“Share without Care – Problematic intelligence sharing arrangements” Written by Group 1 (s2433494, s1543091, s1696939, s2351048, s2401541) for the Faculty of Governance and Global Affairs (FGGA) at the University of Leiden. Wordcount: 1782. Since the attack on the World Trade Center in the United States (US) on September 11th 2001,…
Cyber Cease-Fire: US v. China
As published on Norse on October 6th, 2015 Interesting times indeed, now that the outcome of Chinese president Xi Jinping’s two-day visit to the White House last week has been made public. According to the White House press release, this is what was agreed: The United States and China agree…
Missing in Action: Cyber Dictionary?
As published on Norse on September 22nd, 2015. I recently stumbled over an old issue that has shown no signs of being resolved: the lack of a normalized lexicon on Cyber Security. We can’t seem to start agreeing on terminology, even though the cyber security industry is rapidly professionalizing globally…
The Right to Strike Back
As published on Norse on June 26, 2015. Last week, at the HiP Conference in Paris, there was a debate on whether or not it should be allowed to strike back when you are being hacked. Currently, criminal law in most countries does not allow it. But is this tenable in today’s’…
The Problem with the Universal Right to Online Privacy
(As published on Norse on April 15, 2015) A landmark decision by the UN Human Rights Council was made on March 26th to cover privacy issues arising from the pervasive monitoring by the UK and the US, in an attempt to establish that freedom from excessive (online) surveillance is a basic…
Enterprise Security vs. Nation State Threat Actors
The recently published Snowden/NSA/GCHQ slides regarding the Gemalto hack have caused quite a stir amongst security practitioners, board members and politicians alike. But the uproar is minor when considering that it is now more than clear that not only non-allied nations such as China, Russia and Iran are attacking commercial…
Data Mining Protection: Taking A Privacy Roadtrip with IRMA
If you have ever clicked “I Agree” on Facebook or an Apple device without really going through it, it might be worth your while to go back and read up. Do you know where your data is going? A few months ago I went to get a haircut at my…
GCCS2015 Part II: Government Influence is the Key Issue
(As published on Norse: Feb 5th, 2015) As we noted in Part I: GCCS2015: Battlefield for the Internets’ Multi-stakeholder Coup, the next iteration of the Global Conference on CyberSpace (GCCS2015) will be held on April 16th and 17th in The Hague, the Netherlands this year. It is the worlds’ premier political conference on Cyberspace. The…
GCCS 2015: Battlefield for the Internet’s Multi-Stakeholder Coup (Part I)
Published on Norse Corp on Jan 21st, 2015 As you may already be aware, the next iteration of the Global Conference on CyberSpace will be held on April 16th and 17th in The Hague, the Netherlands this year. It is the worlds’ premier political conference on Cyberspace and this is…
Using the Cyber Kill Chain to Map Cyber Defenses with Practical Reality
In an effort to better understand the structure and approach of “APT Attacks”, which was at the time virtually a euphemism for cyber-attacks coming from China, researchers investigated hundreds of successful incursions into networks. The professional air to the attacks that was long suspected was confirmed, as all attacks followed…