[liberationtech] Chinese Hacking, Mandiant & Cyber War
Fabio Pietrosanti (naif)
lists at infosecurity.ch
Thu Feb 21 13:07:43 PST 2013
On 2/21/13 5:27 PM, Yosem Companys wrote:
> Sadly, policymakers seem to think we have completely solved the
> attribution problem. We have not. This article published in
> Computerworld does an adequate job of stating my position:
> http://news.idg.no/cw/art.cfm?id=94AB4F98-9BBD-1370-154D49FAA7706BE9
>
> Those of us who work on security engineering and software security can
> help educate policymakers and others so that we don't end up pursuing
> the folly of active defense.
I'd suggest reading the following blog post to get a critical overview:
http://jeffreycarr.blogspot.co.uk/2013/02/mandiant-apt1-report-has-critical.html
We should remind that Mandiant is an "interested party" in boosting the
"fear of china and APT".
That's because it's their business to sell consulting and technologies
to protect against that risks:
http://www.issa-dc.org/presentations/07202010_robert_lee.pdf
So, we should be really careful about it.
The report is not "a scientific forensic report" that a "Forensic"
and/or "cyberintelligence analyst" can really independently verify.
While in the meantime the report have currently an important media and
(reasonably) political impact.
-naif
p.s. Infosec world’s reaction to Mandiant’s APT1 report.
http://securityreactions.tumblr.com/post/43527198909/alternate-infosec-worlds-reaction-to-mandiants-apt1
More information about the liberationtech
mailing list