One Article Review

Accueil - L'article:
Source Blog.webp taosecurity
Identifiant 2572324
Date de publication 2021-04-01 14:00:00 (vue: 2021-04-01 18:05:30)
Titre The Origins of the Names TaoSecurity and the Unit Formerly Known as TAO
Texte  What are the origins of the names TaoSecurity and the unit formerly known as TAO? IntroductionI've been reading Nicole Perlroth's new book This Is How They Tell Me the World Ends. Her discussion of the group formerly known as Tailored Access Operations, or TAO, reminded me of a controversy that arose in the 2000s. I had heard through back channels that some members of that group were upset that I was operating using the name TaoSeurity. In the 2000s and early 2010s I taught classes under the TaoSecurity brand, and even ran TaoSecurity as a single-person consultancy from 2005-2007. The purpose of this post is to explain why, how, and when I chose the TaoSecurity identity, and to show that it is contemporaneous with the formal naming of the TAO group. The most reliable accounts indicate TaoSecurity predates the TAO brand.TaoSecurity Began with Kung Fu and TaoismWith Sifu Michael Macaris, 21 June 1996In the summer of 1994, after graduating from the Air Force Academy and before beginning my graduate program at what is now called the Harvard Kennedy School, I started watching re-runs of the 1970s David Carradine Kung Fu TV series, created by Ed Spielman. I was so motivated by the philosophical message of the program that I joined a kung fu school in Massachusetts. I trained there for two years, and studied what I could about Chinese history and culture. I learned from the show and that it was based on Taoism (for example) so I bought a copy of the Tao Te Ching by Lao Tzu and devoured it. Visiting ChinaTai Chi on the Yangtze, May 1999In the spring of 1999 my wife and I took a three week trip to Chin
Envoyé Oui
Condensat  although  i  introductioni  mr  once  the  visiting  what 1970s 1994 1996 1996in 1997 1999 1999 mentions 1999in 2000 2000s 2003 2005 2007 2010s 2013 2016 2018 2020 33rd 9/11 about above absurdly academy access accounts actively actually add after agency aid air alluring along also although amazing among analysts any appear appeared approaches april are arose arsenal article artist assigned associated attachments aware back bag baggers bar based baton became because become been before began beginning being bejtlich belgrade big black blogspot bombed book book dark book: books born both bought boutique box brand breaking brokers  but called called from campaignto can captain captured carradine change changes channels chapter charge chart chi china chinatai chinese ching chose cia cited claimed classes clear clearances close coined cold collecting com come comin commissioned computer computers computing con concept concepts conclusion conducted conference; consultancy contemporaneous continuously contribution controlled controversy copy copyright corner corps correct could couple crash created creating creative crew crucial cry cryptologic cryptome cryptomethis culture cyber cyberspace date david day days decided def defense defense we defined design despite details device devoured dictionary did different difficult digital director directorate discussion distinct document doing domain download dozen during early edge effort efforts electrons elite emails embassy embraced emergency end ends enjoyed entering enterprise entire era establishment ether; even eventually every exam example existence exotic expand expansion explain explained extensively external fact fairly fan far fastest find first floor foia following force foreign formal formally formed formerly fort fraction fred from from march gave gen general generalized genesis get global going good gradually graduate graduating great grew group growing growth hacked hacking had hampered happen hardware harvard have hayden haydenthe heard held her here: high his history honeymoon how however hundred ideas identity include indicate indicates industrial information initiated inside install intel intelligence interest interested interviewed invited involve its january join joined joint july june just kaplan kaplancircling kennedy kenneth knowledge known kung lao large last late later latest latter laughed: launched learned least less like little located logo loleski long look looked lookup macaris machines main make malware management marketing massachusetts matthew may meade members mention message michael minihan mission months more most motivated much name named names naming need needed network networks never new newly news next nicole none not notes nothing november now nsa numbers october odd off office offices one opened operating operations operatives operators opportunity organization organizational origins otherwise out outfit: overnight own part pass passage passively passwords pdf pentagon period perlroth person philosophical phishing phrase physical piece play playing point policy pooled possible post powerhouse preceded predates presence previous previously prior program programmers prompting public publicly purpose quite quote ran read reading reason recommended recommending record reflect reform registered reliable reminded reorganization reorganization implies reorganize repackaged report report: reporting reporting: reports repository reproduced requests requires response rest review rewiring richard roledark rumors runs same school second secret secretive security see seeing seem seemed seen selected sending separate series served server service set setup several shadow sharpened shop show shows sid sifu sigint signals sim similar simple since single skills small software solid some sometimes soon source spielman spring squadron started states steven stock story stray strength studied subject succinct such summarize summer tailored tandem tao taoexternal taoism taoismwith taoplaying
Tags Malware Threat
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: