McAfee: Revealed: Operation Shady RAT (2011)
Filed under report | Tags: · hacking, internet, politics, security, technology

“What we have witnessed over the past five to six years has been nothing short of a historically unprecedented transfer of wealth — closely guarded national secrets (including from classified government networks), source code, bug databases, email archives, negotiation plans and exploration details for new oil and gas field auctions, document stores, legal contracts, SCADA configurations, design schematics and much more has “fallen off the truck” of numerous, mostly Western companies and disappeared in the ever-growing electronic archives of dogged adversaries.
What is happening to all this data — by now reaching petabytes as a whole — is still largely an open question. However, if even a fraction of it is used to build better competing products or beat a competitor at a key negotiation (due to having stolen the other team’s playbook), the loss represents a massive economic threat not just to individual companies and industries but to entire countries that face the prospect of decreased economic growth in a suddenly more competitive landscape and the loss of jobs in industries that lose out to unscrupulous competitors in another part of the world, not to mention the national security impact of the loss of sensitive intelligence or defense information.
Yet, the public (and often the industry) understanding of this significant national security threat is largely minimal due to the very limited number of voluntary disclosures by victims of intrusion activity compared to the actual number of compromises that take place. With the goal of raising the level of public awareness today we are publishing the most comprehensive analysis ever revealed of victim profiles from a five year targeted operation by one specific actor — Operation Shady RAT, as I have named it at McAfee (RAT is a common acronym in the industry which stands for Remote Access Tool). ” (author)
Revealed: Operation Shady RAT: An investigation of targeted intrusions into 70+ global companies, governments and non-profit organizations during the last 5 years
White paper
by Dmitri Alperovitch, VP Threat Research, McAfee
Published 2 August 2011
14 pages
author’s blog entry
author’s tweet
further coverage (Vanity Fair)
further coverage (Security Week)
further coverage (Reuters)
further coverage (Guardian)
PDF (updated on 2017-11-24)
Comment (0)Mathieu O’Neil: Cyberchiefs: Autonomy and Authority in Online Tribes (2009)
Filed under book | Tags: · autonomy, blogging, blogosphere, floss, free software, internet, politics, usenet, wikipedia

People are inventing new ways of working together on the internet. Decentralised production thrives on weblogs, wikis and free software projects. In Cyberchiefs, Mathieu O’Neil focuses on the regulations of these working relationships. He examines the transformation of leadership and expertise in online networks, and the emergence of innovative forms of participatory politics.
What are the costs and benefits of alternatives to hierarchical organisation? Using case studies of online projects or ‘tribes’ such as the radical Primitivism archive, the Daily Kos political weblog, the Debian free software project, and Wikipedia, O’Neil shows that leaders must support maximum autonomy for participants, and he analyses the tensions generated by this distribution of authority.
Publisher Pluto Press, 2009
ISBN 0745327974, 9780745327976
242 pages
PDF (updated on 2013-3-3)
Comment (0)Daniel J Solove: Nothing to Hide: The False Tradeoff between Privacy and Security (2011)
Filed under book | Tags: · data mining, internet, law, politics, privacy, security, surveillance, technology, terrorism

“If you’ve got nothing to hide,” many people say, “you shouldn’t worry about government surveillance.” Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to protect privacy and the costs and benefits of doing so. The debate between privacy and security has been framed incorrectly as a zero-sum game in which we are forced to choose between one value and the other. Why can’t we have both?
In this concise and accessible book, Solove exposes the fallacies of many pro-security arguments that have skewed law and policy to favor security at the expense of privacy. Protecting privacy isn’t fatal to security measures; it merely involves adequate oversight and regulation. Solove traces the history of the privacy-security debate from the Revolution to the present day. He explains how the law protects privacy and examines concerns with new technologies. He then points out the failings of our current system and offers specific remedies. Nothing to Hide makes a powerful and compelling case for reaching a better balance between privacy and security and reveals why doing so is essential to protect our freedom and democracy.
Publisher Yale University Press, 2011
ISBN 0300172311, 9780300172317
256 pages