Thursday, November 13, 2014

Who Developed China's Laser Weapon and Other Things That Go Boom?

China has spent the last few days showcasing its latest military technology including this new laser weapon that can shoot down drones a mile away in 5 seconds after locating the target. However, if you're like me you'll want to know who built it and what else are they working on!

Well, now you can find out. Here's a 5 minute demo of our new REDACT Search product which tackles that very question. Enjoy!

Tuesday, November 11, 2014

Musashi's "The Way of Self Reliance" (Wilson translation)

Japanese swordsmanship has been a hobby of mine for almost 35 years, and the most famous of all Japanese swordsman is Miyamoto Musashi, author of The Book of Five Rings.

One week before his death, he wrote "The Way of Walking Alone" (Dokkodo). I read the translation written by William Scott Wilson, which like all of Wilson's work, was carefully constructed from primary documents. Then I looked online to see if there was a version of it that I could link to. Instead, I found an awful alternative translation that has been repeated ad infinitum.

So on Veterans Day and to honor the memory of one of the world's greatest swordsmen, I've reproduced what I believe is the superior translation of "The Way of Self Reliance", found in William Scott Wilson's translation of Miyamoto Musashi's The Book of Five Rings.


Shrike on a Withered Branch
by Miyamoto Musashi
THE WAY OF WALKING ALONE (or The Way of Self-Reliance)

  • Do not turn your back on the various Ways of this world.
  • Do not scheme for physical pleasure.
  • Do not intend to rely on anything.
  • Consider yourself lightly; consider the world deeply.
  • Do not ever think in acquisitive terms.
  • Do not regret things about your own personal life.
  • Do not envy another's good or evil.
  • Do not lament parting on any road whatsoever.
  • Do not complain or feel bitterly about yourself or others.
  • Have no heart for approaching the path of love.
  • Do not have preferences.
  • Do not harbor hopes for your own personal home.
  • Do not have a liking for delicious food for youself.
  • Do not carry antiques handed down from generation to generation.
  • Do not fast so that it affects you physically.
  • While it's different with military equipment, do not be fond of material things.
  • While on the Way, do not begrudge death.
  • Do not be intent on possessing valuables or a fief in old age.
  • Respect the gods and Buddhas, but do not depend on them.
  • Though you give up your life, do not give up your honor.
  • Never depart from the Way of the Martial Arts.

Second Day of the Fifth Month, Second Year of Shoho [1645]
Shinmen Musashi

Saturday, November 8, 2014

"Frank Martin" of the U.S. Government Grants Department Wants To Give Me $14,566

I just ended a ridiculous but entertaining call with "Frank Martin" of the "U.S. Government Grant Department" who wanted to give me $14,566 for being a good taxpayer. I stayed on the line with him for about 20 minutes because I wanted to learn as much about the scam as I could.

Here's more or less how it went:

0823 PST my home phone rings. The caller ID reads PENNSYLVANIA 267-973-6174.

A heavily accented voice asks if this is Jeffrey Carr, and then proceeds to tell me that she's calling from the government grant department.

Oh, yes. I said. The government grant department. That's part of the U.S. Treasury, right?

"That's right Mr. Jeffrey. We just need to verify your information."

[The caller reads me my street address, city, state and zip code. All are accurate.]

"Now sir, would you like to receive your grant money on a credit card, debit card, pre-paid debit card, or in your bank account?"

Pre-paid debit card, I say, as I pull out my handy (and empty) pre-paid Visa gift card that I keep for calls just like these.

"Please read me the number, sir."

I read it off the card.

"And the last four digits of your social security number"

I invent 4 digits and give them to her.

I'm now told that I've been chosen to receive a grant of between $5,000 and $15,000. My government approval number is WA23134, and I'm to call the grant manager in Washington DC at (202) 738-4264.

We hang up. I now call the DC number.


I must have let it ring 20 times. No answer.

A few minutes later, my home phone rings again.

The person I just spoke with is back and says that she'll try to connect me.

She tries twice and finally I get to speak with a grant manager named "Frank Martin", who's clearly of Indian descent. Mr. Martin wants to assure me that this program is very real, and asks me to write down the following information:
The Government Grants Office is located at 200 Independence Avenue, SW, Health and Human Services Building, Washington DC 20201. His government badge number is FM2586 and his phone number is (202) 738-4264.
So, not the U.S. Treasury.
"Jeffrey", Frank says, "are you at your computer?"
"I want you to go to this website:"
[I open a sandboxed browser.]  OK, Frank. I'm there.
"Now see the search window on the right side? Type in my name - Frank Martin."
Got it.
"Now see the 2nd entry where it says Frank Martin, and where it shows how much money I've given out in grants? That's me."

