tag:blogger.com,1999:blog-4088979.post472644673564693797..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: Cass Sunstein on Red TeamingRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-4088979.post-13562107915784086682015-01-16T09:59:27.604-05:002015-01-16T09:59:27.604-05:00The "Red Team" could be ineffective if i...The "Red Team" could be ineffective if it suffers from sample bias, i.e. picking members who have no expertise in the field or who have a conflict of interest. I don't doubt the effectiveness of the technique. <br /><br />The problem lies in the politics of the situation. It may be politically expedient to blame North Korea for a number of reasons regardless of whether the evidence supports the conclusion. For one, it gets Sony off the hook. Few corporations have the resources to fend off a nation state attack. Strategically, it is a good bluff and may keep other nation states from being more aggressive towards the US and its businesses. Schneier has pointed this out. Third, the FBI has made attributions before, only to revoke them. The Olympic bomb incident and the Anthrax investigation come to mind. The latter was as technically complicated as the Sony hacks, perhaps more so. One scientist had his reputation smeared even though he was eventually cleared. The FBI has not given a great impression of its investigative abilities in several high profile cases over the last twenty years. Perhaps Sony will be a feather in their cap. I wish they had waited until they had concluded the investigation to point fingers.jbmoorehttps://www.blogger.com/profile/09751110750712243573noreply@blogger.comtag:blogger.com,1999:blog-4088979.post-50858301912698863912015-01-15T13:22:11.730-05:002015-01-15T13:22:11.730-05:00I used to "red team" propose courses of ...I used to "red team" propose courses of action at the tactical level (battalion and brigade) in my Army days. <br /><br />Those who thought "red team" applies only to network attack/defense betray the narrowness of their experience. There's a lot of value to having people in infosec with broad backgrounds.Matt Hhttps://www.blogger.com/profile/14879171209066868908noreply@blogger.com