• United States



When to Strike Back!

Sep 16, 20111 min
Business ContinuityCareersData and Information Security

Cyber espionage is a virtual manifestation of a physical tradecraft. That trade craft being the cycle of intelligence, counterintelligence and espionage now translated to cyberspace. Cyber espionage incorporates cyberpower; methods to influence, manipulate and shutdown adversary cyber infrastructures. It includes people, process and technology weaknesses while using dynamic methods that focuses effort and emphasis on weakest areas. It also uses cyber instances of:

  • Human Intelligence (HUMINT)

  • Information Security (INFOSEC)
  • Communications Intelligence (COMINT)
  • Signals Intelligence (SIGINT)
  • Open Source Intelligence (OSINT)
  • Culturonomics


It is definitely opportunistic in nature but only as sophisticated as it needs to be. The sophistication is determined and dictated by aggressors after performing intelligence gathering on the intended targets which leads to the exploitation of technological and human vulnerabilities.

The attackers establish repeatable processes and use metrics to determine targets. They are adept at using denial and deception to obfuscate and misdirect. They remains hidden and resident in your environments while extracting information of value for monetization, economic advantage, military and strategic advantage.

Hear and see the rest at:

When to Strike Back!? Treadstone 71 – Mitigative-Retributive Counterstriking (large file-116MB zipped)