Blog

Every Cyber Attacker is an Insider

On October 29, 2015, in Papers and Essays, Security, by Administrator
0

“What enterprise executives need to realize is that in today’s environment, every cyber attacker is a potential insider. Given the prevalence of BYOD (bring your own device), supply chain integrity issues, foreign travel, and the plethora of successful spearphishing campaigns, executive leadership needs to operate on a presumption of breach basis and work on reducing […]

Continue Reading »

10 Red Teaming Lessons Learned Over 20 Years

On October 29, 2015, in Papers and Essays, Security, by Administrator
0

I’ve written a few popular blog posts over at OODA Loop. Here is one I did on red teaming lessons learned. “I often get asked what lessons I’ve learned over the past twenty years, so I started putting together this list of 10 lessons learned over 20 years of red teaming a few years ago. […]

Continue Reading »

Virtual Reality paper from 1993

On March 9, 2015, in Papers and Essays, by Administrator
0

Before Neo awakened to the existence of the Matrix and before Mark Zuckerberg donned his first Oculus Rift VR goggles, I was writing about the relationship between immersive virtual reality, philosophy, and human behavior (adopting a position of do no harm). I’ve mentioned this essay several times over the past couple of decades and finally […]

Continue Reading »

What Dan taught me

On June 19, 2014, in Obscurity, by Devost
1

Over 20 years ago, I was an unknown graduate student at the University of Vermont with an unpopular research idea. I was convinced that our increasing dependence on inherently vulnerable critical infrastructure presented an emerging national security issue. Few others were similarly convinced. Then I somehow caught the attention of Dan Kuehl at the National […]

Continue Reading »

Virtual Tradecraft Paper outline from 2006

On December 10, 2013, in Papers and Essays, by Administrator
0

Capturing this here for posterity. A friend in the intelligence community got me interested in Second Life which lead to putting together some thoughts on the intelligence implications of virtual worlds. We were talking about this seven years ago… Virtual Tradecraft 2006

Continue Reading »

Kill with a borrowed sword – An Origins Story

On May 29, 2013, in Papers and Essays, by Devost
0

If you’ve seen me speak in the past 15 years, you’ve seen a slide that looks something like this: It was my adaptation of an ancient Chinese stratagem for the information age in which an adversary would use our infrastructures as weapons against us. I originally used it as a reference for information operations, but […]

Continue Reading »

I am Big Data and so are you

On March 19, 2013, in Technology, by Devost
1

Bob Gourley, former CTO of DIA and current CTO of CrucialPoint LLC was guest lecturing at my Georgetown “Information Warfare and Security” class and was discussing mega technology trends when it occurred to me – the next revolution in big data is going to be about me and you. We are sitting on a treasure […]

Continue Reading »

State Sponsored Cyber Threats – The Long View

On February 25, 2013, in Papers and Essays, Security, by Administrator
0

“Thinking about state-sponsored cyber threats over the long term doesn’t come easy to Western strategists. This essay takes a look at at the strategic implications of thinking only in the short-term.” Source: OODA Loop – State Sponsored Cyber Threats – The Long View

Continue Reading »

Tim Cook’s Freshman Year: The Apple CEO Speaks

On December 6, 2012, in Technology, by Administrator
0

“We want diversity of thought. We want diversity of style. We want people to be themselves. It’s this great thing about Apple. You don’t have to be somebody else. You don’t have to put on a face when you go to work and be something different. But the thing that ties us all is we’re […]

Continue Reading »

Chinese IW – 1996

On October 4, 2012, in Security, by Administrator
0

Digging through some old files and found this from 1996: ::::::::::::::::::::: May 10, 1996, Friday SECTION: Part 3 Asia-Pacific; CHINA; MILITARY; EE/D2609/S2 LENGTH: 308 words HEADLINE: INFORMATION WARFARE; China: characteristics of information warfare explored SOURCE: Source: Jiefangjun Bao’, Beijing, in Chinese 16 Apr 96 p6 BODY: [6] Text of report by Chinese army newspaper Jiefangjun […]

Continue Reading »

Links of Interest

Archives