Wednesday, February 20, 2013

Alltime Most Popular Cyber Privateering Articles

Since I started this project in October 2010, I never cease to be amazed at the things that strike a responsive chord with my readers. Following are the top-10 most-read articles. I consider this "data exhaust" meaningful, since my readership is over 50,000. You can click on each link to read the individual story:
Not a surprising ranking, given that the whole purpose of this project is to look at monetizing world-wide Internet security. Yes, there is a substantial upside, but also substantial risks.


Something about cyber privateering and my cyber privateer code struck a responsive chord in Japan.

Confession: I've thoroughly enjoyed meeting JOSEPH from SPAIN and chronicling his public bitch-slapping of the FBI's "best & brightest" cyber talent. 


 My late friend Frank Herbert (who wrote Dune) nailed the reality of today's battleground. Unfortunately, not a single politician gets it. Yet.


I just added a comment to this post. With some lone Iranian taking responsibility for the RSA hack, it is now almost certain that China was the culprit (see the New York Times story here) and that the Iranian boast was just hollow chest thumping. Or more likey, the "Iranian boast" was misdirection and written by a clever Chinese cyberwarrior.



My indictment of "playing defense only" got a little personal. If the premier domain registry can't protect themselves, then what chance do any of the rest of us have?


All 22 Principles for Creating The Perfect Virus are high on the list. My one intellectual contribution to the technology of cyber privateering are those principles, which you can see in their entirety here. There are two more principles on which I have not opined in this project, but which form the majority of my first novel, Destroying Angel (see www.DestroyingAngel.com if you want to buy a copy). I'm thinking about updating it and issuing an ebook edition, complete with hyperlinks to my 22 principles.


The U.K. Register made a foolish move in an attempt to turn the Anonymous and LulzSec anarchists into a news source. Evidently, this caught the attention of…Anonymous and LulzSec. I sure would like someone to share with me the behind-the-scenes fallout.


I suspect that most of the people following my 1-800CONTACTS analysis are attorneys involved in the case. Sometime ago, I was talking to Federal Judge Clark Waddoups, who wrote this ruling, and he indicated that 1-800CONTACTS is not letting this decision die. Not only have they asked him to reconsider his opinion, but I believe they are appealing. I don't know what it is about these guys, but they must have been toilet trained at gunpoint and are spending the rest of their lives compensating for that trauma. This story is not over, and for all our sakes I hope they do not prevail.


My second-most-amazing intellectual feat (yes, I'm a legend in my own mind) is that my Cyber Privateer Code (I reserved the domain which you can see here) has not required subsequent drafts. I intended Draft 01 as a starting point only.  But it's held up for almost two-and-a-half years. I'd really appreciate some editorial comment and suggestions for improvement.

So thank you one and all for your eyeballs. The above "data exhaust" combines with geographic readership and traffic sources (referring URLs, referring sites, and search keywords) to give me an interesting perspective on the global cyberwar "DEFCON" level. I think we're very close to DEFCON 1. Stay tuned.

No comments:

Post a Comment

Implementation suggestions for THE MORGAN DOCTRINE are most welcome. What are the "Got'chas!"? What questions would some future Cyber Privateering Czar have to answer about this in a Senate confirmation hearing?