government during a crisis (ideally a two-way street...)
This is rife with possibilities and of course security challenges, well worth a look.
RAND on the prospect of a Domestic Intelligence Agency for the US
RAND studies western European experience with domestic intelligence agencies and gives US policymakers some pointers.
http://www.rand.org/pubs/monographs/MG805/
(relevant to infosec since a lot of surveillance/prosecution these days is digital...)
http://www.rand.org/pubs/monographs/MG805/
(relevant to infosec since a lot of surveillance/prosecution these days is digital...)
Vulnerabilities in the Terrorist Attack Cycle (Stratfor)
DHS, Infragard and other such organizations that work to mitigate infrastructure threats have constituents that seek their advice on where to spend scarce resources on preventing attacks.
Where are the best places for defenders to disrupt the attacks before it's too late?
Some thoughts here (still relevant from 2005):
http://www.stratfor.com/vulnerabilities_terrorist_attack_cycle
Where are the best places for defenders to disrupt the attacks before it's too late?
Some thoughts here (still relevant from 2005):
http://www.stratfor.com/vulnerabilities_terrorist_attack_cycle
It's official, I'm a twit...
As if you didn't know THAT.
But seriously, I'm on Twitter now... Sad but true.
Twitter.com/shpantzer
Rejoice?
But seriously, I'm on Twitter now... Sad but true.
Twitter.com/shpantzer
Rejoice?
Subscribe to:
Posts (Atom)