In routine CNE (hacking) ops, adversaries don't care that much about getting caught. They reuse tools and C2 infrastructure which ID them.
-
-
Show this thread
-
...Because there are no meaningful consequences for getting caught relative to the effort of developing a new ops kit and infrastructure.
Show this thread -
If govs launch kinetic attacks in response to hacks, even the laziest CNE operators will use misattributable kit & C2. Sound good? It's not.
Show this thread
End of conversation
New conversation -
-
-
Think of all the Starbucks that might get cruise-missiled. But is that a pro or con? I'm not sure...
- End of conversation
New conversation -
-
-
Back doors have been put in OSes, software, encryption protocols etc. so hard to know exactly controls what device
-
And obviously when a spy agencies carries out an attack it prefers to first hop onto some network it had hijacked, e.g. North Korea's
End of conversation
New conversation -
-
-
Not to mention that once kinetic response is authorized, the game will be for attackers to divert attribution to their enemies.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
You're a liar, Ed. At
@NSAGov, your actual job was a low-level Microsoft admin and helpdesker.https://twitter.com/twrweb/status/739558093630152710 …
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I stand with Edward Snowden


Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
And it would be woefully simple to frame a hack. And be able to use the US military to perform kinetic attacks on a hackers behalf.
- 1 more reply
New conversation -
-
-
In stead of attacking
@Snowden , or others why don’t we learn from him and those like him? He would know ! Ur a hero 2 me 4 standing up !Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
man... You guys played with genetic algos be4 it was cool.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
This is critical for non-tech folks to understand. Any state actors WILL obfuscate their actions or leave fingerprints of other actors.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Thank you Edward
@SnowdenThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
what you working now?
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
Vault 7 showed us CIA could conduct a cyber attack, leave Russian fingerprints and then use that as justification for Kinetic retaliation
-
Not that they would or would not but this is the abuse that is possible with what Hayden argues for while attribution isn't reliable.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.