There is an agenda but it's also information that is long overdue - and
there is more of it Classified for what many ppl consider no good reason.
Also, other reports have indicated faculty and staff at the Unis too. None
of which I doubt terribly.

For me the bigger issue is that is simply doesn't matter - it's not like
this level of nation-state backing is ~required~ for  most cyber heists or
most security issues. If anything it furthers (on top of other bad
perceptions) that competitiveness is increasingly a function of secrecy vs
innovation.

Oh well - I'm repeating myself. ;-)

-Ali



On Wed, Feb 20, 2013 at 10:49 AM, Jeffrey Walton <noloa...@gmail.com> wrote:

> On Wed, Feb 20, 2013 at 9:34 AM, Gary McGraw <g...@cigital.com> wrote:
> > hi sc-l,
> >
> > No doubt all of you have seen the NY Times article about the Mandiant
> report that pervades the news this week.  I believe it is important to
> understand the difference between cyber espionage and cyber war.  Because
> espionage unfolds over months or years in realtime, we can triangulate the
> origin of an exfiltration attack with some certainty.  During the fog of a
> real cyber war attack, which is more likely to happen in milliseconds,  the
> kind of forensic work that Mandiant did would not be possible.  (In fact,
> we might just well be "Gandalfed" and pin the attack on the wrong enemy as
> explained here:
> http://searchsecurity.techtarget.com/news/2240169976/Gary-McGraw-Proactive-defense-prudent-alternative-to-cyberwarfare
> .)
> >
> > Sadly, policymakers seem to think we have completely solved the
> attribution problem.  We have not.  This article published in Computerworld
> does an adequate job of stating my position:
> http://news.idg.no/cw/art.cfm?id=94AB4F98-9BBD-1370-154D49FAA7706BE9
> >
> > Those of us who work on security engineering and software security can
> help educate policymakers and others so that we don't end up pursuing the
> folly of active defense.
> >
> I'm somewhat surprised a report of that detail was released for public
> consumption. The suspicion in me tells me its not entirely accurate or
> someone has an agenda. There's too much information in there that
> would be cloaked under "national security" given  other circumstances.
>
> There also appears to be a fair of FUD-fanning going on:
> "Additionally, there is evidence that Unit 61398 aggressively recruits
> new talent from the Science and Engineering departments of
> universities such as Harbin Institute of Technology." The US
> equivalent would be like saying the NSA actively recruits
> Mathematicians and Computer Scientists.
>
> Jeff
>
> _______________________________________________
> Secure Coding mailing list (SC-L) SC-L@securecoding.org
> List information, subscriptions, etc -
> http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
> as a free, non-commercial service to the software security community.
> Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
> _______________________________________________
>
_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
_______________________________________________

Reply via email to