last data update: 2011/10/15, 12:42

Website loading time

during the test: 1.98 s

cable connection (average): 2.35 s

DSL connection (average): 2.72 s

modem (average): 22.3 s

HTTP headers

Information about DNS servers

taosecurity.blogspot.comCNAMEblogspot.l.google.comIN3600

Received from the first DNS server

Request to the server "taosecurity.blogspot.com"
Received 42 bytes from address 213.251.188.129#53 in 106 ms
Request to the server "taosecurity.blogspot.com"
You used the following DNS server:
DNS Name: dns10.ovh.net
DNS Server Address: 213.251.188.129#53
DNS server aliases:

Host taosecurity.blogspot.com not found: 5(REFUSED)
Received 42 bytes from address 213.251.188.129#53 in 103 ms

Received from the second DNS server

Request to the server "taosecurity.blogspot.com"
Received 42 bytes from address 213.251.128.129#53 in 107 ms
Request to the server "taosecurity.blogspot.com"
You used the following DNS server:
DNS Name: ns10.ovh.net
DNS Server Address: 213.251.128.129#53
DNS server aliases:

Host taosecurity.blogspot.com not found: 5(REFUSED)
Received 42 bytes from address 213.251.128.129#53 in 110 ms

Subdomains (the first 50)

Typos (misspells)

raosecurity.blogspot.com
faosecurity.blogspot.com
gaosecurity.blogspot.com
yaosecurity.blogspot.com
6aosecurity.blogspot.com
5aosecurity.blogspot.com
tzosecurity.blogspot.com
tsosecurity.blogspot.com
twosecurity.blogspot.com
tqosecurity.blogspot.com
taisecurity.blogspot.com
taksecurity.blogspot.com
talsecurity.blogspot.com
tapsecurity.blogspot.com
ta0security.blogspot.com
ta9security.blogspot.com
taoaecurity.blogspot.com
taozecurity.blogspot.com
taoxecurity.blogspot.com
taodecurity.blogspot.com
taoeecurity.blogspot.com
taowecurity.blogspot.com
taoswcurity.blogspot.com
taosscurity.blogspot.com
taosdcurity.blogspot.com
taosrcurity.blogspot.com
taos4curity.blogspot.com
taos3curity.blogspot.com
taosexurity.blogspot.com
taosevurity.blogspot.com
taosefurity.blogspot.com
taosedurity.blogspot.com
taosecyrity.blogspot.com
taosechrity.blogspot.com
taosecjrity.blogspot.com
taosecirity.blogspot.com
taosec8rity.blogspot.com
taosec7rity.blogspot.com
taosecueity.blogspot.com
taosecudity.blogspot.com
taosecufity.blogspot.com
taosecutity.blogspot.com
taosecu5ity.blogspot.com
taosecu4ity.blogspot.com
taosecuruty.blogspot.com
taosecurjty.blogspot.com
taosecurkty.blogspot.com
taosecuroty.blogspot.com
taosecur9ty.blogspot.com
taosecur8ty.blogspot.com
taosecuriry.blogspot.com
taosecurify.blogspot.com
taosecurigy.blogspot.com
taosecuriyy.blogspot.com
taosecuri6y.blogspot.com
taosecuri5y.blogspot.com
taosecuritt.blogspot.com
taosecuritg.blogspot.com
taosecurith.blogspot.com
taosecuritu.blogspot.com
taosecurit7.blogspot.com
taosecurit6.blogspot.com
aosecurity.blogspot.com
tosecurity.blogspot.com
tasecurity.blogspot.com
taoecurity.blogspot.com
taoscurity.blogspot.com
taoseurity.blogspot.com
taosecrity.blogspot.com
taosecuity.blogspot.com
taosecurty.blogspot.com
taosecuriy.blogspot.com
taosecurit.blogspot.com
atosecurity.blogspot.com
toasecurity.blogspot.com
tasoecurity.blogspot.com
taoescurity.blogspot.com
taosceurity.blogspot.com
taoseucrity.blogspot.com
taosecruity.blogspot.com
taosecuirty.blogspot.com
taosecurtiy.blogspot.com
taosecuriyt.blogspot.com
ttaosecurity.blogspot.com
taaosecurity.blogspot.com
taoosecurity.blogspot.com
taossecurity.blogspot.com
taoseecurity.blogspot.com
taoseccurity.blogspot.com
taosecuurity.blogspot.com
taosecurrity.blogspot.com
taosecuriity.blogspot.com
taosecuritty.blogspot.com
taosecurityy.blogspot.com

Location

IP: 209.85.175.132

continent: NA, country: United States (USA), city: Mountain View

Website value

rank in the traffic statistics:

There is not enough data to estimate website value.

