Discussion about this post

User's avatar
Draven S.'s avatar

All of these techniques were developed, reinforced, put into frameworks by red teams of cybersecurity. While training always have "ethical" in title, there is almost none of ethics, or even jokes about it.

Red teams in IT security are those gathering information about infrastructure, personnel, physical place and controls, looking for weak points, vulnerabilities. And then trying to get inside - it is called pentesting. While it is good to present to higher management, that some people cheated about safety of our network, to them. It is mostly checking only few, to several paths to inside and in many cases the easiest ones. Later must be undergone audit and a lot of work by admins and blue team. It is very costly, with many drawbacks and in most cases done in a hurry, which leads to further vulnerabilities.

Better way is to have experienced and dedicated blue team, which can check everything from inside, monitor findings while not yet resolved, do cyclic or even better continuous checking. But it requires trust to those blue team employees, good compensation and long-term engagement - you won't know much about specific infrastructure, working just half a year and to know much takes many years.

But why I am telling all this? Because in most corporations and government institutions red teams are answer in most, if not all cases. Why so many people can't see it? Because they are told on conferences, by people heavily connected to ICs (Intelligence Community), that this is to only way, and this will give you good look from executive. Also send your best people to our technical conferences, where they can show your skills and learn our ways.

That is how ICs gained so much from IT Security people, how to do spying games in everchanging cyber realm. Of course, they also have many good people, but here they the bests people in the world, without paying them, or informing what knowledge are being gathered. Organizations like MITRE also putting it into frameworks, CISA recommending, all was "wheel for hamsters" and now they are passing it all, formalized, semi-automated, from frameworks, knowledgebases into algorithms for AI, which will use it on Digital Twin databases. Some trainings on social media and control system for dissidents ready to roll. If we allow this to go live on worldwide scale, which is their target, there will be little hope for humanity, because they will be able to isolate, identify and remove any dissidents to their future moves.

Expand full comment
1 more comment...

No posts