I have never endorsed amateur ‘hack back’ schemes. It’s risky even for the professionals.
U.S. government offensive cybersecurity actions tied to defensive demands
Offensive cyber operations are best known as acts of digital harm, mainly in the context of cyber “warfare,” with nation-states, particularly intelligence organizations, serving as the primary actors. But, as experts and officials speaking at the Billington Cybersecurity Summit this year attest, “offensive cyber” is also a term increasingly applied to the growing use of digital tools and methods deployed by various arms of the federal government, often in partnership with private sector parties, to snuff out threats or help victims of ransomware actors proactively.
These officials and experts say that, for the most part, offensive cyber, if done right and with collaboration among the necessary partners, can lay the groundwork for more robust public and private sector defense. The downside, however, is that a possible misfired offensive hack can cause collateral damage among innocent parties, possibly sparking dangerous real-world responses.
Although the U.S. National Security Agency (NSA) has long engaged in offensive cyber operations, U.S. Cyber Command, an arm of the U.S. military founded in 2010 that is closely linked to NSA, has only recently become a visible player in this arena. In 2018, the U.S. Department of Defense (DoD) published a Cyber Strategy summary introducing a new concept called “defense forward.” The summary states that DoD will “defend forward to disrupt or halt malicious cyber activity at its source, including activity that falls below the level of armed conflict.”
It marked a radical shift in the military’s strategic posture and signaled that the U.S. would not wait until a malicious cyber act occurred before taking action. As legal scholar Bobby Chesney put it, “Defense forward entails operations that are intended to have a disruptive or even destructive effect on an external network: either the adversary’s own system or, more likely, a midpoint system in a third country that the adversary has employed or is planning to employ for a hostile action.”
(Related)
https://thehackernews.com/2022/09/china-accuses-nsas-tao-unit-of-hacking.html
China Accuses NSA's TAO Unit of Hacking its Military Research University
China has accused the U.S. National Security Agency (NSA) of conducting a string of cyberattacks aimed at aeronautical and military research-oriented Northwestern Polytechnical University in the city of Xi'an in June 2022.
The National Computer Virus Emergency Response Centre (NCVERC) disclosed its findings last week, and accused the Office of Tailored Access Operations (TAO ), a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA), of orchestrating thousands of attacks against the entities located within the country
Clearly we need an AI lawyer to make sense of this.
https://thenextweb.com/news/what-does-europes-approach-data-privacy-mean-for-gpt-and-dall-e
What does Europe’s approach to data privacy mean for GPT and DALL-E?
Let's examine the gray areas of data privacy and ownership
… GDPR’s primary purpose is to protect European citizens from harmful actions and consequences related to the misuse, abuse, or exploitation of their private information. It’s not much use to citizens (or organizations) when it comes to protecting intellectual property (IP).
Unfortunately, the policies and regulations put in place to protect IP are, to the best of our knowledge, not equipped to cover data scraping and anonymization. That makes it difficult to understand exactly where the regulations apply when it comes to scraping the web for content.
We need an answer.
https://www.axios.com/2022/09/12/ai-images-ethics-dall-e-2-stable-diffusion
AI-generated images open multiple cans of worms
Machine-learning programs that can produce sometimes jaw-dropping images from brief text prompts have advanced in a matter of months from a "that's quite a trick" stage to a genuine cultural disruption.
These new AI capabilities confront the world with a mountain of questions over the rights to the images the programs learned from, the likelihood they will be used to spread falsehoods and hate, the ownership of their output and the nature of creativity itself.
Tools & Techniques.
https://www.bespacific.com/how-to-search-tweets-by-location/
How To Search Tweets By Location
Advos: “Ever wonder who the people are that are near your location and tweeting with a certain topic or hashtag? Maybe not, unless you are a Twitter nerd like me. But it can be interesting and if done correctly, improve your social marketing. Here is how to do it …”
No comments:
Post a Comment