Basic information

website build using CSS

code weight: 142.23 KB

text per all code ratio: 20 %

title: TaoSecurity

description:

keywords:

encoding: UTF-8

language: en

Website code analysis

one word phrases repeated minimum three times

PhraseQuantity
the142
of93
and76
to74
is38
in36
that32
by31
at28
on26
for22
with22
this21
an18
Richard17
Bejtlich16
as16
Posted14
comments14
you14
Chinese14
be13
from12
my12
are12
China12
not11
security11
was11
Security10
or10
Labels:9
government9
read9
his9
will9
The9
they9
20119
have8
can8
This8
how8
like8
about8
show7
all7
it7
Tony7
threat6
more6
Rep6
if6
information6
its6
me5
china5
one5
open5
which5
only5
House5
because5
HPSCI5
study5
has5
other5
attention5
Art5
Rogers5
software5
intelligence5
organization5
Software5
espionage5
October5
had4
book4
know4
what4
into4
two4
video4
Russia4
he4
hearing4
but4
also4
engine4
cyber4
Incident4
much4
However,4
US4
Team4
Response4
these4
want4
survey4
than4
think4
TAOSSA4
If4
would4
so4
complete4
may4
authors4
Computer4
identifying4
such4
20033
been3
state3
trying3
results3
their3
likely3
--3
took3
TAOSST3
aircraft3
learn3
Russian3
impressions3
posted3
statement3
who3
One3
different3
"threat3
see3
points3
our3
working3
fix3
Rogers'3
story3
Organizational3
System3
Control3
Jeff3
Networks3
CSIRT3
industrial3
five3
Survey,3
people3
Robust3
Christopher3
problems3
last3
Digital3
States3
operations3
aspect3
intellectual3
including3
United3
when3
point3
conducting3
new3
another3
pointed3
Hearing3
work.3
Cybersecurity3
should3
Task3
Force3
Posts3
I'm3
what's3
really3

two word phrases repeated minimum three times

PhraseQuantity
of the21
Richard Bejtlich15
by Richard14
Posted by13
Bejtlich at13
on the10
comments Labels:9
that the7
and the6
of Software5
Software Security5
The Art5
Art of5
in the5
to be4
an open4
the US4
for his4
to the4
want to4
Incident Response4
the Chinese4
Labels: china4
for the4
with the4
how to4
from the4
If you3
government and3
Control System3
Robust Control3
the threat3
to China3
is that3
an organization3
the United3
United States3
System Networks3
One of3
in an3
if they3
of TAOSSA3
of my3
to this3
Organizational Survey,3
Team Organizational3
Computer Incident3
is the3
the authors3
took The3
Rep Rogers'3
to fix3
trying to3
you can3
Response Team3
by the3
security and3
Task Force3

three word phrases repeated minimum three times

PhraseQuantity
by Richard Bejtlich14
Richard Bejtlich at13
Posted by Richard13
of Software Security5
Art of Software5
The Art of5
comments Labels: china4
Response Team Organizational3
Incident Response Team3
Team Organizational Survey,3
Robust Control System3
took The Art3
Computer Incident Response3
the United States3
Control System Networks3

B tags

This is not a political blog, so I'm not here to endorse candidates. However, I do want to point out another example of high-level policymakers discussing ongoing activities by China against the US and other developed economies.First, the Washington Post published an editorial by Mitt Romney which included the following:China seeks advantage through systematic exploitation of other economies. It misappropriates intellectual property by coercing “technology transfers” as a condition of market access; enables theft of intellectual property, including patents, designs and know-how; hacks into foreign commercial and government computers

The result is that China sells high-quality products to the United States at low prices. But too often the source of that high quality is American innovations stolen by Chinese companies.

