Huawei 5G

4095 words, 16 minutes. A Diplomatic (Chinese) Design Presented to the U.S. – 12th February 1881 by Thomas Nast, for Harper’s Weekly. I rarely mention vendors here, so this post is an exception. It’s the second in my “Projectionist” series. The series is ultimately about power and the great forces and constraints shaping our world. I’m going to talk about 5G, Huawei, China and the consideration the UK and her allies are giving to the use of Huawei’s products in national mobile networks. »

Comment on FT/NSO/Cloud Article July 19th 2019

650 words, 2 1⁄2 minutes. Article Financial Times article “Israeli group’s spyware ‘offers keys to Big Tech’s cloud’”, Mehul Srivastava in Tel Aviv and Tim Bradshaw in London, July 19th 2019. Comment This comment is provided on the basis that the article is factually correct and the details within are technically accurate. The article claims to describe a recent product demonstration of the Pegasus Malware software by NSO Group: »

APT34 Tools Leak

4300 words, 17 minutes (full). 1500 words, 6 minutes (short). Leak Summary APT34 is an Advanced Persistent Threat group associated with the Islamic Republic of Iran. Its source code and tools were recently leaked via a Telegram channel. In addition to those tools, information was divulged about the group’s targets which included companies and governments in the United Arab Emirates, Kingdom of Saudi Arabia, China, Qatar, and Turkey among others. »

The Projectionist

750 words, 3 minutes. The reason I don’t post on Cyber Security current affairs? It’s a scramble to be first. If I’m to write something, what should it be? What’s my angle? Which lens do I use on the microscope, or since this is a mass medium, the projector? What film can I show you that you haven’t already seen a dozen times? I’ll attempt to answer these questions here, and in so doing introduce what may become a new thread of posts. »

Documenting Breaches With H Diagrams

1500 words, 6 minutes. “For the sake of brevity, we will always represent this number by the letter e” - Leonhard Euler, Mechanica. 1736. What if you could understand and explain any breach 10x faster? Security breaches are a staple of mainstream news. In the past, details only emerged through technical analysis, research papers, and the forensic review of press releases. Occasionally we’d be gifted with a customer letter or the suspicious timing of a patch or update. »