Meta has reportedly taken action against two cyber espionage operations located in South Asia and known as APT36 and Bitter APT. The company confirmed the actions in its latest quarterly threat report, published last Thursday. In the report, the risks identified by Meta across the world are discussed. Meta detailed
Machine Learning (ML) has become an important aspect of modern business and research since the term was first coined in 1952 by computer scientist Arthur Samuels. Based on Donald Hebb’s 1949 model of brain interaction, in the past 70 years the technology has gone from a computer beating a human
Clapper and Ashley on Joint Ops/Intel Operations, Decision-making, the History and Future of Intelligence and Cyber Threats
We started the OODAcast as a way of highlighting insights and lessons learned from leaders and decision-makers in the OODA Network. In the Spring of 2021, Bob Gourley had a conversation with General Jim Clapper and Lieutenant General Robert Ashley. Threads that emerge in these conversations include the nature and history of intelligence, the importance of Joint Ops/Intel operations, the future of intelligence, and specific characteristics of the cyber threat.
On Thursday, State Department officials released a statement alleging that the GRU, a Russiam military intelligence agency, was responsible for cyberattacks that targeted Georgia in October. The attacks took down or defaced thousands of websites and disrupted the broadcasts of two television stations. Administration officials stated that the US and
“Russian government-affiliated actors launched coordinated cyber attacks against Ukrainian government and military targets before and during the attack and seizure of Ukrainian ships and sailors on November 25, a private intelligence firm announced this week. The attacks appeared to be aimed at stealing information that would have been relevant to planning
The U.S. is working to build a cyber deterrence policy and philosophy that will build coalitions and clearly communicate, through both word and deed, that cyber attacks against the U.S. and its allies will lead to severe consequences. Transparency in these efforts, however, poses a singular difficulty. While joining with
An OODA Loop interview with author P.W. Singer on his new book about information operations on social networks.
“Research conducted by the National Security Agency has found that after five hours of cyber operations, performance drops and frustration begins to increase among staffers. Those longer missions caused roughly 10 percent more fatigue and frustration compared to operations that lasted less than five hours, Celeste Paul, a senior researcher
While Cyber has been a recognized warfare domain for almost ten years, the U.S. is still working to improve information sharing relationships between traditional intelligence entities and cyber operations groups. The problem has been named an “item of special interest” for the DoD and efforts are currently under way to
The following overview of Russian espionage operations was extracted from the excellent Report on Russian Security Issues, released by the country of Estonia. As a discipline, cyber espionage in Russia is quite old. The KGB had top-level technical capabilities for spying on the West. Signals intelligence of the time encompassed