The More Things Change...Espionage in the Digital Age
Last week, Der Spiegel reported that the BND – Germany’s foreign intelligence agency – had accidentally intercepted calls of U.S. government officials while collecting intelligence on Turkey. For many,...
View ArticleWorking Across the Aisle: The Need for More Tech-Policy Convergence
Last week, the White House confirmed that Todd Park is stepping down from his position as the country’s second Chief Technology Officer to move back to Silicon Valley, though he’ll remain connected to...
View ArticleCyber Defense: Four Lessons from the Field
In cyberspace, as in more traditional domains, it’s essential to both understand your enemy as well as understand yourself. A comprehensive defensive strategy requires a better understanding of the...
View ArticleArticle 5.0: A Cyber Attack on One is an Attack on All (Part 1)
NATO leaders gathered in Wales in early September to address a variety of security challenges, culminating on September 5th with the Wales Summit Declaration. It is no wonder that the summit of an...
View ArticleArticle 5.0: A Cyber Attack on One is an Attack on All (Part 2): Technical...
Mobile phone networks are prime targets for a cyber attack, and governments large and small are in a particularly powerful position to execute such an attack on another country. Given the September 5th...
View ArticleArticle 5.0: A Cyber Attack on One is an Attack on All (Part 3): Why Private...
In the month since our first post on NATO, the Sandworm virus’ extent and reach has become increasingly publicized. Sandworm is believed to be a Russian cyber-espionage campaign focused on extracting...
View ArticleFixing America’s Strategic Analysis Gap Without Creating Another Institution
In his recent Washington Post article “America Needs a Council of International Strategy”, David Laitin accurately makes the case for “better analysis of data, trends, and context…” to help policy...
View ArticleMalware with a Personal Touch
Over the summer, a friend sent me some malware samples that immediately grabbed my attention. The malware was intriguing because the literal file name of each binary was named after a person or a user...
View ArticleINSA Whitepaper: Operational Cyber Intelligence
Endgame Principal Social Scientist Andrea Little Limbago is a coauthor of the Intelligence and National Security Alliance’s (INSA) latest whitepaper, Operational Cyber Intelligence. The paper is part...
View ArticleEndgame Contributes Data and Analysis to "Operation SMN" Report
Today, Novetta and a coalition of cyber security companies released the report “Operation SMN: Axiom Threat Actor Group Report,” which details the characteristics of a threat actor group believed to...
View ArticleBestiary of Cyber Intelligence
Welcome to the First Annual Endgame Halloween Blog! Inspired by the recently released Bestiary of Intelligence masterpiece, we have built upon this model with a Bestiary of Cyber Intelligence 2014: Top...
View ArticleTo Forecast Global Cyber Alliances, Just Follow the Money (Part 3): Moving...
Next week’s APEC summit may, in addition to providing great insight into economic collaborative trends, serve as a harbinger to subsequent cyber collaboration. If the economic trends carry over, it’s...
View ArticleTo Forecast Global Cyber Alliances, Just Follow the Money (Part 2):...
This latest development in the realm of cyber cooperation is by no means unique. In fact, the US has signed its own cyber security agreement with Russia (although it is not as comprehensive as the...
View ArticleTo Forecast Global Cyber Alliances, Just Follow the Money (Part 1):...
Former Secretary of Defense Leon Panetta called cyberspace “the battlefield of the future,” and this characterization of the cyber domain has only increased as cyber attacks grow more prevalent and...
View ArticleBack to the Future: Leveraging the Delorean to Secure the Information...
In the cult classic trilogy Back to the Future, Doc claims, “Where we’re going, we don’t need roads.” He’s referencing 2015, and his assertion reminds us just how difficult it is to forecast the future...
View ArticleChallenges in Data-Driven Security
DEFCON 22 was a great learning experience for me. My goal was to soak up as much information security knowledge as possible to complement my existing data science experience. I grew more and more...
View ArticleSoft Power is Hard: The World Internet Conference Behind the Great Firewall
For three days, Chinese citizens are able to tweet at will and access Google, Facebook, and other forms of social media and traditionally censored content—but only if they are in the historic town of...
View ArticleIs This the Beginning of the End of “Duel”-track Foreign Policy?
The Iranian nuclear negotiations occupy a persistent spot in the foreign policy news cycle. The Associated Press recently reported that Iran has agreed to a list of nuclear concessions. Although still...
View ArticleBlurred Lines: Dispelling the False Dichotomy between National & Corporate...
Several US government agencies have experienced targeted cyber attacks over the last few months. Many believe China is responsible for cyber attacks on the Office of Personnel Management, the US Postal...
View ArticleUnderstanding Crawl Data at Scale (Part 1)
A couple of years ago, in an effort to better understand technology trends, we initiated a project to identify typical web site characteristics for various geographic regions. We wanted to build a...
View Article