[This idiot didn't notice the "," between "frank" and "martin". The "frank, martin" he pointed me to is Martin Frank, Executive Director of the American Physiological Society.]

Oh, yes. You've given out a lot of money, Frank. 
"Yes, Jeffrey, and because you've been a good taxpayer, we want to give you $14,566. Now, what is your date of birth?"
I give him a DOB a few years and a few months off from my own.
"Oh, you don't sound that old, Jeffrey. You sound like you're only 20 or 22 years old! OK, let me verify all of your information because this is a lot of money and we want to make sure that you are really who you say you are."
The line is quiet for 10 seconds while he verifies my fake DOB, fake last 4 digits of my SS, etc. 
"Very good, Jeffrey. Now may I ask what you'll be using the grant money for?"
A cruise. Is that allowed?
"A cruise? Sure. You can take a cruise, buy a car, anything you like. It's your money. Just don't use it for any illegal activities!"
Oh, no. Not me. 
"So now we are at the verification step. You must go to a store near you and send me a verification voucher. Because, you know, there are a lot of Jeffrey Carr's in the United States. We can't risk giving money to the wrong Jeffrey Carr! Do you have a Rite-Aid or something like that near you?"
How about Walmart?
"No, not Walmart. Wait, I'll check for you. OK, I see that you're close to a QFC store. How long will it take you to drive there?"
Oh, about 20 minutes.
"Do you have a cell phone?"
I can borrow one from my neighbor.

"OK, go to the store and then call me from the parking lot. I'll tell you exactly how to do the verification voucher and then I'll stay on the line until you see the money has been transferred to your pre-paid Visa card." 
"Now Jeffrey, you need to bring three things with you: a picture ID, a cell phone with a charged battery, and $275 in cash which is a fully-refundable verification fee. You understand what "fully-refundable" means, Jeffrey?" 
Um, yes. 
"So after you send us the voucher verification, your fee is then refunded back on your Visa card along with your grant money. See, we have to do it this way because it would be fraud if we asked you to send us money from your checking account or from your credit card and we aren't trying to defraud you. Only bad people ask you to send money from your bank account. That's we ask for cash."
Yes, cash is much better, Frank. Thank you.

[So now that Frank is done with his pitch, it's my turn to have some fun.]

By the way, Frank, are you at your computer?
"Yes, why?"
Well, you've been so nice sharing information about yourself, I thought you might want to see who I am. Do you know Just type in "Jeffrey Carr". I'll be the first name that comes up.
"I'm sorry, Jeffrey. My computer doesn't seem to be working right now. "
Oh, that's OK, Frank. When your computer is working again, just go to, and you can read all about this little fraud of yours online.
Frank? Are you there?


The FTC has a page for Free Grant Fiction here. This seems to be the latest iteration.

Wednesday, October 29, 2014

Cyber Threat Marketing and Political Expediency: STOP THE MADNESS

FireEye's APT28 report is the latest in a series of glossy marketing white papers which claim to reveal the workings of "state-sponsored actors", in this case from Russia. The paper fails to prove its claim of state-sponsorship (a confusing term that the FireEye report never defines) and evidences a few other bad habits described below.

However none of that really matters because Russia is currently on the White House's shit list, it's being hammered by sanctions, and the Kremlin has shown itself over the years to be more than willing to let its very talented hacker population engage in cyber attacks against its political enemies without repercussion. 

Last year when Mandiant came out with its APT1 report about China, guess who was on the White House's shit list then? 

From a marketing perspective, you can say-hint-imply-presume whatever you want. Proof is irrelevant. What counts is that the political interests of the U.S. and other western nations correspond with the marketing interests of cyber security companies. Timing - as Hesiod said - is everything.

However, even if the raw commercialism of this strategy doesn't bother you or is at least forgivable because after all FireEye and all of its competitors are for-profit enterprises, the report's authors have made some awful decisions in their analytic method.

Cherry-Picking The Evidence
"APT28 has targeted a variety of organizations that fall outside of the three themes we highlighted above. However, we are not profiling all of APT28’s targets with the same detail because they are not particularly indicative of a specific sponsor’s interests. They do indicate parallel areas of interest to many governments and do not run counter to Russian state interests."
In other words, we've just included the evidence that supports our theory and excluded the evidence that doesn't. That's precisely the kind of bad analysis that's behind every intelligence failure that has ever happened. 

