We may never know as to when did the cycle of escalation — which led to the eventual hack of the DNC — begin. It possibly had its origins in the Colour Revolutions, the tenure of the then-Secretary of State Hillary Clinton or maybe even the release of the Panama Papers. The chain of causation certainly diverges from the narrative advertised by the mainstream media.Continue reading “Did the DNC become a countervalue target for cyber deterrence?”
My essay for the Modern War Institute, US Military Academy at West Point: https://mwi.usma.edu/death-knell-international-norms-cyber-conflict/.
On July 8, Michael Schmitt, a law professor and former judge advocate in the US Air Force, posted a perplexing tweet about changing his mind on the “status of cyber capabilities as ‘weapons.’” He followed it up with the linkto a recent paper he coauthored for the International Law Studies journal of the US Naval War College.
Schmitt is one of the key architects of the guiding document on international norms of cyber conflict, widely known as the Tallinn Manual. His latest paper severely curtails the legal logic that is the heart of the manual, which, even prior to Schmitt’s admission, was thought to be shaky at best. In fact, the newer set of assumptions proposed by Schmitt may also not stand up to scrutiny, further limiting the manual’s applicability to real-world scenarios.Continue reading “A Death Knell for the International Norms of Cyber Conflict – Modern War Institute, US Military Academy”
During my stint with the government, we established formal contact with a Western signals intelligence agency. In one of the highly ceremonial and limited interactions with our counterparts from that agency, my boss joked of recruiting a “young gun” who was spearheading cyber operations. That was me.
While I have always rated myself as a below-average hacker, I was indeed a test case for the government in inducting ‘specialists’ into the system via lateral entry (Don’t ask me how it went).Continue reading “A case for the assassination of military hackers”
My opinion piece for The Quint: https://www.thequint.com/voices/opinion/united-states-iran-standoff-cyber-warfare-military-donald-trump.
Despite what the media likes to believe, there are no watersheds in the history of cyber conflict. Offensive cyber operations simply don’t work that way. You don’t irreversibly leap over the Rubicon, but crisscross it a couple of times to derive reasonable threshold estimates of power projection.
Cyber operations — as the militarised, regimented form of hacking is often called — don’t manifest themselves as precision-guided munitions. They’re more like a game of probability.Continue reading “US-Iran Tensions: What Indian Cyber Commanders Can Learn – The Quint”
My keynote at the ITWeb Security Summit 2019, Johannesburg & Cape Town. This is, by far, my most extensively researched talk.
I moderated the keynote panel discussion on Hacking Elections for Fun & Profit: Disinformation & Cognitive Cyber-Offence at Nullcon 2019.
So, the Indian National Defence University — along with HQ, Integrated Defence Staff (where the newly formed Defence Cyber Agency is located) — is conducting an international table-top cyber wargame. This is quite exciting. I was meant to execute one Red Land scenario, but won’t be able to participate due to other compulsions. I did send my recommendations. Here’s an excerpt:Continue reading “Table-top cyber wargames by INDU and HQ IDS”