Papers and Essays

Every Cyber Attacker is an Insider

On October 29, 2015, in Papers and Essays, Security, by Administrator
0

“What enterprise executives need to realize is that in today’s environment, every cyber attacker is a potential insider. Given the prevalence of BYOD (bring your own device), supply chain integrity issues, foreign travel, and the plethora of successful spearphishing campaigns, executive leadership needs to operate on a presumption of breach basis and work on reducing […]

10 Red Teaming Lessons Learned Over 20 Years

On October 29, 2015, in Papers and Essays, Security, by Administrator
0

I’ve written a few popular blog posts over at OODA Loop. Here is one I did on red teaming lessons learned. “I often get asked what lessons I’ve learned over the past twenty years, so I started putting together this list of 10 lessons learned over 20 years of red teaming a few years ago. […]

Virtual Reality paper from 1993

On March 9, 2015, in Papers and Essays, by Administrator
0

Before Neo awakened to the existence of the Matrix and before Mark Zuckerberg donned his first Oculus Rift VR goggles, I was writing about the relationship between immersive virtual reality, philosophy, and human behavior (adopting a position of do no harm). I’ve mentioned this essay several times over the past couple of decades and finally […]

Virtual Tradecraft Paper outline from 2006

On December 10, 2013, in Papers and Essays, by Administrator
0

Capturing this here for posterity. A friend in the intelligence community got me interested in Second Life which lead to putting together some thoughts on the intelligence implications of virtual worlds. We were talking about this seven years ago… Virtual Tradecraft 2006

Kill with a borrowed sword – An Origins Story

On May 29, 2013, in Papers and Essays, by Devost
0

If you’ve seen me speak in the past 15 years, you’ve seen a slide that looks something like this: It was my adaptation of an ancient Chinese stratagem for the information age in which an adversary would use our infrastructures as weapons against us. I originally used it as a reference for information operations, but […]

State Sponsored Cyber Threats – The Long View

On February 25, 2013, in Papers and Essays, Security, by Administrator
0

“Thinking about state-sponsored cyber threats over the long term doesn’t come easy to Western strategists. This essay takes a look at at the strategic implications of thinking only in the short-term.” Source: OODA Loop – State Sponsored Cyber Threats – The Long View

Computer Mod That Made Me Smile

On July 16, 2007, in Papers and Essays, Technology, by Administrator
1

Only really funny if you’ve read this paper.

Physical attacks against digital targets

On March 11, 2007, in Papers and Essays, Security, Speaking Engagements, Technology, by Administrator
6

Anyone who has seen me present or has been a student in my class is familiar with the matrix below. In fact, this matrix was the guiding principle for an entire conference session in Sweden 18 months ago and I’ve briefed on it least 300 times to thousands of people. Now read this article: SCOTLAND […]

Happy New Year

On December 31, 2006, in Papers and Essays, Technology, by Administrator
0

Hacking a Terror Network

On February 12, 2005, in Papers and Essays, by Administrator
2

It was my pleasure to be the technical editor on this book by Russ Rogers. Click here to check it out on Amazon.com.

Also Blogging at:

Archives