"Bond, James Bond Jr.". The humor of her reply was not lost on anyone present.
"I have not seen an evaluation of the foreign nation vs. transnational cyber threat. Have you?"
"No, can't say that I have. Perhaps we should be looking deeper?"
A lesson to be learned from the thriving eastern european hacker community is that the sponsors need not be limited to identity theft operations for traditional organized crime. Or visible to the connected community in any substantial way.
Indeed, in some cases, it is far preferable for a perpetrator to be hidden under several layers of international camouflage. Pose a threat to a powerful nation-state? Why not if they are an obstacle?
"A few days ago we broached the subject of false flag. Fascinating in this context. Owned media passing through the covert operation (knowingly or not) contributes to the manipulation."
© 2012 Buzz Hill
"I have not seen an evaluation of the foreign nation vs. transnational cyber threat. Have you?"
"No, can't say that I have. Perhaps we should be looking deeper?"
A lesson to be learned from the thriving eastern european hacker community is that the sponsors need not be limited to identity theft operations for traditional organized crime. Or visible to the connected community in any substantial way.
Indeed, in some cases, it is far preferable for a perpetrator to be hidden under several layers of international camouflage. Pose a threat to a powerful nation-state? Why not if they are an obstacle?
"A few days ago we broached the subject of false flag. Fascinating in this context. Owned media passing through the covert operation (knowingly or not) contributes to the manipulation."
© 2012 Buzz Hill
No comments:
Post a Comment