Looking for a Smoking Gun Behind a False Flag Attack

By Hank Thomas

Hank Thomas is a Partner and Chief Operating Officer at Strategic Cyber Ventures. Previously, he served as an executive at Booz Allen Hamilton - a global strategy, technology, and consulting firm - leading a business focused on military grade cybersecurity, incident response, information fusion, threat intelligence center design, and development and operations in the commercial space.

How can a government, or a company, determine who launched a cyber attack? Attribution becomes even more difficult when the attackers disguise themselves as others. The Cipher Brief asked Hank Thomas, a partner and Chief Operating Officer at Strategic Cyber Ventures, what so-called false flags in cyberspace look like and what investigators need to break through the attackers’ deception.

The Cipher Brief: How do victims of a cyber attack find out who was behind it?

“The Cipher Brief has become the most popular outlet for former intelligence officers; no media outlet is even a close second to The Cipher Brief in terms of the number of articles published by formers.” —Sept. 2018, Studies in Intelligence, Vol. 62

Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Subscriber+


Related Articles

Search

Close