Another Word For It Patrick Durusau on Topic Maps and Semantic Diversity

February 20, 2013

Crowdsourcing Cybersecurity: A Proposal (Part 1)

Filed under: Crowd Sourcing,Cybersecurity,Security — Patrick Durusau @ 9:28 pm

Mandiant’s provocative but hardly conclusive report has created a news wave on cybersecurity.

Hardly conclusive because as Mandiant states:

we have analyzed the group’s intrusions against nearly 150 victims over seven years (page 2)

A little over twenty-one victims a year. And I thought hacking was common place. 😉

Allegations of hacking should require a factual basis other than “more buses were going the other way.” (A logical fallacy because you get on the first bus going your way.)

Here we have a tiny subset (if general hacking allegations have any credibility) of all hacking every year.

Who is responsible for the intrusions?

It is easy and commonplace to blame hackers, but there are other responsible parties.

The security industry that continues to protect the identity of the “victims” of hacks and shares hacking information with a group of insiders comes to mind.

That long standing cult of secrecy has not prevented, if you believe the security PR, a virtual crime wave of hacking.

In fact, every non-disclosed hack, leaves thousands if not hundreds of thousands of users, institutions, governments and businesses with no opportunity to protect themselves.

And, if you are hiring a contractor, say a defense contractor, isn’t their record with protecting your data from hackers a relevant concern?

If users, institutions, governments and businesses had access to the details of hacking reports, who was hacked, who in the organization was responsible for computer security, how the hack was performed, etc., then we could all better secure our computers.

Or be held accountable for failing to secure our computers. By management, customers and/or governments.

Decades of diverting attention from poor security practices, hiding those who practice poor security, and cultivating a cult of secrecy around computer security, hasn’t diminished hacking.

What part of that lesson is unclear?

Or do you deny the reports by Mandiant and others?

It really is that clear: Either Mandiant and others are inventing hacking figures out of whole clothe or the cult of cybersecurity secrecy has failed to stop hacking.

Interested? See Crowdsourcing Cybersecurity: A Proposal (Part 2) for my take on a solution.


Just as a side note, President Obama’s Executive Order — Improving Critical Infrastructure Cybersecurity appeared on February 12, 2013. Compare: Mandiant Releases Report Exposing One of China’s Cyber Espionage Groups released February 19, 2013.

Is Mandiant trying to ride on the President’s coattails as they say?

Or just being opportunistic with the news cycle?

Connected into the beltway security cult?

Hard to say, probably impossible to know. Interesting timing none the less.

I wonder who will be on the various panels, experts, contractors under the Cybersecurity executive order?

Don’t you?

3 Comments

  1. […] am disappointed with the White House response to my suggestion on combating cybersecurity issues (Crowdsourcing Cybersecurity: A Proposal (Part 1) and Crowdsourcing Cybersecurity: A Proposal (Part […]

    Pingback by Stopping Theft: Don’t Lock Your Door, The Soap Opera Approach « Another Word For It — February 22, 2013 @ 10:39 am

  2. […] I would settle for journalists who question reports, like the Mandiant advertisement on cybersecurity last week. (Crowdsourcing Cybersecurity: A Proposal (Part 1)) […]

    Pingback by Computational Journalism « Another Word For It — February 25, 2013 @ 11:51 am

  3. […] couple of weeks ago I posted: Crowdsourcing Cybersecurity: A Proposal (Part 1) and Crowdsourcing Cybersecurity: A Proposal (Part 2), concluding that publicity (not secrecy) about […]

    Pingback by Open Source for Cybersecurity? « Another Word For It — March 7, 2013 @ 5:15 pm

RSS feed for comments on this post.

Sorry, the comment form is closed at this time.

Powered by WordPress