Calling Low Level Attacks "Sophisticated"
"Russia has long been a whispered frontrunner among capable nations for performing sophisticated network operations. This perception is due in part to the Russian government’s alleged involvement in the cyber attacks accompanying its invasion of Georgia in 2008, as well as the rampant speculation that Moscow was behind a major U.S. Department of Defense network compromise, also in 2008. These rumored activities, combined with a dearth of hard evidence, have made Russia into something of a phantom in cyberspace."
Speaking as someone who's been researching Russian information warfare practices and, more importantly, its ongoing research and development in information security, I can tell you that the SQL attacks against Georgian government websites during the 2008 war were not even close to "sophisticated". Same with the 2008 DOD breach. Remember that when you have to explain to your boss that some unemployed Russian kid  Russian "state-sponsored" actors stole everything you own, it better be because it was "highly sophisticated".

Unfortunately for myself and others who take a skeptical or even cynical view to every public report of a "sophisticated state-sponsored" attack, the reporting agency or corporation never shares their raw data. And whatever is shared is scrubbed. 

APT28 isn't a Person or Persons. It's a Thing
Cyber security companies that monitor networks and threat actors rely almost exclusively upon technical attributes when they establish a "group". It's not like a street gang unit at your local PD that can tell you the gangs that operate in an area, who the members are and where they go when they leave. They don't who the members are, or how many there are, or what nationality they are, or who they're working for, or how long they stay before moving on. Visit and pick any hacker group that does high-profile defacements. Do a search by group name and find one with a history spanning just one year. Start with the earliest defacement and add the aliases of the group's members to a spreadsheet. Jump ahead a few months and check to see if the names have changed. Jump ahead a year. Members come and go, and when they go they take with them the tools and resources that they are comfortable with using. Or perhaps they'll discover new tools with a different group and in a few months, jump again - this time with different TTPs than they had a year ago. Are they still "APT28"?

"Stop The Madness"
To quote Mr. Wonderful, "STOP THE MADNESS!" Reports like these cannot be trusted to give a factual assessment of the real-world capabilities of any government's activities with their resident hacker populations. And they positively do not reflect the capabilities of any government's security services.

They are (1) a way to gain market share through garnering headlines and (2) a way to gain favor or secure contracts with government agencies who are catering to their customer - the Executive Office of the President.

Wednesday, October 22, 2014

"Hunting For Seeds That Remain Uncultivated, For Ideas That Lie Dormant"

From time to time I like to share gems of insight that I've discovered in the works of others in hopes that someone else will benefit besides myself. I'm always the first one awake in our house (usually before dawn) so I make a double expresso and sit down at my desk, which faces East overlooking the Hood Canal. Ellis' book is a collection of ancient Egyptian texts so it's fun to open it up randomly and see where you land. This is what I opened to this morning, around the time that dawn was breaking.

Thoth Speaks:
The ibis and the ink pot - these are blessed. For as the ibis pecks along the bank for a bit of food, so the scribe searches among his thoughts for some truth to tell. All the work is his to speak, its secrets writ down in his heart from the beginning of time, the gods' words rising upward through his dark belly, seeking light at the edge of his throat. We are made of god stuff, the explosion of stars, particles of light, molded in the presence of gods. The gods are with us. Their secrets writ only in the scrolls of men's hearts, the law of creation, death and change inscribed in the blood and seed of man's love. In the beginning and at the end, the book is opened and we see what in life we are asked to remember. 
Hear, then, my words, the ringing of my speech, as the heart and the scroll of this life fall open. Truth is the harvest scythe. What is sown - love or anger or bitterness - that shall be your bread. The corn is no better than its seed, then let what you plant be good. Let your touch on earth be light so that when earth covers you, the clods of dirt fall lightly. The soul of a man forgets nothing. It stands amazed at its own being. The heart beats the rhythm of its life. The lungs breathe the ions of its own vibration. The mind recalls its thoughts. The glands respond to its emotions.  
The body is a soul's record. And when a man's life ends, his body is given back to gods and the gods shall see what use their laws have been. They shall see the deeds its hands have made, the sparks of light its heart set in the world. They shall see whether or not their love, their powers have been wasted, whether the plants it has grown were nourishing or poison. And like the ibis, the gods shall circle about him, hunting for seeds that remain uncultivated, for ideas that lie dormant, thoughts left unexpressed.  
They shall find new seeds from the plants he has tended. And these shall be planted again in the clay of a new man and he shall be sent back to the world until all the gods have seen fit to create in man is cultivated, and then, in final death, he shall be welcomed home as one of them.
- From "Awakening Osiris: The Egyptian Book of the Dead" by Normandi Ellis, Phanes Press, Boston 1988, p.55-56 

Saturday, October 11, 2014

First Look at Suits and Spooks DC 2015: 3 Hot Workshops and over 20 talks and panels

