"Collaborating globally for a more secure digital world"
https://nsrc.org/workshops/2014/apricot14-security/raw-attachment/wiki/Agenda/4-2-2.inter-network-cooperation.pdf
Barry Greene
bgreene@senki.org
I've been working an attack against XXX.YY.236.66/32 and XXX.YY. 236.69/32. We're seeing traffic come from <ISP-A>, <ISP-B>, <IXP-East/ West> and others. Attack is hitting both IP's on tcp 53 and sourced with x.y.0.0. I've got it filtered so it's not a big problem, but if anyone is around I'd appreciate it if you could filter/trace on your network. I'll be up for a while :/
Violation of trust,
such as forwarding information
that required explicit permission of sharing
and the permission was not asked,
results in breach of trust
and violates the integrity of the community
you don’t need to be part of everything,
you need to trust the bigger team to take action.
face-to-face in-persons meetings are critical
for creating and maintaining trust relationships
don't translate that to
"must drink beer with each other" :)
it is OK to have small focused groups to break off
and work on a specific issue/case/investigation/reaction
it is A-OK for groups to fade away
as new groups evolve and branch out.
“trust groups” have “community life cycles.”
..many internet companies and internet organizations and also from law enforcement agencies, are taking part secretly in massive violation of privacy laws in countries worldwide ..