Reply to post: Re: Feeds for Thoughts

SAP plugs critical software flaw that could let hackers into factories

amanfromMars 1 Silver badge

Re: Feeds for Thoughts

Bit of a tangent, but definitely food for thought. …… allthecoolshortnamesweretaken

’Tis practically a feast which is rendering all manner of bodies unfit for future great purpose, allthecoolshortnamesweretaken, and creates for them contemporaries of novel anonymous origin which have to eventually be chosen for either lead engagement or pathetic static opposition. It is a phenomenon of certain particular and peculiar concern to more than just a few, given the quite extraordinary powers required to be displayed to deal with unfolding emergent Next Generation Events.

Some of the problems in this book look at ways of leveraging GCHQ’s passive SIGINT capabilities to give us a cyber edge, but researchers should always be on the look-out for opportunities to advance the cyber agenda. …… HIMR Data Mining Research Problem Book/

And whenever advancing the cyber agenda equates to running the global humanised enterprise, what provision then for Special Source whenever clearly it can be always both in-house friendly asset and prime foreign bodied target? Does it all then reduce to the lowest common denominator and the cost of securing the asset/tax free bungs to principals granting secured access to cyber flight deck commands and controls?

Is it really just as simple and as cheap as that?

GCHQ has the legal authority to intercept communications for the specific purposes of safeguarding the UK’s national security and economic well-being, and to prevent and detect serious crime.

This section briefly discusses how sophisticated state actors (including ourselves and our five-eyes partners) currently conduct themselves in cyberspace. It is important to bear in mind that other states, in particular Russia and China, are not bound by the same legal framework and ideas of necessity and proportionality that we impose on ourselves. Moreover, there are many other malicious actors in cyberspace, including criminals and hackers (sometimes motivated by ideology, sometimes just doing it for fun, and sometimes tied more or less closely to a nation state). We certainly cannot ignore these non-state actors.

And all of that old hatted intel just opens the door to what is beyond and in store for future presentation, methinks. And a right mined mind field it is too, and easily able and enabled to defend itself against all base attacks and virtual hacks.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon