Profiling Hackers (or Attackers?)…Further Blurring of lines Between Crime & Hacking

10 Transnational Crime, Cyberscams, malware, spam, Hacking
The Hackers Profiling Project (HPP)

The project aims to improve the response to ICT crime and the transnational organised crime groups that may be involved in it, by outlining the criminal profiles of the different types of hackers, with particular emphasis on their possible involvement in transnational organised crime activities and cyber-terrorism. Through a better understanding of hackers, HPP will facilitate the prevention and countering of ICT crimes and will improve the operational methods that may lead to the identification of computer intruders.

85 page overview

This book is an attempt to apply the behavioural science of Criminal Profiling to the hacking realm. Its main objective is to provide a new means of investigation in order to deal with issues related to cybercrime. But there is a lot more to discover…

Computer networks are commonly thought of as unfathomable and invisible, beyond our grasp; a hacker is someone who can still see the joins and this is what makes him interesting though remaining a complex, original and controversial personality.

Aware of the lack of information, which prevents people from adequately understanding the phenomenon of hacking and its many related aspects, the authors' desire is to provide more insight into this realm by telling interesting anecdotes as well as describing bizarre characters that practice hacking and cracking as an art, following different but established ethical models. Providing an in-depth exploration of the hacking realm, focusing on the relation between technology and crime, the authors reveal hidden aspects and many interesting details answering questions like: Who are real hackers? What life does a hacker lead when not on line? Is it possible to determine a hacker's profile on the basis of his behaviour or types of intrusion?

Journal: Google Wants You….In Every Way, Forever

07 Other Atrocities, 10 Transnational Crime, Computer/online security, Corporations, Corruption, Cyberscams, malware, spam, InfoOps (IO), Misinformation & Propaganda, Mobile, Power Behind-the-Scenes/Special Interests, Privacy, Real Time, Secrecy & Politics of Secrecy, Technologies, Tools

Prevent web malware and enforce policies for all users

Google Web Security for Enterprise, protects organizations of all sizes against web malware attacks and enables the safe, productive use of the web, without incurring hardware, upfront capital, or IT management costs.

Simple to deploy, effortless to maintain, scalable and secure

  • No hardware to install or maintain, just a simple change to your firewall or proxy
  • Proactively blocks web malware before it reaches your network
  • Integrates easily with directory services for granular enforcement and reporting
  • Extends to all employees wherever they are working – at home, in a hotel room, café, client premises, or Wi-Fi spot

Interested in learning more? Download these resources

Comment:  You were right. I've just learned about Google's Endgame. I'm sure it's been out a while, but when I saw this, I immediately thought of your statement about Google wanting to BECOME the Internet. The short video tells all.  REDACTED

Phi Beta Iota:  see also these posts.

Reference: Joe Nye on Cyber-Power

Computer/online security, Cyberscams, malware, spam, InfoOps (IO), Intelligence (government), White Papers

Download PDF 1.1MB 30 pages

Nye, Joseph S. “Cyber Power.” Paper (30 Pages)

Belfer Center for Science and International Affairs, Harvard Kennedy School,

May 2010

Power depends upon context, and the rapid growth of cyber space is an important new context in world politics. The low price of entry, anonymity, and asymmetries in vulnerability means that smaller actors have more capacity to exercise hard and soft power in cyberspace than in many more traditional domains of world politics. Changes in information has always had an important impact on power, but the cyber domain is both a new and a volatile manmade environment. The characteristics of cyberspace reduce some of the power differentials among actors, and thus provide a good example of the diffusion of power that typifies global politics in this century. The largest powers are unlikely to be able to dominate this domain as much as they have others like sea or air. But cyberspace also illustrates the point that diffusion of power does not mean equality of power or the replacement of governments as the most powerful actors in world politics.

DOWNLOAD PDF (30 pages, 1.1 MB) from Harvard Site

Phi Beta Iota:  The author served as deputy director of the National Intelligence Council and as an Assistant Secretary of Defense for International Security Affairs.  He coined the term “soft power” and is arguably the most astute and coherent observer and analyst of traditional relations among nations now serving in the upper ranks of the elite that pupport to be serving the public interest.


