Quantcast
Channel: Endgame's Blog
Browsing all 698 articles
Browse latest View live

The More Things Change...Espionage in the Digital Age

Last week, Der Spiegel reported that the BND – Germany’s foreign intelligence agency – had accidentally intercepted calls of U.S. government officials while collecting intelligence on Turkey. For many,...

View Article


Working Across the Aisle: The Need for More Tech-Policy Convergence

Last week, the White House confirmed that Todd Park is stepping down from his position as the country’s second Chief Technology Officer to move back to Silicon Valley, though he’ll remain connected to...

View Article


Cyber Defense: Four Lessons from the Field

In cyberspace, as in more traditional domains, it’s essential to both understand your enemy as well as understand yourself. A comprehensive defensive strategy requires a better understanding of the...

View Article

Article 5.0: A Cyber Attack on One is an Attack on All (Part 1)

NATO leaders gathered in Wales in early September to address a variety of security challenges, culminating on September 5th with the Wales Summit Declaration. It is no wonder that the summit of an...

View Article

Article 5.0: A Cyber Attack on One is an Attack on All (Part 2): Technical...

Mobile phone networks are prime targets for a cyber attack, and governments large and small are in a particularly powerful position to execute such an attack on another country. Given the September 5th...

View Article


Article 5.0: A Cyber Attack on One is an Attack on All (Part 3): Why Private...

In the month since our first post on NATO, the Sandworm virus’ extent and reach has become increasingly publicized. Sandworm is believed to be a Russian cyber-espionage campaign focused on extracting...

View Article

Fixing America’s Strategic Analysis Gap Without Creating Another Institution

In his recent Washington Post article “America Needs a Council of International Strategy”, David Laitin accurately makes the case for “better analysis of data, trends, and context…” to help policy...

View Article

Image may be NSFW.
Clik here to view.

Malware with a Personal Touch

Over the summer, a friend sent me some malware samples that immediately grabbed my attention. The malware was intriguing because the literal file name of each binary was named after a person or a user...

View Article


INSA Whitepaper: Operational Cyber Intelligence

Endgame Principal Social Scientist Andrea Little Limbago is a coauthor of the Intelligence and National Security Alliance’s (INSA) latest whitepaper, Operational Cyber Intelligence. The paper is part...

View Article


Endgame Contributes Data and Analysis to "Operation SMN" Report

Today, Novetta and a coalition of cyber security companies released the report “Operation SMN: Axiom Threat Actor Group Report,” which details the characteristics of a threat actor group believed to...

View Article

Image may be NSFW.
Clik here to view.

Bestiary of Cyber Intelligence

Welcome to the First Annual Endgame Halloween Blog! Inspired by the recently released Bestiary of Intelligence masterpiece, we have built upon this model with a Bestiary of Cyber Intelligence 2014: Top...

View Article

To Forecast Global Cyber Alliances, Just Follow the Money (Part 3): Moving...

Next week’s APEC summit may, in addition to providing great insight into economic collaborative trends, serve as a harbinger to subsequent cyber collaboration. If the economic trends carry over, it’s...

View Article

To Forecast Global Cyber Alliances, Just Follow the Money (Part 2):...

This latest development in the realm of cyber cooperation is by no means unique. In fact, the US has signed its own cyber security agreement with Russia (although it is not as comprehensive as the...

View Article


To Forecast Global Cyber Alliances, Just Follow the Money (Part 1):...

Former Secretary of Defense Leon Panetta called cyberspace “the battlefield of the future,” and this characterization of the cyber domain has only increased as cyber attacks grow more prevalent and...

View Article

Back to the Future: Leveraging the Delorean to Secure the Information...

In the cult classic trilogy Back to the Future, Doc claims, “Where we’re going, we don’t need roads.” He’s referencing 2015, and his assertion reminds us just how difficult it is to forecast the future...

View Article


Challenges in Data-Driven Security

DEFCON 22 was a great learning experience for me. My goal was to soak up as much information security knowledge as possible to complement my existing data science experience. I grew more and more...

View Article

Soft Power is Hard: The World Internet Conference Behind the Great Firewall

For three days, Chinese citizens are able to tweet at will and access Google, Facebook, and other forms of social media and traditionally censored content—but only if they are in the historic town of...

View Article


Is This the Beginning of the End of “Duel”-track Foreign Policy?

The Iranian nuclear negotiations occupy a persistent spot in the foreign policy news cycle. The Associated Press recently reported that Iran has agreed to a list of nuclear concessions. Although still...

View Article

Blurred Lines: Dispelling the False Dichotomy between National & Corporate...

Several US government agencies have experienced targeted cyber attacks over the last few months. Many believe China is responsible for cyber attacks on the Office of Personnel Management, the US Postal...

View Article

Image may be NSFW.
Clik here to view.

Understanding Crawl Data at Scale (Part 1)

A couple of years ago, in an effort to better understand technology trends, we initiated a project to identify typical web site characteristics for various geographic regions. We wanted to build a...

View Article
Browsing all 698 articles
Browse latest View live