Happy long weekend to all the Americans.
-
ebay: you need to list if your item is used or new
theseus (sobbing, just trying to sell his ship): I don’t know!
-
@thegrugq Space shuttle mission STS-27 performed classified activities and as a result could only use highly encrypted but very poor quality video systems to communicatie with the ground. The vehicle was nearly lost because of that:
-
-
Shot
Deception and cyber operations go hand in hand. Is the modern British military ready to make best use of the overlap?
Chaser
lol
We are aware of a breach of the Army’s Twitter and YouTube accounts and an investigation is underway.
The Army takes information security extremely seriously and is resolving the issue. Until their investigation is complete it would be inappropriate to comment further.
-
-
Cyber persistence holds promise for norms because it aligns with core characteristics of cyberspace that motivate malicious behavior, and builds momentum for new rules of customary law for the cyber context.
From Dr. Fischerkeller:
-
-
A few days ago, in this speech,👇@ArmyCGS Sir Patrick Sanders said "you can't cyber your way up a river".
Obvious, yes. Flippant. Perhaps.
But in the context of recent strategic decisions on UK national security, it's enormously significant 🧵1/
gov.uk/government/spe…
-
-
my sister: why do you delete so many tweets?
me: sometimes you don't know something's really stupid until you send it out into the world
my mother: *staring at me just a beat too long*
-
The #BAP is mounted on the Mobile BAP battle station. We call the battle station The Technical, for obvious reasons.
-
Cyber Security Assessment Netherlands (CSAN) 2022 (Jul 4) english.nctv.nl/latest/news/20…
Official publication by @NCTV_NL. Provides insight into strategic themes in digital security for NL In next 4-6yrs.
Direct link to report (1.6MB .pdf, 52 pages): english.nctv.nl/binaries/nctv-…
-
The counterintelligence effect of disclosures, including indictments, is very hard to assess—behavioral effects will be nuanced, indirect, and evolving over time. Note disclosures for CI purposes have a very long history
-
-
Mikko Hypponen on Ukraine and cyberwar.
-
This is the sort of thing I’ve been talking about wrt to how Ukraine protects itself against Russian cyber. They migrate to services that are safer against Russian cyber capabilities, that is, international remote cloud solutions. This makes them harder to attack, because they are using updated patched software, and also harder to attack safely, because Russia has to hack a big Western company as well. I’ll post a longer piece on this I think.
ICYMI: Microsoft Azure is no longer accepting new customers in UK South or West - and while the company plays down the impact of hosting the entire Ukrainian wartimre government, I'm not sure that has little or no effect as claimed.
-
-
Iranian media saying there was a cyberattack on the Tel Aviv Metro. The Tel Aviv Metro does not exist. https://t.co/0B8Q5XFb1b
Sharona Mazalian @SharonaMazalian