Early bird registration is now open for Suits and Spooks DC. We've expanded it to three days so as to include one optional day of training (Wednesday Feb 4). Since this is Suits and Spooks and not your typical Security conference, you've never had training like this before:

A Cyber Intelligence Analyst's Workshop: Connecting More Dots With Carmen Medina
A Cyber Security Entrepreneur's Workshop: Transitioning from a Spook to a Suit (taught by Barbara Hunt, Rick Holland, and to-be-announced panelists)
The PRC People's Liberation Army Information Warfare Infrastructure Workshop by Mark Stokes (Project 2049 Institute)

The training will be given in a tiered classroom setting with microphones at every seat and two large projection screens behind the instructor.

On Thursday (Feb 5) and Friday (Feb 6) our DC collision event will be held with a very unique collection of speakers that include John Robb (military strategist, futurist, and author of Open Source Warfare), Zachary Tumin (Deputy Commissioner for Strategic Initiatives at the NYPD), Thomas Rid (Professor at Kings College London and author "Cyber War Does Not Exist"), John Holland (CISO of Risk Division of Credit Suisse), and Ben Milne (founder of Dwolla).

You'll also get a very rare, inside look at how one of the world's largest defense contractors defends its global network, learn about Bitcoins and how at least one international bank is dealing with them, engage in a Q&A with a US Assistant District Attorney (invited), and much, much more.

Our Early Bird discount is $675 for all three days or $575 without the workshops. GOV/MIL rates are $395/$325. This event always sells out so register early.

Friday, August 8, 2014

Israel's Power Grid Is Susceptible To A Cyber Attack. Why Hasn't It Happened?

The fighting between Israel and Hamas during Operation Protective Edge has been severe by any measure; especially as regards to the cost of human lives - over 1,800 Palestinians have been killed in the past 30 days while the IDF has lost 67 soldiers and 3 Israeli civilians [1]. Israel has been using air and ground assaults while Hamas has launched over 3,300 rockets [2].

In comparison, the cyber attacks launched against Israel haven't risen to nearly the same level. They've been nuisance attacks against Israeli government websites [3], rather than technically sophisticated attacks against Israel's critical infrastructure. Hamas has more than enough money to hire hackers with the necessary technical chops. Iran should already have the capability and manpower and they certainly have the money to invest in gaining that capability if they chose to do so. So why hasn't this happened yet? There are a few possibilities:

I've taken a quick survey of my contacts in the industrial control system community and we all agree that Israel's capabilities to defend its critical infrastructure against cyber attacks are second to none in the world. However, Israel Electric, the state-owned company that generates and distributes electricity throughout the country uses vendors like Siemens whose equipment can be (and has been) exploited by technically sophisticated attackers so the IEC isn't immune to attack; especially against an adversary who has them on their potential targets list.

Cyber weapons, unlike kinetic weapons, cannot just be used at a moment's notice against any other nation's power grid. It takes advance intelligence, planning, testing and production so that if an attack is imminent, you have the capability to turn out the lights and keep them off. It's unlikely that Hamas has done that. Iran and Syria should be doing that if they aren't already. The U.S. and the PRC have been doing it for years.

Even if Hamas or its ally Iran has the capability to attack Israel's grid, that may not be their geopolitical goal right now. The number of civilian casualties suffered by the Palestinians in Gaza is garnering a lot of sympathy from other nations which could be leveraged towards Hamas obtaining its goal of a Palestinian state. A technically sophisticated cyber attack against Israel that would leave much of the country without power could instantly change that advantage from a positive into a negative since it would have severe humanitarian consequences. Furthermore, the IEC supplies power to the Gaza Strip so even if Hamas wanted to disrupt Israel's ability to wage war by sabotaging the IEC's ability to distribute electricity, it would be cutting off its own supply of power as well.

Alternatively, the IEC has been officially forbidden by the Israel's National Security Council to interrupt its supply of power and water to Gaza due to probable blow-back by the international community. Tony Blair has reportedly advised Netanyahu not to disconnect any West Bank or Gaza consumers from their electricity supply [4].

In fact, as of Tuesday August 5, IEC workers guarded by IDF forces were repairing portions of Gaza's electric grid that was damaged by rocket fire [5].

So while there may be several answers as to why Hamas has not utilized the asymmetric advantage offered by cyber weapons deployed against critical infrastructure, the best answer is probably that no one wants to be the first to push that particular button against such a large civilian population. 

Also for those pundits who have dismissed Iran's cyber warfare capabilities, the only capability that Iran or any nation state needs to acquire this type of weapon is the ability to write a check with a lot of zeros on it.