I missed this in August, but former ambassador to China Jon Huntsman said the following during a debate:Huntsman Jr. pointed to China as a culprit in what he described as “the new war field” — cyber-intrusion as a way to steal corporate and government secrets.

It’s gone beyond the pale

Tony notes that the escalation in threat activity during the last few years is real. He is in a position to know, given he has worked at NSA since the 1970s. Tony says the threat activity is getting people's attention now, especially at more senior levels of the government and industry. Now targeted organizations are thinking beyond the question "does this affect my company" to "does this affect my industry?"Tony explains that a generational effect may account for the change in awareness. More senior leaders grew up with technology, so they know how to think about it. There is also more public reporting on serious security incidents today.My favorite quote was:"If you're not a little concerned, you haven't been paying attention."

[T]his is the most powerful secret service

"The history of China’s espionage activities on Russian armaments is not only limited to one precedent or one type of weapons. One of the top Chinese priorities is to produce complete replicas of Russia’s best machines and weapons

This is a truly purpose-oriented strategy of a large country - snatch anything you can and reproduce it domestically

First, I was impressed by the attitudes of all those involved with HPSCI, from the staffers to the Representatives themselves. They were all courteous and wanted to hear the opinions of Kevin and the other two witnesses (Art Coviello from RSA and Michael Hayden from the Chertoff Group), whether before, during, or after the hearing.Second, I thought Reps Mike Rogers (R-MI, HPSCI Chairman) and C.A. Dutch Ruppersberger (D-MD, HPSCI Ranking Member) offered compelling opening statements. Rep Rogers squarely pointed the finger at our overseas adversaries. As reported by PCWorld in U.S. Lawmakers Point to China as Cause of Cyberattacks, Rep Rogers said:"I don't believe that there is a precedent in history for such a massive and sustained intelligence effort by a government to blatantly steal commercial data and intellectual property...China's economic espionage has reached an intolerable level and I believe that the United States and our allies in Europe and Asia have an obligation to confront Beijing and demand that they put a stop to this piracy."You can watch all of Rep Rogers' statement on YouTube as Rep. Mike Rogers criticizes Chinese economic cyber-espionage (currently 21 views -- let's increase that!)General Hayden reinforced Rep Rogers' sentiment with this quote:"As a professional intelligence officer, I step back in awe of the breadth, the depth, the sophistication, the persistence of the Chinese espionage effort against the United States of America."Third, I was very pleased that this hearing was conducted in an open forum, and not behind closed doors. While I haven't found the whole hearing online or on TV yet (aside from Rep Rogers' statement and that of Rep Myrick (R-NC)), I encourage as much discussion as possible about this issue. One of General Hayden's points was that we are not having a debate about how to address digital threats because no one agrees what the facts are.

U tags

I tags

(Photo: Business Insider)This is not a political blog, so I'm not here to endorse candidates. However, I do want to point out another example of high-level policymakers discussing ongoing activities by China against the US and other developed economies.First, the Washington Post published an editorial by Mitt Romney which included the following:China seeks advantage through systematic exploitation of other economies. It misappropriates intellectual property by coercing “technology transfers” as a condition of market access; enables theft of intellectual property, including patents, designs and know-how; hacks into foreign commercial and government computers...The result is that China sells high-quality products to the United States at low prices. But too often the source of that high quality is American innovations stolen by Chinese companies.

Huntsman Jr. pointed to China as a culprit in what he described as “the new war field” — cyber-intrusion as a way to steal corporate and government secrets. “Not only have government institutions been hacked into, but private individuals have been hacked, too. It’s gone beyond the pale,” Huntsman said.

