Sophisticated and complex to implement, long-term cyber attacks are often considered the work of intelligence agencies and crime syndicates. However, the oversight and bureaucracy that comes from such management often hinders the ultimate lethality of the attack.
In this paper, we will examine the significant impact of a lone-wolf patriot hacker has had over the course of the last two years, and what important lessons we can learn from him on how to wage a successful fight in this domain. We will highlight the relatively successful patriot hacking campaign of The Jester.
Read the rest here: The Jester Dynamic: A Lesson in AsymmetricUnmanaged Cyber Warfare
You've reached your daily free article limit.
Subscribe and support our veteran writing staff to continue reading.
Sophisticated and complex to implement, long-term cyber attacks are often considered the work of intelligence agencies and crime syndicates. However, the oversight and bureaucracy that comes from such management often hinders the ultimate lethality of the attack.
In this paper, we will examine the significant impact of a lone-wolf patriot hacker has had over the course of the last two years, and what important lessons we can learn from him on how to wage a successful fight in this domain. We will highlight the relatively successful patriot hacking campaign of The Jester.
Read the rest here: The Jester Dynamic: A Lesson in AsymmetricUnmanaged Cyber Warfare
Should the US Air Force Buy 250 B-21 Stealth Bombers?
Inside Delta Force: America’s Most Elite Special Mission Unit
Russia Fires Intercontinental Ballistic Missile at Ukraine in Historic First
SOFREP Interviews Chelsea Walsh: The Nurse Who Reported Red Flags About Trump’s Would Be Assassin
Happy Birthday Delta Force!
Join SOFREP for insider access and analysis.
TRY 14 DAYS FREEAlready a subscriber? Log In
COMMENTS
You must become a subscriber or login to view or post comments on this article.