Thomas Rid

Johns Hopkins SAIS. Author of ACTIVE MEASURES (2020), RISE OF THE MACHINES (2016), & more. Founding director of the Alperovitch Institute @alperovitch

2023-05-12

I wrote something. On the other forbidden literature problem. That of the national security establishment in and around Washington, DC. theatlantic.com/ideas/archive/

2023-01-25

Looks like there might be inversely proportional relationship between the fear of AI-generated writing and the ability to ask fresh and original questions.

2023-01-23

Last week I was a student for five days, five hours per day—with ChatGPT fully integrated into teaching. Here's what we learned, just in time for Spring Term (which starts tomorrow. Class was Malware Analysis, taught by @jags alperovitch.sais.jhu.edu/five-

Thomas Rid boosted:
Drew Harwelldrewharwell
2022-12-22

Journalist profiles on the Washington Post's website can now include Mastodon links. Here's what it looks like: washingtonpost.com/people/drew

Thomas Rid boosted:
2022-12-22

This claim is false.

Law enforcement has the ability to get stored communications from companies like Twitter under 18 USC 2703(d). This is a famous "d-order" that has to be signed by a judge.

Companies can demand reimbursement under 2706. You can argue that 2703 should have a higher standard, but if the government can get to user data should it be free or should the companies ask for a nominal cost?

This is absolutely nothing to do with content moderation.

Thomas Rid boosted:
Quinta Jurecicqjurecic
2022-12-21

Latest ~~~Twitter Files~~~~ is a step up from the others insofar as it actually has some new-ish and somewhat interesting information ... albeit information that's really just filling in some details about reporting that the Washington Post already did theintercept.com/2022/12/20/tw

2022-12-17

Let me say this as somebody who consumes news and scholarship for a living, and a lot of it (as Hopkins prof): the notion that journalism—investigative reporting and professional fact-checking—could or should be replaced by some technology is simply dumb. Stupid. Makes no sense.

2022-12-14

@nullandnull Thank you very helpful!

Thomas Rid boosted:
2022-12-13

@jtk @ridt excellent point, john! i recall a long chat around he turn of the century with a sysadmin (because the cybersecurity role hadn't really been invented at the time) from NCAR about the kinds of intrusions they were seeing, we knew each other from the SANS community and USENIX Sec. probably why stoll's "cuckoo's egg" resonates with me so much - it was familiar territory. i cut my sysadmin and security chops in a late 90s uni environment, a lot of computing power that was poorly secured and heavily abused.

2022-12-13

Still always a bit stress-inducing here to send a DM and then press the (wrongly named) "Publish!" button.

2022-12-13

@jtk perfect thank you, see dm

2022-12-13

@jtk Sounds intriguing. I have only peeked down that road, not taken it. I'd be especially interested in NCSA, so any recommended contacts would be highly appreciated.

2022-12-13

@glesnewich @invisig0th indeed Visi very much comes to mind ;)

2022-12-13

Long-shot threat intel history question: I'm looking for some of the "unsung heroes" of the early days of threat hunting and clustering. People who had an outsize impact on the discipline but aren't recognized publicly to the extent they deserve. Pre-APT1. Think of Joyce Lin as an example. Either public or private sector, or both. Private responses very welcome. This is for a history book.

Thomas Rid boosted:
Steven YARA Synapse Millerstvemillertime@infosec.exchange
2022-12-13

There are *so* many incredible detection, analysis, intel stories that come out of years of incident response and investigations at places like Mandiant, Microsoft, Google, .gov - and it is a damn shame that we cannot publicly share more of them, if only to help the next generation of cyber analysts learn.

Don't get me wrong - we're in a much better place now than in 2012, back when there weren't 1000 infosec conferences; back before the stories were in the newspapers and before my grandma heard about hacking; back before APT was talked about publicly and before intrusions and breaches were in the public consciousness; back when you were an IT person looking at logs, trying to figure out if your company had "a problem"; back when you hoped and prayed some forensicator blogged about a thing and you were lucky to find a sample of malware or a pcap to look at, let alone any details of how it was found or why or who it related to, just so you could learn a little bit more.

Nowadays we have vendors publishing reports on the regular and vast amounts of data and indicator sharing, which is all great. One thing though - and I know this from experience - that which we see and share publicly is the tip of an immense iceberg, and much of the real juice is lost to the eternities. I just wish that we could make more of the investigations and case studies more available (and more transparent, less obfuscated) to those getting into the industry.

2022-12-09

DC is the most amazing and inspiring place to study threat intelligence history ... read landmark intel report, hop on linkedin, move over to signal, meet investigator in a café down the road or over in Arlington. Unbelievable how often it works like this. So lucky to be here.

Thomas Rid boosted:
2022-12-07

Important note for educators about now: it looks like GPT-2 output detectors can detect #chatgpt output pretty well.
huggingface.co/openai-detector
Edit: Changed my mind - it ID'd an excerpt from my own book as AI-written. A false positive could ruin a student's career.

HuggingFace GPT2 Output detector demo rates the following text as 99.98% likely to be fake:
It is important to note that Edgar Allen Poe did not actually have a pet giraffe. While it is not relevant to the poem "The Raven" or the broader movement of Romanticism, it is a common misconception about Poe.

In "The Raven," Poe uses symbolism to explore the emotions of grief and loss, as well as the themes of loneliness and isolation. The raven itself is a symbol of death and finality, representing the narrator's own mortality and the eventual end of his grief. The setting of the poem, with the narrator alone in his chambers surrounded by symbols of his intellectual pursuits, adds to the sense of isolation and despair.

Poe's use of symbolism in "The Raven" is typical of the Romantic movement, which emphasized emotion and individual experience. Through his carefully chosen symbols, Poe is able to create a vivid and evocative portrait of grief and loss. Despite the lack of a pet giraffe, "The Raven" remains a powerful and enduring work of Romantic poetry.
2022-12-05

@silas Great question, will look into HB Gary. And yes, I should have added that I'm also interested in single, major incident reports

2022-12-05

Threat intelligence history question: what were the earliest, proprietary APT reports done by companies that were part of the DIB (or worked for DIB targets)? I'd be especially interested in reports that pre-date the APT acronym itself, so pre-2006. Private responses welcome, any TLP level.

2022-12-02

Very excited to announce that @kimzetter will be a visiting scholar at @alperovitch at Hopkins SAIS next term, co-teaching a class with me alperovitch.sais.jhu.edu/kim-z

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst