The Great Divide: Closing the Gap in Cyber Analysis
In 2010, General Michael Flynn co-authored a report entitled Fixing Intel critiquing the threat-centric emphasis within counterinsurgency intelligence analysis. The report, which made waves in the...
View ArticleAnalysis: Three Observations About the Rise of the State in Shaping Cyberspace
Last month commemorated the 100th anniversary of the start of World War I. It was a time when states were so interdependent and borders so porous that some call it the first era of globalization. In...
View ArticleTime Series Analysis for Network Security
Last week, I had the opportunity to attend a conference that had been on my radar for a long time. I’ve been using scientific Python tools for about 10 years, so it was with great excitement that I...
View ArticleBuilding Models for Time Series Analysis
In my last post, I talked about the different Python projects I used to put together a pipeline for network security data. In this post, I’ll talk about how I used the scientific computing software...
View ArticleReport Analysis: A Data-Driven Approach to Cybersecurity
On Monday, I attended the rollout event for former Secretary of the Navy Richard Danzig’s most recent report: “Surviving on a Diet of Poisoned Fruit: Reducing the National Security Risks of America’s...
View ArticleSecuring the e-Campus: Ten Observations About Cyber Security in Academia
I recently gave the keynote address at “Securing the eCampus,” a gathering of university CIOs and CISOs hosted by Dartmouth College. Drawing on my fifteen years of experience in the kinetic security...
View ArticleNew Internet Hot Spots? Neighborhood Effects and Internet Censorship
During the 2011 London riots, the local government called for a ban on BlackBerry Messenger Service, a key form of communication during these events. Following the riots, Prime Minister David Cameron...
View ArticleBlack Hat Decomposed: Perspectives from a Social Scientist
This week I attended my first-ever Black Hat conference. As a social scientist, I was very intrigued to actually experience the culture of the conference, but anticipated being overwhelmed by the...
View ArticleHack Week The Endgame Way
Several Endgamers attended Black Hat in Las Vegas a couple of weeks ago. Some stayed and many more arrived for DEF CON. Keeping the theme alive, we just finished up this summer’s Vegas hack week, where...
View ArticleHow We Win Hack Week
With outstretched arms and a voice just a tad too loud, I shout, “Welcome to Hack Week!” As a fitting coda to Black Hat and DEF CON wrapping up in the previous days, an enthusiastic group of Endgame...
View ArticleThe More Things Change...Espionage in the Digital Age
Last week, Der Spiegel reported that the BND – Germany’s foreign intelligence agency – had accidentally intercepted calls of U.S. government officials while collecting intelligence on Turkey. For many,...
View ArticleWorking Across the Aisle: The Need for More Tech-Policy Convergence
Last week, the White House confirmed that Todd Park is stepping down from his position as the country’s second Chief Technology Officer to move back to Silicon Valley, though he’ll remain connected to...
View ArticleCyber Defense: Four Lessons from the Field
In cyberspace, as in more traditional domains, it’s essential to both understand your enemy as well as understand yourself. A comprehensive defensive strategy requires a better understanding of the...
View ArticleArticle 5.0: A Cyber Attack on One is an Attack on All (Part 1)
NATO leaders gathered in Wales in early September to address a variety of security challenges, culminating on September 5th with the Wales Summit Declaration. It is no wonder that the summit of an...
View ArticleFixing America’s Strategic Analysis Gap Without Creating Another Institution
In his recent Washington Post article “America Needs a Council of International Strategy”, David Laitin accurately makes the case for “better analysis of data, trends, and context…” to help policy...
View ArticleMalware with a Personal Touch
Over the summer, a friend sent me some malware samples that immediately grabbed my attention. The malware was intriguing because the literal file name of each binary was named after a person or a user...
View ArticleINSA Whitepaper: Operational Cyber Intelligence
Endgame Principal Social Scientist Andrea Little Limbago is a coauthor of the Intelligence and National Security Alliance’s (INSA) latest whitepaper, Operational Cyber Intelligence. The paper is part...
View ArticleEndgame Contributes Data and Analysis to "Operation SMN" Report
Today, Novetta and a coalition of cyber security companies released the report “Operation SMN: Axiom Threat Actor Group Report,” which details the characteristics of a threat actor group believed to...
View ArticleBestiary of Cyber Intelligence
Welcome to the First Annual Endgame Halloween Blog! Inspired by the recently released Bestiary of Intelligence masterpiece, we have built upon this model with a Bestiary of Cyber Intelligence 2014: Top...
View ArticleTo Forecast Global Cyber Alliances, Just Follow the Money (Part 3): Moving...
Next week’s APEC summit may, in addition to providing great insight into economic collaborative trends, serve as a harbinger to subsequent cyber collaboration. If the economic trends carry over, it’s...
View Article