This is a hot take on a recent piece by two National Law University Delhi academicians, Gunjan Chawla and Vagisha Srivastava: What are ‘offensive cyber capabilities’?
The article starts on the right note: briefly pointing out the evolution of terminology using which Western militaries have tried to circumscribe cyber operations within a quasi-legal framework.
Continue reading “The chimera of cyber offence”
“Almost all disinformation operations are imperfect by design, run not by perfectionists, but pragmatists.”— Thomas Rid in Active Measures: The Secret History of Disinformation and Political Warfare
As Thomas Rid quips in his book Active Measures, cyber-enabled information operations are more active but less measured. So, it is rare to see the instance of an old-school disinformation operation that seems to have served its purpose quite effectively.
Active Measures, in the general sense of the term, are rarely this successful, so the operation I am going to discuss certainly stands out.
Continue reading “A ‘perfect’ disinformation op during the India-China-Australia tensions?”
My opinion piece for Hindustan Times: https://www.hindustantimes.com/analysis/on-china-it-s-time-to-consider-cyber-operations/story-crMraUyDc64taDRHMhEnhP.html.
The recent border clashes between India and China have led analysts, habituated to conventional warfare, to compare the relative strengths of the two adversaries in terms of the number of tanks, aircraft and other military paraphernalia.
It appears that Indian strategic discourse has yet again discounted cyber operations as an instrument of power projection, which could have offered a degree of flexibility when it comes to coercing, compelling and imposing costs on the contentious neighbour. This is unfortunate considering how much Indian think-tanks have glamourised the cyber domain.
Continue reading “On China, it’s time to consider cyber operations – Hindustan Times”
Written for the SC Magazine. The original link seems to have died. Here’s an archived version: https://web.archive.org/web/20200730233821/https://www.scmagazineuk.com/understanding-strategic-threat-intelligence/article/1685804.
In March 2020, Booz Allen Hamilton released a fascinating dossier analysing the cyber operations of GRU, the Russian military intelligence agency, spanning 15 years. The dossier ran the traditional cyber threat intelligence (CTI) tradecraft through an impressive analytic process, thus credibly gluing the cyber operations of GRU to the doctrinal framework and geopolitical imperatives of the Russian state.
Continue reading “Understanding strategic (cyber) threat Intelligence – SC Magazine”
For the Infosecurity Mag: https://www.infosecurity-magazine.com/opinions/mssps-strive-detection-ninjas/.
I am having some strange epiphanies as I go knee-deep into SIEM engineering. While the MSSPs have existed in all flavors and sizes, there seems to be a broad consensus that they simply can’t mimic the capabilities of an in-house security operations function – especially when it comes to gaining context, visibility and speed.
Continue reading “How the MSSPs Can Strive to be Detection Ninjas – Infosecurity Mag”