Today at MIRCon I mentioned that one of my colleagues, Jeff Yeutter, had updated the somewhat famous CERT/CC study of CIRT characteristics as part of his degree program. Jeff posted the survey online as Computer Incident Response Team Organizational Survey, 2011 with this description:In 2003, the CERT CSIRT Development Team (www.CERT.org) released a study on the state of international computer security incident response teams with the goal of providing "better insight into various CSIRT organizational structures and best practices" for new and existing members of the CSIRT community (Killcrece, Kossakowski, Ruefle, & Zajicek, 2003). The attached survey, a modified form of the original, will be used to update the 2003 study with a greater focus on the methods of organization used by American and international CIRTs, the tools that they employ, and how these vary across organizations of different sizes and industries.This research is being conducted, and is independently funded, by Jeff Yeutter, Technical Sales Executive at Mandiant, as the final project for his Master's in Information Systems with a concentration in Computer Security Management at Strayer University. This survey will also be distributed to members of the Forum of Incident Response and Security Teams (www.FIRST.org) with the assistance of Richard Bejtlich, Chief Security Officer and VP, MCIRT, at Mandiant.No identifying information is required to complete this survey. Participants may include such information if they are interested in immediately being notified of the results of the study once it is complete, or if they would like to make themselves available for follow-up questions. Any and all identifying personal or professional identifying information offered by participants will be held in strict confidence. The results of this study, minus any identifying information, may be included in a future, cost-free whitepaper.The original CERT study from 2003 can be found at: www.cert.org/archive/pdf/03tr001.pdfThe time to complete this survey is approximately 10-15 minutes.

Tony Sager from the NSA is one of my Three Wise Men. (Dan Geer and Ross Anderson are the other two.) Eric Parizo from SearchSecurity.com interviewed Tony this week and posted the video online. Tony notes that the escalation in threat activity during the last few years is real. He is in a position to know, given he has worked at NSA since the 1970s. Tony says the threat activity is getting people's attention now, especially at more senior levels of the government and industry. Now targeted organizations are thinking beyond the question "does this affect my company" to "does this affect my industry?"Tony explains that a generational effect may account for the change in awareness. More senior leaders grew up with technology, so they know how to think about it. There is also more public reporting on serious security incidents today.My favorite quote was:"If you're not a little concerned, you haven't been paying attention."

Thanks to a source who wishes to remain anonymous, I read Chinese spy mania sweeps the world, an article not from a Western publication. Rather, it's from Voice of Russia. Does any of this sound familiar?[T]his is the most powerful secret service based on the principle of attracting all ethnic Chinese, wherever they may live. An adherent of the “total espionage” strategy, Beijing even encourages emigration in the hope that its citizens will remain loyal to and useful for their historical homeland after moving to another country..."The history of China’s espionage activities on Russian armaments is not only limited to one precedent or one type of weapons. One of the top Chinese priorities is to produce complete replicas of Russia’s best machines and weapons, from the Sukhoi Su-33 fighter jet to missiles, aircraft carriers and so on. This is a truly purpose-oriented strategy of a large country - snatch anything you can and reproduce it domestically," ["IT expert"] Andrei Masalovich points out.

Russia's secretive spy agency, the Federal Security Service (FSB), issued a rare statement Wednesday claiming the state had arrested a Chinese citizen who, posing as a translator for official delegations, was working under the direction of the Chinese government in an attempt to buy state secrets from Russians about Russia's S-300 missile system.

(Photo credit: AINOnline)I just read Big New Chinese Order for Russian Fighter Engines at China Defense Blog, which quoted AINOnline:China has placed additional orders for Russian AL-31-series fighter engines. State arms trade agency Rosoboronexport clinched two big contracts earlier this year...To serve them, Salut has established partnerships with Limin Corp. and Tyan Li company in Chengdu on deliveries and manufacturing of spare parts for both the AL-31F and the AL-31FN. Russia has also agreed to provide all necessary maintenance and repair documentation to the Chinese partners.

The House Cybersecurity Task Force released its report (.pdf) today. NextGov offers a good summary in their story House GOP Cyber Task Force Touts Industry Leadership by Jessica Herrera-Flanigan.The report includes the following recommendation:Companies, including Internet Service Providers (ISPs) and security and software vendors, are already conducting active operations to mitigate cybersecurity attacks. However, these are largely done independently according to their individual business interests and priorities. Congress should facilitate an organization outside of government to act as a clearing house of information and intelligence sharing between the government and critical infrastructure to improve security and disseminate real-time information designed to help target and defeat malicious cyber activity.

