[160927] in North American Network Operators' Group
Re: NYT covers China cyberthreat
daemon@ATHENA.MIT.EDU (Warren Bailey)
Wed Feb 20 03:41:02 2013
From: Warren Bailey <wbailey@satelliteintelligencegroup.com>
To: calin.chiorean <calin.chiorean@secdisk.net>
Date: Wed, 20 Feb 2013 08:39:24 +0000
In-Reply-To: <1766323899.249246.1361349370142.JavaMail.sas1@[172.29.251.236]>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Reply-To: Warren Bailey <wbailey@satelliteintelligencegroup.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
They don't have 20 brains, they have a country full. I was in Beijing last =
year, it was eye opening to the see the state of affairs there.
From my Android phone on T-Mobile. The first nationwide 4G network.
-------- Original message --------
From: "calin.chiorean" <calin.chiorean@secdisk.net>
Date: 02/20/2013 12:36 AM (GMT-08:00)
To: Warren Bailey <wbailey@satelliteintelligencegroup.com>
Cc: surfer@mauigateway.com,nanog@nanog.org
Subject: Re: NYT covers China cyberthreat
IMO, if we stick to the document and they are organized in military style, =
then a person who collect information, should focus only on that particular=
phase. That person is an operator, he or she should not be keep busy remem=
bering long CLI commands. The scope is to deliver ASAP.
No matter how much I like CLI and to put my fingers into text mode, I have =
to admit that point and click in windows is an easier and faster method to =
achieve the task I did mention. As Warren mention, if you have 20 "brains" =
it's easy to put those people port a tool from *nix to other platform and h=
ave the other 500 operators run it in windows. It's just a matter of good s=
ense and "business" effectiveness :)
Maybe I misinterpret information, but this is how I see things.
Cheers,
Calin
---- On Wed, 20 Feb 2013 09:24:10 +0100 Warren Bailey<wbailey@satelliteinte=
lligencegroup.com> wrote ----
> They are when you have a college full of programmers.
>
>
> From my Android phone on T-Mobile. The first nationwide 4G network.
>
>
>
> -------- Original message --------
> From: Scott Weeks <surfer@mauigateway.com>
> Date: 02/20/2013 12:23 AM (GMT-08:00)
> To: nanog@nanog.org
> Subject: Re: NYT covers China cyberthreat
>
>
>
> --- calin.chiorean@secdisk.net wrote:
> From: "calin.chiorean" <calin.chiorean@secdisk.net>
>
> <snipped>
> :: when all tools are available for windows os, you just have to compile=
them.
> <sniped out the rest>
> -------------------------------------------------
>
>
> They're not all available for m$.
>
> scott
>
>
>
>
>
>
> ---- On Wed, 20 Feb 2013 09:02:35 +0100 Scott Weeks wrote ----
> >Be sure to read the source:
> >
> >intelreport.mandiant.com/Mandiant_APT1_Report.pdf
> >
> >I'm only part way through, but I find it hard to believe that
> >only micro$loth computers are used as the attack OS. Maybe I
> >haven't gotten far enough through report to find the part
> >where they use the *nix boxes?
>
>
>
>