February 23, 2009

How terrorist groups end (RAND)

This has some interesting implications to hacking groups, both financially and politically motivated. While sending a Hellfire-equipped Predator drone after hacktivists is typically regarded in polite society as "a bit much," the lessons learned here can be grafted to the online world with some modification.

The list is certainly not exhaustive in terms of case studies, but it is valuable for the framework of tracking a tango group from cradle-to-grave, with time and cause of death available.

http://www.rand.org/pubs/monographs/MG741-1/

911.gov project site at UMaryland

http://www.cs.umd.edu/hcil/911gov/index.shtml

This is an interesting project that seeks to exploit the capabilities of the web to enable better communications between citizens and government during a crisis (ideally a two-way street...)

This is rife with possibilities and of course security challenges, well worth a look.

RAND on the prospect of a Domestic Intelligence Agency for the US

RAND studies western European experience with domestic intelligence agencies and gives US policymakers some pointers.

http://www.rand.org/pubs/monographs/MG805/

(relevant to infosec since a lot of surveillance/prosecution these days is digital...)

Vulnerabilities in the Terrorist Attack Cycle (Stratfor)

DHS, Infragard and other such organizations that work to mitigate infrastructure threats have constituents that seek their advice on where to spend scarce resources on preventing attacks.

Where are the best places for defenders to disrupt the attacks before it's too late?

Some thoughts here (still relevant from 2005):
http://www.stratfor.com/vulnerabilities_terrorist_attack_cycle

It's official, I'm a twit...

As if you didn't know THAT.

But seriously, I'm on Twitter now... Sad but true.

Twitter.com/shpantzer

Rejoice?