Today I was fortunate to attend a hearing of the US House Permanent Select Committee on Intelligence (HPSCI). That's me on the far left of the photo, seated behind our MANDIANT CEO Kevin Mandia. I'd like to share a few thoughts on the experience.First, I was impressed by the attitudes of all those involved with HPSCI, from the staffers to the Representatives themselves. They were all courteous and wanted to hear the opinions of Kevin and the other two witnesses (Art Coviello from RSA and Michael Hayden from the Chertoff Group), whether before, during, or after the hearing.Second, I thought Reps Mike Rogers (R-MI, HPSCI Chairman) and C.A. Dutch Ruppersberger (D-MD, HPSCI Ranking Member) offered compelling opening statements. Rep Rogers squarely pointed the finger at our overseas adversaries. As reported by PCWorld in U.S. Lawmakers Point to China as Cause of Cyberattacks, Rep Rogers said:"I don't believe that there is a precedent in history for such a massive and sustained intelligence effort by a government to blatantly steal commercial data and intellectual property...China's economic espionage has reached an intolerable level and I believe that the United States and our allies in Europe and Asia have an obligation to confront Beijing and demand that they put a stop to this piracy."

"As a professional intelligence officer, I step back in awe of the breadth, the depth, the sophistication, the persistence of the Chinese espionage effort against the United States of America."

Amazon.com just posted my five star review of Robust Control System Networks by Ralph Langner. From the review:I am not an industrial control systems expert, but I have plenty of experience with IT security. I read Robust Control System Networks (RCSN) to learn how an ICS expert like Ralph Langner think about security in his arena. I was not disappointed, and you won't be if you keep an open mind and remember IT security folks aren't the target audience. After reading RCSN I have a greater appreciation for the problems affecting the ICS world and how that community should address the fragility of its environment.

images

file namealternative text
Blogging Since 8 Jan 2003
My Photo
twitter.com/taosecurity
TCP/IP Weapons School 3.0
Books by Richard Bejtlich
Association of Former Information Warriors
Digital Forensics Magazine