Continue reading “Reference: Joe Nye on Cyber-Power”

Unsolicited Very Credible Comment

10 Security, Budgets & Funding, Corruption, Cyberscams, malware, spam, InfoOps (IO), Intelligence (government), Methods & Process, Misinformation & Propaganda, Politics of Science & Science of Politics, Power Behind-the-Scenes/Special Interests, Secrecy & Politics of Secrecy, True Cost

I've got to tell you — Clapper scares me.  I have access to lot of stuff that his people write and it's scary.  USD(I) is trying to stick its nose into tents where they aren't wanted.

See Also:

Journal: Obama To Name Retired General To Top Spy Post

Search: OSINT software

Analysis, Augmented Reality, Budgets & Funding, Collaboration Zones, Collective Intelligence, Communities of Practice, Computer/online security, Counter-Oppression/Counter-Dictatorship Practices, Cyberscams, malware, spam, Ethics, Geospatial, InfoOps (IO), International Aid, Key Players, Methods & Process, Policies, Searches, Strategy, Technologies, Threats, Tools, True Cost

The search term brings up appropriate results, but the fact of the search gives us an opportunity to provide comment.

1)  Nothing now being used by governments, and certainly not iBase or Palantir, both aging technologies that do not scale and have too many fat-finger handicaps, fulfills the originial requirements documents crafted in the late 1980's.

Worth a Look: 1989 All-Source Fusion Analytic Workstation–The Four Requirements Documents

2)  The ONLY programs that have gotten anywhere close are COPERNICUS plus plus, and SILOBREAKER.  However, both of these have been slow to recognize the urgency of integrating–fully integrating–capabilities that address each of the eighteen functionalities.  Below is the list of softwares now in use by US Special Operations Command J-23 Open Source Intelligence Branch along with the STRONG ANGEL TOOZL and a couple of other things.

Memorandum: USSOCOM Software List and STRONG ANGEL TOOZL

See also:

Definitions: M4IS2 (Multinational, Multiagency, Multidisciplinary, Multidomain Information-Sharing & Sense-Making

Search: The Future of OSINT [is M4IS2-Multinational]

Worth a Look: Deep Web Multilingual Federated Search

1988-2009 OSINT-M4IS2 TECHINT Chronology

Worth a Look: Planetary Skin Data Sharing Initiative

Search: meta-tagging humint

Who’s Who in Librarian Intelligence: Arno Reuser

Who’s Who in Public Intelligence: Mats Bjore

Who’s Who in Collective Intelligence: Stephen E. Arnold

Journal: Dr. Dr. Dave Warner Shares…

Event Report CORRECTED LINKS: Responding to Real Time Information, Open Systems and the Obama IT Vision [Google-Microsoft Meld]

Review: The Starfish and the Spider–The Unstoppable Power of Leaderless Organizations

Review: Innovation Happens Elsewhere–Open Source as Business Strategy

Journal: Google, the Cloud, Microsoft, & World Brain

Worth a Look: GeoChat (SMS Plotted on Map)

2006 Yekelo (ZA) Continental Early Warning & Information Sharing: A Military Perspective on Deterring & Resolving Complex Emergencies

1998 Arnold (US) New Trends in Automated Intelligence Gathering Software

The global standard for multinational information-sharing and sense-making is in the process of being designed, funded, and distributed.  If you think you have something relevant to that, generally only open source software will be considered, get in touch with any of the individuals above.

21.3% of Malicious ‘Spam’ Researched by Symantec comes from Shaoxing China (30% China, 21.1% from Romania, US 3rd)

02 China, Cyberscams, malware, spam

Researchers based in Symantec studied over 12 billion emails and
identified that almost 30% of all malicious emails are sourced from
within China and that 21.3% came from the Chinese city of Shaoxing
alone.  The researchers were also able to identify that the primary
targets for these malicious emails were human rights activists and
experts in Asian defence policy, which they claim indicates a strong
state involvement in the attacks.  The research shows that 28.2% of the
targeted attacks came from China, with 21.1% coming from Romania and the
United States coming in as the third highest source of malicious emails.

Read the original article

PhiBetaIota: It's worth noting that the article says “hacker” and later “attacks” as though they are equivalent. Anyone with a more sophisticated understanding of hacking is aware that this is not the case, and that there is a whole community of hackers that embody a whole other non-malicious form of hacking (see & their summer conference in NYC).