Change is Afoot .... and Afleet of Foot to Boot the Register
Gartner consultants in ceremonial dress
Thanks, El Reg, that made my day, today. :-) And does Blighty have Tier X capabilities and facilities, as would be defined and understood in the context of "Final Report of the Defense Science Board (DSB) Task Force on Resilient Military Systems", provided stealthily to CyberIntelAIgent Defence Systems, courtesy of Spooky IntelAIgent Services which one has no need to have any more knowledge of, unless one has a suitable feed to impeccably seed and immaculately tender there …… for Deep CyberSpace Virtual Mining and XSSXXXXploitation of Future Developments in SMARTR Programming for Better Beta AIdDVenTuring Trips ….. Magical AIMissions ...... with Astute IT JuJu MoJo Attitude? :-)*
Or is such Exotic and Erotic IT destined and fated to be an Eastern Confection of Exquisite Taste, First and Foremost?
And that and those be a question and questions which sit large and for swift unequivocal answering on Andrew Parker's new desk/laptop, should he not wish to be seen and known to fall and fail at the first of many such a virtual hurdle as are increasingly commonplace into todays complex entangled intelligence spaces, and prove himself to be unfit for secure office lead, before even he gets really started on revamping and revitalising a wasted service and national treasure.
Silence be golden, but here be mined and polished crazy diamonds and sparkling jewels of unique beauty and lustre.
If you can't be arsed to read what you need to read, in order to be able to start to understand what builds before you and confronts and aids you, and thus would you always be imprisoned to be led by the nose to whatever trough may or may not be provided for you to feast or fast upon, these are the Tiers to answers question .....
The Task Force developed a threat hierarchy to describe capabilities of potential attackers, organized by level of skills and breadth of available resources
Tiers I and II attackers primarily exploit known vulnerabilities
Tiers III and IV attackers are better funded and have a level of expertise and sophistication sufficient to discover new vulnerabilities in systems and to exploit them
Tiers V and VI attackers can invest large amounts of money (billions) and time (years) to actually create vulnerabilities in systems, including systems that are otherwise strongly protected.
Higher-tier competitors will use all capabilities available to them to attack a system but will usually try lower-tier exploits first before exposing their most advanced capabilities. Tier V and VI level capabilities are today limited to just a few countries such as the United States, China and Russia.
As you can and/or must imagine, are Tier X capabilities and facilities something which renders to one something of a considerable overwhelming advantage which cannot be countered and bettered via traditional and conventional means and simple memes.
* Poe's Law Rules.:-)