headers

H1

H2

Thursday, October 13, 2011

Tuesday, October 11, 2011

Friday, October 07, 2011

Thursday, October 06, 2011

Tuesday, October 04, 2011

Wednesday, September 28, 2011

Sunday, September 25, 2011

Blogging Since 8 Jan 2003

About Me

twitter.com/taosecurity

TCP/IP Weapons School 3.0

Books by Richard Bejtlich

Association of Former Information Warriors

Digital Forensics Magazine

BSD Magazine

Blog Archive

Labels

H3

Thursday, October 13, 2011

Tuesday, October 11, 2011

Friday, October 07, 2011

Thursday, October 06, 2011

Tuesday, October 04, 2011

Wednesday, September 28, 2011

Sunday, September 25, 2011

Blogging Since 8 Jan 2003

About Me

twitter.com/taosecurity

TCP/IP Weapons School 3.0

Books by Richard Bejtlich

Association of Former Information Warriors

Digital Forensics Magazine

BSD Magazine

Blog Archive

Labels

H4

H5

H6

internal links

addressanchor text
skip to main
skip to sidebar
Republican Presidential Candidates on China
21:38
china
Bejtlich in "The expanding cyber industrial complex"
22:49
Computer Incident Response Team Organizational Survey, 2011
22:38
Interview with One of My Three Wise Men
23:36
apt
wisdom
Russia v China -- Sound Familiar?
07:27
china
It's All About the Engines
22:49
china
House Cybersecurity Task Force Report Released
National Digital Security Board
10:24
C-SPAN Posts Video of Tuesday Hearing
09:41
apt
china
Inside a Congressional Hearing on Digital Threats
20:51
china
threats
Chinese Espionage in Five Minutes
Tiger Trap
23:47
china
Review of Robust Control System Networks Posted
22:11
reviews
Impressions: The Art of Software Security Testing
The Art of Software Security Assessment
20:46
impressions
Impressions: The Art of Software Security Assessment
20:33
Older Posts
Home
Posts (Atom)
2011
October
Republican Presidential Candidates on China
Bejtlich in "The expanding cyber industrial comple...
Computer Incident Response Team Organizational Sur...
Interview with One of My Three Wise Men
Russia v China -- Sound Familiar?
It's All About the Engines
House Cybersecurity Task Force Report Released
C-SPAN Posts Video of Tuesday Hearing
Inside a Congressional Hearing on Digital Threats
September
Chinese Espionage in Five Minutes
Review of Robust Control System Networks Posted
Impressions: The Art of Software Security Testing
Impressions: The Art of Software Security Assessme...
Impressions: Tiger Trap
Bejtlich Cited in Chinese Article on APT
Classic Chinese Defensive Propaganda
Government Takeover of Compromised Digital Infrast...
Watch National Geographic Channel's The Liquid Bom...
August
TaoSecurity Security Effectiveness Model
TCP/IP Weapons School 3.0 in McLean, VA 26-27 Oct
Jaime Metzl Describes "China's Threat to World Ord...
Expect to Hear "IDS Is Dead" (Again)
Bejtlich Leading Session at IANS
Check Out MANDIANT Job Postings
Tao of NSM Errata and Possible Book Plans
Bejtlich Webinar for Dark Reading and InformationW...
Bejtlich Keynote at Hawaiian Telcom Conference
Feedback from Latest TCP/IP Weapons School 3.0 Cla...
Impressions: Android Forensics
Impressions: iPhone and iOS Forensics
Impressions: XBox 360 Forensics
Impressions: Digital Forensics with Open Source To...
Impressions: The Shellcoder's Handbook, 2nd Ed
Impressions: Reversing: Secrets of Reverse Enginee...
Impressions: The IDA Pro Book, 2nd Ed
Book Reviews vs Impressions
July
Review of Metasploit: The Penetration Tester's Gui...
Review of Hacking: The Art of Exploitation, 2nd Ed...
Review of Gray Hat Hacking, 3rd Ed Posted
Review of Ninja Hacking Posted
Review of Managed Code Rootkits Posted
Review of Buffer Overflow Attacks Posted
Risk Modeling, not "Threat Modeling"
Noah Shachtman’s Pirates of the ISPs
SQL Injection Challenge and Time-Based Security
Bejtlich Teaching in Abu Dhabi in December
June
Why Business Methods Are as Important as IP to Chi...
With "Cyber" Attacks, Effects Matter More Than Mea...
THEY DID IT
Security Conference Recommendations
May
April
March
February
January
2010
December
November
October
September
August
July
June
May
April
March
February
January
2009
December
November
October
September
August
July
June
May
April
March
February
January
2008
December
November
October
September
August
July
June
May
April
March
February
January
2007
December
November
October
September
August
July
June
May
April
March
February
January
2006
December
November
October
September
August
July
June
May
April
March
February
January
2005
December
November
October
September
August
July
June
May
April
March
February
January
2004
December
November
October
September
August
July
June
May
April
March
February
January
2003
December
November
October
September
August
July
June
May
April
March
February
January
afcert
Air Force
analysis
announcement
apt
bestbook
blackhat
books
bro
bruins
ccna
china
cloud
clowns
conferences
controls
correlation
cybercommand
cyberwar
dfm
exploits
fisma
freebsd
GE
ge-cirt
hakin9
history
impressions
infrastructure
ipv6
law
leadership
malware
mandiant
microsoft
mssp
nsm
offense
oisf
openpacket
philosophy
pirates
powerpoint
press
psirt
reading
research
reviews
sans
sguil
Snort Report
threat model
threats
Traffic Talk
training
tufte
ubuntu
usenix
verizon
vulnerabilities
wisdom

external links

addressanchor text
Business Insider
Washington Post
this
Tweet
The expanding cyber industrial complex
Tweet
Computer Incident Response Team Organizational Survey, 2011
Computer Incident Response Team Organizational Survey, 2011
Tweet
interviewed
Tweet
Chinese spy mania sweeps the world
Voice of Russia
China Still Spies the Old Fashioned Way, Russia Says
Tweet
AINOnline
Big New Chinese Order for Russian Fighter Engines
China Defense Blog
AINOnline
Tweet
House Cybersecurity Task Force
report
House GOP Cyber Task Force Touts Industry Leadership
Tweet
C-SPAN
Tweet
US House Permanent Select Committee on Intelligence
MANDIANT
U.S. Lawmakers Point to China as Cause of Cyberattacks
Rep. Mike Rogers criticizes Chinese economic cyber-espionage
Rep Myrick (R-NC)
@taosecurity
Tweet
1 comments
History of China spying on U.S.
Tweet
1 comments
Amazon.com
Robust Control System Networks
Ralph Langner
review
Tweet
The Art of Software Security Testing
Tweet
The Art of Software Security Assessment
Tweet
My Photo
View my complete profile
img
Blogger