When to Strike Back!

Cyber espionage is a virtual manifestation of a physical tradecraft. That trade craft being the cycle of intelligence, counterintelligence and espionage now translated to cyberspace. Cyber espionage incorporates cyberpower; methods to influence, manipulate and shutdown adversary cyber infrastructures. It includes people, process and technology weaknesses while using dynamic methods that focuses effort and emphasis on weakest areas. It also uses cyber instances of:

  • Human Intelligence (HUMINT)

  • Information Security (INFOSEC)
  • Communications Intelligence (COMINT)
  • Signals Intelligence (SIGINT)
  • Open Source Intelligence (OSINT)
  • Culturonomics

non-inclusively.

It is definitely opportunistic in nature but only as sophisticated as it needs to be. The sophistication is determined and dictated by aggressors after performing intelligence gathering on the intended targets which leads to the exploitation of technological and human vulnerabilities.

The attackers establish repeatable processes and use metrics to determine targets. They are adept at using denial and deception to obfuscate and misdirect. They remains hidden and resident in your environments while extracting information of value for monetization, economic advantage, military and strategic advantage.

Hear and see the rest at:

When to Strike Back!? Treadstone 71 - Mitigative-Retributive Counterstriking (large file-116MB zipped)

http://www.treadstone71.com/whitepapers/Treadstone71-WhentoStrikeBack.zip

Copyright © 2011 IDG Communications, Inc.

Subscribe today! Get the best in cybersecurity, delivered to your inbox.