A Death Knell for the International Norms of Cyber Conflict – Modern War Institute, US Military Academy

My essay for the Modern War Institute, US Military Academy at West Point: https://mwi.usma.edu/death-knell-international-norms-cyber-conflict/.

On July 8, Michael Schmitt, a law professor and former judge advocate in the US Air Force, posted a perplexing tweet about changing his mind on the “status of cyber capabilities as ‘weapons.’” He followed it up with the link to a recent paper he coauthored for the International Law Studies journal of the US Naval War College.

Continue reading “A Death Knell for the International Norms of Cyber Conflict – Modern War Institute, US Military Academy”

A ‘perfect’ disinformation op during the India-China-Australia tensions?

“Almost all disinformation operations are imperfect by design, run not by perfectionists, but pragmatists.”

— Thomas Rid in Active Measures: The Secret History of Disinformation and Political Warfare

As Thomas Rid quips in his book Active Measures, cyber-enabled information operations are more active but less measured. So, it is rare to see the instance of an old-school disinformation operation that seems to have served its purpose quite effectively.

Active Measures, in the general sense of the term, are rarely this successful, so the operation I am going to discuss certainly stands out.

Continue reading “A ‘perfect’ disinformation op during the India-China-Australia tensions?”

Understanding strategic threat Intelligence – SC Magazine

Written for the SC Magazine: https://www.scmagazineuk.com/understanding-strategic-threat-intelligence/article/1685804.

In March 2020, Booz Allen Hamilton released a fascinating dossier analysing the cyber operations of GRU, the Russian military intelligence agency, spanning 15 years. The dossier ran the traditional cyber threat intelligence (CTI) tradecraft through an impressive analytic process, thus credibly gluing the cyber operations of GRU to the doctrinal framework and geopolitical imperatives of the Russian state.

Continue reading “Understanding strategic threat Intelligence – SC Magazine”

How the MSSPs Can Strive to be Detection Ninjas – Infosecurity Mag

For the Infosecurity Mag: https://www.infosecurity-magazine.com/opinions/mssps-strive-detection-ninjas/.

I am having some strange epiphanies as I go knee-deep into SIEM engineering. While the MSSPs have existed in all flavors and sizes, there seems to be a broad consensus that they simply can’t mimic the capabilities of an in-house security operations function – especially when it comes to gaining context, visibility and speed.

Continue reading “How the MSSPs Can Strive to be Detection Ninjas – Infosecurity Mag”

“In cyber, the generals should lead from behind” – College of Air Warfare

My talk at College of Air Warfare, Secunderabad, delivered on 17th Dec, 2019. Exquisitely titled, “In cyber, the generals should lead from behind.”

Continue reading ““In cyber, the generals should lead from behind” – College of Air Warfare”

What Microsoft needs to get right about cyber norms

In my recent essay for the Centre for Internet & Society, I surmised that the current initiatives to derive cyber norms within the ambit of international law could be incongruous with the technical dynamics of cyber operations. I shed light on the critical fissures in global attempts to establish normative frameworks for cyberspace.

Continue reading “What Microsoft needs to get right about cyber norms”

Lessons from Kudankulam – Part II: Targeting, jointness & offensive toolchains

I may (or may not) do a series of quick posts highlighting the strategic challenges encountered while investigating a cyberattack like Kudankulam. They would be filed under the ‘lessons-from-kudankulam‘ tag. Since our agencies were literally caught napping, this is a good primer for understanding what nation-state-level cyber capabilities entail:

Some dumbified excerpts from my dispatches to the government:

Continue reading “Lessons from Kudankulam – Part II: Targeting, jointness & offensive toolchains”