HorkosBurning and Bridges II: Turla BoogalooTurla’s Terrible, Horrible, No Good, Very Bad Couple of YearsMay 9, 2023May 9, 2023
HorkosCyber(war) Persuasion FatigueThe perception of foreign doctrinal adherence does not automatically equate to fulfillment of operational standards of success for effects.May 6, 2023May 6, 2023
HorkosStop Huffing About Cyber RetaliationHandwringing about the credibility of threats to impose costs in cyber contests misunderstands how those contests actually function.Jul 13, 2021Jul 13, 2021
HorkosCyber Espionage as Mischief ManagedHarry Potter can teach us something about cyber threat actors who accept the risks that accompany spying on blue team personnel.Apr 2, 20212Apr 2, 20212
HorkosGiving the Adversary an Extra VoteHyperbole in threat-framing creates an exploitable condition that gives adversaries an easy way to mess with our heads.Mar 8, 2021Mar 8, 2021
HorkosThe Incoherence of Cyber DeterrenceI love to repeat myself: deterring cyber espionage is a fantasy and cyberattack delivery can only at imperfectly deterred at best.Feb 22, 2021Feb 22, 2021
HorkosPressing Problems and Slippery Slopes: Developing an Offensive Response to RansomwareWhile I don’t think JDAMs are the answer to ransomware, we need a real discussion about responsible pursuit of other offensive solutions.Feb 5, 2021Feb 5, 2021
HorkosA Last Clever Knot?Newly disclosed Russian cyber activity targeting US government networks could represent both counterintelligence and influence operations.Oct 23, 2020Oct 23, 2020
HorkosCYBERCOM Apparently Got Half-Baked Ideas for ChristmasCYBERCOM has ideas about how to deter Russian election interference in 2020 and they don’t inspire my confidence.Dec 26, 2019Dec 26, 2019