world war E
dispatches from the network society

Archive for the ‘tactics’ Category

10011001 wants you!

April 16, 2008

So the Air Force Cyberspace Command is stealing a page from our playbook, not that it was a particularly original idea to begin with (they were probably equally inspired by a young Angelina JolieĀ or more likely a grizzled Bruce Willis). But the issue feeds into larger concerns with the US’s science deficit: First, U.S. companies […]

storm worm

October 14, 2007

Global Guerillas posts on a sophisticated new threat to global computer networks. While the concept of self-replicating networks is not exactly novel, the combination of propagation techniques (worm/virus/trojan) into a single managed package represents a new level of coordination by the program’s writers; coordination not just with each other, but with the broader terrain in […]

collective information security: part 1

October 7, 2007

Despite a booming volume business for botnets on the black market, herders are beginning to break up swarms and spread them across multiple command servers, in an effort to thwart the detection and neutralization technique most commonly used by security firms and law enforcement: pinpoint the source of a traffic spike and sever the network […]

monk_exploit

October 7, 2007

The Malaysia Star reports on a virus distributed through emails claiming to convey a message from the Dalai Lama on the plight of monks in Burma.

hacking bin laden

September 12, 2007

The Washington Post reports that independent websites are outstripping the U.S. government’s ability to access bin Laden’s latest video releases. Not only has al Qaeda’s distribution – through video, audio and cell phones – become more sophisticated, but its internet capacity seems to have dramatically expanded; according to the article, 650 sites launched the broadcast […]

mapping cyber-jihad

August 10, 2007

The Economist reported a few weeks ago on Younis Tsouli aka Irhabi007, self-styled cyber-jihadi and apparent coordinator of al-Qaeda’s internet propaganda. Tsouli was arrested in London in 2005 along with two other cyber-jihadis and received a ten year sentence. The London Police counter-terrorism bureau delivered a textbook definition of the network society when describing the […]

cyber-defenses: low; cyberterrorism: inevitable.

August 9, 2007

The real world consequences of cyberwarfare were suggested by the cyberwar on Estonia, which took emergency response telephone services offline for about an hour. Similar concerns have been raised for years in the U.S., especially after the logistical problems of 9/11’s emergency response: What if a cyberterrorist coordinated with a ‘kinetic bomber’ to take down […]

cybercrime funds organized crime

July 26, 2007

Organized crime has, since the early 19th century, used a sophisticated network structure to insulate its activities from information and prosecution. The application of information technology has amplified the capacity of these networks and offered some new business opportunities, according to U.S. federal law enforcement officials. In addition to run of the mill scams, criminal […]

hacking 2.0

July 25, 2007

A recent report frets that the proliferation of web 2.0 applications (and attendent network integration) could expose companies to greater risk of cyber-attack. Obviously, the advance of internet software technology and the increasing enmeshment of social systems in digital networks constitutes a symbiotic process with both dramatic benefits and new risks. It remains for behavior […]

global swarming

July 23, 2007

How do the simple actions of individuals add up to the complex behavior of a group? How do hundreds of honeybees make a critical decision about their hive if many of them disagree? What enables a school of herring to coordinate its movements so precisely it can change direction in a flash, like a single, […]