tag:blogger.com,1999:blog-4088979.post333856355067549998..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Offense Kills PiratesRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger8125tag:blogger.com,1999:blog-4088979.post-21748015017089996372009-02-10T03:49:00.000-05:002009-02-10T03:49:00.000-05:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-68879675681733896072008-07-17T02:40:00.000-04:002008-07-17T02:40:00.000-04:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-41851495904866181222008-07-17T02:39:00.000-04:002008-07-17T02:39:00.000-04:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-40473612000854106772008-06-05T10:02:00.000-04:002008-06-05T10:02:00.000-04:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-58201126382134433252008-05-28T19:11:00.000-04:002008-05-28T19:11:00.000-04:00VVAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-24358429032972946462008-05-26T08:53:00.000-04:002008-05-26T08:53:00.000-04:00The military-infosec comparison is worn out and ob...The military-infosec comparison is worn out and obviously DOES NOT WORK. (See Richard's blog post on FISMA 2007 specifically the DoD's F/F score). This way of thinking makes for a reader-grabbing controversial blog post, but it doesn't make a lot of sense these days. Oh if it were only as simple as "Hey, they have a pirate flag, get them!"<BR/><BR/>Taking physical action against the threat is really the least intelligent way of securing your network. It just doesn't scale. When you turn the testosterone down and actual think about what you are suggesting, it doesn't make a lot of sense. Attackers will just better mask their location and alter tactics. Sure, dropping a JDAM on a group of attackers or kidnapping a few of them will scare some... But we're not going to attack China or any other nation. <BR/><BR/>I'll start by saying that we'd be entering dangerous territory if the MPAA/RIAA is handing the DoD grid coordinates to kill pirates. :) But I'll assume you don't mean that we should be using the military to solve private industry's woes. I assume you mean more serious threats.<BR/><BR/>So why can't the US government beat the Chinese at their own game? Is the problem so insurmountable that we have to resort to physical action? You don't see the Chinese attacking other countries, or "killing pirates" to solve their network security woes. <BR/><BR/>Now, there are exceptions to what I am about to say. There probably are smart, skilled and out-of-the-box thinkers who work for the federal government either directly or as contractors. I am sure there are some very smart minds at the NSA, etc. However in my experience the US government typically doesn't attract the most skilled security people. Most of the "good" security people work in private industry. We all know it. The guys who are highly skilled run security tools, all the rest live in Excel spreadsheets and do C&A work. The government has a real problem attracting and keeping top talent. Instead, they hire government contractor body shops. "This analyst doesn't know what nmap is but at least they have a clearance. Put them on site and bill them out!"<BR/><BR/>Whenever I hear about a huge security gaffe (e.g. Unisys's performance at DHS) I just chuckle. And now the USAF wants to start an "offensive wing". Buy 5,000 Core Impact licenses and declare MISSION ACCOMPLISHED! Who's going to drive Core Impact (or any other vendor solution that the gov was suckered into paying 1 million dollars for)? Who cares! As long as they have their clearance and they have their CISSP.<BR/><BR/>China on the other hand doesn't have this issue. They seem to walk into our networks on a daily basis. It's not a budgeting issue. Everyone knows that the DoD has a HUGE IT security budget and access to a ton of vendor solutions. I wonder what our problem is???Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-47913808693965167072008-05-24T23:51:00.000-04:002008-05-24T23:51:00.000-04:00I just read Under the Black Flag. I couldn't put i...I just read <I>Under the Black Flag</I>. I couldn't put it down. Ditto the recommendation.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-63594455372640856462008-05-17T10:03:00.000-04:002008-05-17T10:03:00.000-04:00If you liked this show, you'll probably want to re...If you liked this show, you'll probably want to read <I>Under the Black Flag: The Romance and Reality of Life Among the Pirates</I>. It's pretty much the standard work on the subject now, and no doubt one of the main sources the producers used. And it's only about $4 on Amazon if you don't mind buying used. 8-)<BR/><BR/>I've been reading my copy lately. It's great fun!DavidJBiancohttps://www.blogger.com/profile/09760835714791462863noreply@blogger.com