With everyone on Capitol Hill discussing the hacking or non-hacking of the DNC by Russia, this is a must-see video.
In this interview with Defense News TV, Richard Bejtlich explains the anatomy of a hack. An intrusion is much longer than a split-second invasion in real time. Often the invader is inside the system for years before the target is aware.
Yes. You read that right. The intruder is inside the system for years. A little computer science helps to clarify the current discussion on Capitol Hill.
Richard is one of the top cybersecurity experts in the United States. I have interviewed him a number of times, most recently in Washington, D. C.
The interviews explain the motivations and practice of cyber espionage by China for my new book, "The Lamborghini and the LaoGai: The Two Faces of China's Rise."His list of top offenders are China, Russia, Iran and North Korea. With the Iranians working with the North Koreans.
This analysis is enough to make anyone nervous, but if you go to the FireEye website, you will find a map of worldwide threats in cyberspace. Go if you want to loose sleep at night.
(See my blog archive for my interview with Beijtlich on the Mandiant report on APT 1, the People's Liberation Army building in Shanghai, the location of the IP address of the five Chinese who were indicted in an American court as the Chinese hacking team.)