Links to particular
posts
|
Subjects
|
Dec 13, 2010
|
Principle #18 of my 22 principles
for the
Perfect Virus
|
Jul 20, 2011
|
My litany of stupid cyber defense
morons
|
Jan 1, 2011
|
For some reason, my Top-10 posts of
2010
continue to draw attention.
|
Nov 16, 2011, 15 comments
|
My heap of disrespect for the FBI’s
cyber
capabilities.
|
Dec 18, 2010
|
A summary of all 22 principles for
the
Perfect Virus.
|
Mar 5, 2014
|
Why go phishing or finding zero-day
bugs
when you can hack the supply chain?
|
Oct 12, 2011, 1 comment
|
Absolute proof that Huawei can’t be
trusted.
|
Oct 20, 2010, 3 comments
|
What if licensed, bonded cyber
privateers are
turned loose? High-reward/high-risk
answers.
|
Nov 13, 2010, 6 comments
|
Pirates
of the Caribbean had a “Pirate’s Code.” Here’s
my shot at a Cyber Privateer code of
conduct.
|
Oct 4, 2013, 10 comments
|
One of my favorite readers (and
commenters) is Joseph from
Spain. He’s made monkeys out of the
FBI.
|
Next, who are the top-ten countries who most frequently visited this site?
Pageviews by Countries |
So where's the Islamic caliphate? Or North Korea? I have a fairly un-politically-correct assessment, which naturally I'll keep to myself. I may be crazy, but I'm not stupid.
No comments:
Post a Comment
Implementation suggestions for THE MORGAN DOCTRINE are most welcome. What are the "Got'chas!"? What questions would some future Cyber Privateering Czar have to answer about this in a Senate confirmation hearing?