Well that was an interesting read... any bruises? Some very factual, some tin hat, some... well some just text wars.
My 2cents on the cyber discussion:
I've been exposed to IT for sometime and attended several Ethical Hacking & Countermeasure and IT Forensic classes taught by elite companies that travel to other countries to perform investigations, data forensics, and analyze strengths to block & breach. We all know where the company "heads" of these companies originated.
What the media blasts...including the last few years...Yawn!!! In comparison to actual espionage with cyber tatics, the "leader" in this arena is USA, and many of the tools other countries use were developed within our walls of secrets. One thing always presented... anytime you hear it was "xxxx" that did the act, breach, etc you pretty much know it wasn't them. Everyone leaves trace to the "other" guy. Incidentally, open any malware incident browser that shows active cyber attacks, notice that our own companies launch hundreds attacks upon other companies within country every day.... that accounts for a large percentage of cyber attacks. Notice "whom" is always in the top 3 attackers Globally... Russia is seldom near the top 5.
Another thought path... we technically don't do various "acts" of cyber but that doesn't dismiss that we don't have "others" do the collecting and provide the data. Also keep in mind that unless you catch data packets "live" or in the act... the analysis is speculative since no breach is ever direct route and they're much better concealing or eluding their tracks than offensive actions. Whom we have collect our data would amaze some, and wouldn't shock others... but it's not a clean good guy / bad guy game. We do play & exchange with others that are not allies... everyone exchanges at some degree.
The majority of the data collected by sUAV is often in the marketing or marketing espionage strategy, the hype of compromise of power plants, roof top hardware, over view of military compounds, etc that sUAV's could provide is more easily obtainable from public mapping services, companies own web sites, and believe it, a super source many Social Media sites... let the citizens provide the data to you. Last time I examined security ops, you can't take a sUAV into secure room, or sensitive environments. The sUAV collects environmental (GPS, altitude, temps, etc) and possible video in one direction. The "secrets" or critical data an sUAV is able to compile and upload to mother probably isn't near the data available elsewhere 24x7.
I'd really like to see more sUAV made by USA companies, but that pretty much isn't going to occur while the income scales for workers between countries is so drastically different. At the same time, I'm not looking to pay $400 for a pair a jeans when a Chinese Levi is obtainable for $50 or a bit more after trade adjusted. That is also displayed in sUAV business within State LEO, FD and various services... and with the recent suggested doors opening, evidently the Feds are interested too.
Does that dismiss other countries data mining or cyber attacks? Certainly not. But it also indicates that various departments within our own govt are working with whom we "the public" may feel is not a ideal. Our access to understand the whole matrix of operations is minimal and it certainly won't be media or public communications that keep us informed of the facts... they'll maintain the 2 hand deception: Watch the Left... notice the Right?
My 2cents on the cyber discussion:
I've been exposed to IT for sometime and attended several Ethical Hacking & Countermeasure and IT Forensic classes taught by elite companies that travel to other countries to perform investigations, data forensics, and analyze strengths to block & breach. We all know where the company "heads" of these companies originated.
What the media blasts...including the last few years...Yawn!!! In comparison to actual espionage with cyber tatics, the "leader" in this arena is USA, and many of the tools other countries use were developed within our walls of secrets. One thing always presented... anytime you hear it was "xxxx" that did the act, breach, etc you pretty much know it wasn't them. Everyone leaves trace to the "other" guy. Incidentally, open any malware incident browser that shows active cyber attacks, notice that our own companies launch hundreds attacks upon other companies within country every day.... that accounts for a large percentage of cyber attacks. Notice "whom" is always in the top 3 attackers Globally... Russia is seldom near the top 5.
Another thought path... we technically don't do various "acts" of cyber but that doesn't dismiss that we don't have "others" do the collecting and provide the data. Also keep in mind that unless you catch data packets "live" or in the act... the analysis is speculative since no breach is ever direct route and they're much better concealing or eluding their tracks than offensive actions. Whom we have collect our data would amaze some, and wouldn't shock others... but it's not a clean good guy / bad guy game. We do play & exchange with others that are not allies... everyone exchanges at some degree.
The majority of the data collected by sUAV is often in the marketing or marketing espionage strategy, the hype of compromise of power plants, roof top hardware, over view of military compounds, etc that sUAV's could provide is more easily obtainable from public mapping services, companies own web sites, and believe it, a super source many Social Media sites... let the citizens provide the data to you. Last time I examined security ops, you can't take a sUAV into secure room, or sensitive environments. The sUAV collects environmental (GPS, altitude, temps, etc) and possible video in one direction. The "secrets" or critical data an sUAV is able to compile and upload to mother probably isn't near the data available elsewhere 24x7.
I'd really like to see more sUAV made by USA companies, but that pretty much isn't going to occur while the income scales for workers between countries is so drastically different. At the same time, I'm not looking to pay $400 for a pair a jeans when a Chinese Levi is obtainable for $50 or a bit more after trade adjusted. That is also displayed in sUAV business within State LEO, FD and various services... and with the recent suggested doors opening, evidently the Feds are interested too.
Does that dismiss other countries data mining or cyber attacks? Certainly not. But it also indicates that various departments within our own govt are working with whom we "the public" may feel is not a ideal. Our access to understand the whole matrix of operations is minimal and it certainly won't be media or public communications that keep us informed of the facts... they'll maintain the 2 hand deception: Watch the Left... notice the Right?
Last edited: