@attritionorg Emailed follow up with references. Would be good to include @ErrataRob blog as well. I suggest a panel for further discussion
@ErrataRob agreed. but.. want to hazard a guess on the % of espionage that would happen real world vs cyber?
-
-
@attritionorg But here's the thing: everything is in on disk drives instead of filing cabinets, so by definition, all espionage is cyber :) -
@ErrataRob@attritionorg Don't forget field espionage. More spies in DC today than during the 80's and they don't all carry around USB!
End of conversation
New conversation -
-
-
@attritionorg Maybe some of the lesser value targets become not worth the effort. -
@ErrataRob How do you identify the 'lesser value targets' so easily these days? Not like the 60/70's.
End of conversation
New conversation -
-
-
@attritionorg@ErrataRob In short: a lot of “garbage” is stolen through “cyber espionage” that is never used by the attackers. Quant v qual.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@attritionorg@ErrataRob Also: cyber gets you data, not necessarily knowledge what to do with it. Indus espionage gives you all the tools.Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
@attritionorg@ErrataRob Cyber makes it cheap to get a lot of data (victim sees). Most never used b/c processing expensive (attacker PoV).Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.