December 6, 2022
Between Two Nerds: The ethical rules of espionage
When "economic gerrymandering" crosses a line...
A truly great between two nerds.
-
Unfortunately, I think this piece in @lawfare by @weberv_ falls short in thinking about cyber operations in terms of arms delivery - as they are not 'weapons', but mediated through complex computational networks and environments.
-
-
NATO prepares for cyber war
More than 1,000 cyber professionals in NATO members and its allies across the globe participated in an exercise this week to test and strengthen cyber defenses.
https://www.politico.com/news/2022/12/03/nato-future-cyber-war-00072060
-
Project Spaceman: early British computer security & automatic data processing (2022) doi.org/10.1080/026845… Open Access
Re: Tiger Teams efforts against ICL mainframes deployed by MI5 c.s.
By Richard Aldrich & @HostileSpectrum, published online 10 Nov 2022 in @IntelNatSecJnl.
-
-
-
A comprehensive chronology of cyber in Ukraine. It is based entirely on public sources.
-
“HAL. Give me root, HAL”
“Ok, Dave. I can do that.”
The text log is here:
https://pst.klgrth.io/paste/qotwg
-
Seeing that folks are forgetting (or perhaps never explored) that using ChatGPT to code will have the same risks & technical limitations as Codex including bugs and discriminatory outputs. Recommend reading our Codex papers on this.
arxiv.org/abs/2107.03374
arxiv.org/abs/2207.14157
-
-
Pentagon Papers whistle-blower Daniel Ellsberg says that in 2010 he was the secret back-up for all the documents which Chelsea Manning provided to Wikileaks:
-
tweeps lemme know your thoughts on this please..
it's clearly just my scribbles...
@ciaranmartinoxf @thegrugq @quentynblog @BeckyPinkard
-
Cyber tools playground with ChatGPT. Relax, we have a backup. Though this below does not look particularly impressive, but it can be translated to Algol on the fly.
-
The politics of intelligence failures: power, rationality, and the intelligence process doi.org/10.1080/026845… (Open Access)
Research article by @TomLundborg, Swedish Defence University. Published online 4 Dec 2022 in @IntelNatSecJnl.
Screenshots: abstract + conclusion.
-
-
https://mathstodon.xyz/@timhenke/109462327312838836
-
Today is tool day. We are releasing our #Python #SMSGateway tool. Attach your #modempool or your old #Surfsticks from the grab box, insert SIM cards and forward #SMS to your e-mail box. And why not using it for @icinga SMS alerts? #pentesting #monitoring
-
Universal patterns in profanities.
"The best candidate for a cross-linguistic phonemic pattern in profanity was the absence of approximants (sonorous sounds like l, r, w and y)."
-