Putin’s Russia has demonstrated a penchant for relying on proxies to provide a degree of deniability while pursuing its military objectives. As noted in Christoph Zürcher’s book The post-Soviet wars: Rebellion, ethnic conflict and nationhood in the Caucasus, Putin’s popularity emerged in large part due to his successful resolution of the conflict with Chechnya, which he achieved by co-opting the Kadyrov warlords. More recently, Putin has relied on not only deniable Russian forces, but also proxies within Ukraine. Still, blunders by Russian private military companies like the Wagner Group and Slavonic Corps in Syria have demonstrated how this deniability can backfire.
The December 2016 “Grizzly Steppe” joint analysis report issued by the FBI and DHS provided a table of monikers attributable to various Russian cybercriminal organizations serving the state’s intelligence services. However, understanding what these names refer to is a challenge in and of itself. As noted by Florian Roth in a 2018 Medium article, similarities in names do not necessarily indicate a shared meaning, but are more likely attributable to a cybersecurity firm’s naming scheme.
Humans are more connected now than ever before. However, half the global population is behind on the digital revolution and there is great regional disparity in the availability of affordable Internet. While reports show a growth rate of one million new users a day from 2018-2019, approximately 3 billion people are still not connected. SpaceX, Softbank, Amazon, Google, Virgin, and Facebook are competing to close the gap and are racing to provide worldwide Internet infrastructure to rural and low-income areas. Harvard Business Review anticipates that within the next 3-5 years, “most of the planet will have some access to reliable, if somewhat expensive, broadband.”
Rama Polefka at Black Mountain Dynamics noticed a trend a long time ago: Young companies need a robust, powerful, secure IT infrastructure. But their founders are often so busy creating the company, the IT lags behind and compromises their growth. He has spent his career working with startups to grow their IT at exactly the right pace and with appropriately levels of cybersecurity included to help reduce cyber risk.
OODA is pleased to announce that our Future Proof conference will be held on March 19, 2020 in Tysons Corner, Virginia.
The Future Proof conference brings together the hackers, thinkers, strategists, disruptors, leaders, technologists, and creators with one foot in the future to discuss the most pressing issues of the day and provide insight into the ways technology is evolving. Future Proof is not just about understanding the future, but developing the resiliency to thrive and survive in an age of exponential disruption.
A recent RAND report looks at the role of information warfare and how targeted social media campaigns and similar approaches are deployed to cause damage to a state. RAND has coined the term “hostile social manipulation” to capture this phenomenon, which builds on familiar influence techniques including propaganda and disinformation. Hostile social manipulation is used to gain a competitive advantage by manipulating the political, social, and economic conditions in target countries through information channels. It targets beliefs and attitudes, not physical assets or military forces, allowing the activity to operate in a gray space that exists below the threshold of war.
Gary Harrington’s career in special forces and the CIA could be the basis for a very successful action movie. For over thirty years, he directly planned or executed dozens of unconventional warfare operations on our Nation’s adversaries.
Managing the nexus between physical and cyber security is possible with a deliberate mindset and full cooperation and integration between the two teams. Physical security practitioners should view cyber defense experts as a vital component of their risk management strategy.
OODA’s Cyber Threat Analysis Report provides the “so what” behind the news and events we track on a daily basis. When it comes to putting cyber news in context, there really is no substitute for experience. The context in this report is provided by one of the most highly regarded cybersecurity practitioners and pioneer of cyber threat intelligence (and OODA Network expert) Mike Tanji. In this edition, Mike brings context into the continual unrealistic hope that one day technology can replace wetware in cybersecurity, insights into breakability, what gets measured in our line of work, and much much more.
Quantum Supremacy Is Here: The History Making Quantum Computing News We Have Been Anticipating Has Now Been Reported
Months ago we began to formulate an assessment that a history-making announcement in quantum computing was about to be made. For years the big players in quantum research, including IBM, Microsoft and Google, have been pursuing different methods of using quantum effects to do new calculations. Google had even made announcements indicating they thought they could achieve history-making results in the near term. Because of all that we had been producing a series of reports aimed at making you as informed as possible on what breakthrough announcements in quantum computing could mean for your business strategy.