Building Models for Time Series Analysis
Data Science In my last post, I talked about the different Python projects I used to put together a pipeline for network security data. In this post, I’ll talk about how I used the scientific computing...
View ArticleReport Analysis: A Data-Driven Approach to Cybersecurity
National Security On Monday, I attended the rollout event for former Secretary of the Navy Richard Danzig’s most recent report: “Surviving on a Diet of Poisoned Fruit: Reducing the National Security...
View ArticleSecuring the e-Campus: Ten Observations About Cyber Security in Academia
Cyber WarriorsNational SecurityThreat Intelligence I recently gave the keynote address at “Securing the eCampus,” a gathering of university CIOs and CISOs hosted by Dartmouth College. Drawing on my...
View ArticleNew Internet Hot Spots? Neighborhood Effects and Internet Censorship
National Security During the 2011 London riots, the local government called for a ban on BlackBerry Messenger Service, a key form of communication during these events. Following the riots, Prime...
View ArticleBlack Hat Decomposed: Perspectives from a Social Scientist
Adversary IntelligenceNational SecurityThreat Intelligence This week I attended my first-ever Black Hat conference. As a social scientist, I was very intrigued to actually experience the culture of the...
View ArticleHow We Win Hack Week
Hack Week With outstretched arms and a voice just a tad too loud, I shout, “Welcome to Hack Week!” As a fitting coda to Black Hat and DEF CON wrapping up in the previous days, an enthusiastic group of...
View ArticleHack Week The Endgame Way
Hack Week Several Endgamers attended Black Hat in Las Vegas a couple of weeks ago. Some stayed and many more arrived for DEF CON. Keeping the theme alive, we just finished up this summer’s Vegas hack...
View ArticleThe More Things Change...Espionage in the Digital Age
Adversary IntelligenceNational Security Last week, Der Spiegel reported that the BND – Germany’s foreign intelligence agency – had accidentally intercepted calls of U.S. government officials while...
View ArticleWorking Across the Aisle: The Need for More Tech-Policy Convergence
Cyber WarriorsNational Security Last week, the White House confirmed that Todd Park is stepping down from his position as the country’s second Chief Technology Officer to move back to Silicon Valley,...
View ArticleCyber Defense: Four Lessons from the Field
Adversary Intelligence In cyberspace, as in more traditional domains, it’s essential to both understand your enemy as well as understand yourself. A comprehensive defensive strategy requires a better...
View ArticleArticle 5.0: A Cyber Attack on One is an Attack on All (Part 1)
National Security NATO leaders gathered in Wales in early September to address a variety of security challenges, culminating on September 5th with the Wales Summit Declaration. It is no wonder that the...
View ArticleArticle 5.0: A Cyber Attack on One is an Attack on All (Part 2): Technical...
Mobile Security Mobile phone networks are prime targets for a cyber attack, and governments large and small are in a particularly powerful position to execute such an attack on another country. Given...
View ArticleArticle 5.0: A Cyber Attack on One is an Attack on All (Part 3): Why Private...
National Security In the month since our first post on NATO, the Sandworm virus’ extent and reach has become increasingly publicized. Sandworm is believed to be a Russian cyber-espionage campaign...
View ArticleFixing America’s Strategic Analysis Gap Without Creating Another Institution
National Security In his recent Washington Post article “America Needs a Council of International Strategy”, David Laitin accurately makes the case for “better analysis of data, trends, and context…”...
View ArticleMalware with a Personal Touch
Malware Over the summer, a friend sent me some malware samples that immediately grabbed my attention. The malware was intriguing because the literal file name of each binary was named after a person or...
View ArticleINSA Whitepaper: Operational Cyber Intelligence
Cyber Intelligence Endgame Principal Social Scientist Andrea Little Limbago is a coauthor of the Intelligence and National Security Alliance’s (INSA) latest whitepaper, Operational Cyber Intelligence....
View ArticleEndgame Contributes Data and Analysis to "Operation SMN" Report
Data ScienceNational SecurityThreat Intelligence Today, Novetta and a coalition of cyber security companies released the report “Operation SMN: Axiom Threat Actor Group Report,” which details the...
View ArticleBestiary of Cyber Intelligence
Cyber IntelligenceMobile Security Welcome to the First Annual Endgame Halloween Blog! Inspired by the recently released Bestiary of Intelligence masterpiece, we have built upon this model with a...
View ArticleTo Forecast Global Cyber Alliances, Just Follow the Money (Part 2):...
Cyber AlliancesNational Security This latest development in the realm of cyber cooperation is by no means unique. In fact, the US has signed its own cyber security agreement with Russia (although it is...
View ArticleTo Forecast Global Cyber Alliances, Just Follow the Money (Part 1):...
Cyber AlliancesNational Security Former Secretary of Defense Leon Panetta called cyberspace “the battlefield of the future,” and this characterization of the cyber domain has only increased as cyber...
View Article