David Dittrich

June 16, 2017

Thoughts on the Active Cyber Defense Certainty Act 2.0

On May 25, 2017, Representative Tom Graves released the second draft of proposed amendments to 18 U.S.C. 1030 (known as the Computer Fraud and Abuse Act). Representative […]
February 27, 2015

Response to “How Microsoft Appointed Itself Sheriff of the Internet” (Part 2)

In the first part of this two part blog post, the issue of anticipating retaliation during an aggressive battle to wrest control of a DDoS botnet […]
February 17, 2015

Response to “How Microsoft Appointed Itself Sheriff of the Internet” (Part 1)

This blog post is the first of a two-part series in response to the Wired article of Oct 14, 2014, “How Microsoft Appointed Itself Sheriff of […]
July 31, 2013

Hide and go seek, not hide and go tweak

On July 31, 2013, Jason Geffner of CrowdStrike discussed a new tool called “Tortilla” that allows incident responders and computer security researchers to hide behind the […]
May 28, 2013

Debating the Active Response Continuum: Defining the Terms of the Debate

[This post expresses the personal opinion of the author and is not an official statement representing the Honeynet Project.] At the AusCERT 2013 conference, Dmitri Alperovich […]
March 11, 2013

A new infosec era? Or a new infosec error?

On March 4, 2013, a contest was held at the Nullcon conference in Goa, India, to see who could take over a botnet. The Times of […]
December 29, 2012

The Ethics of Social Honeypots

For the last few years, I have been participating in a Department of Homeland Security sponsored effort to develop principles and applications for the evaluation of […]
December 10, 2012

No, Executing Offensive Actions Against Our Adversaries Really Does Have High Risk (Deal With It)

This is a response to a CSO Online blog post by Jeff Bardin (“Caution: Not Executing Offensive Actions Against Our Adversaries is High Risk,” November 2012.), […]
April 1, 2012

FAQ on Kelihos.B/Hlux.B sinkholing

On March 31, 2012, the Honeynet Project published a draft Code of Conduct and a statement about Ethics in Computer Security Research: Kelihos.B/Hlux.B botnet takedown. The […]