Transcript
Rick Howard (0:02)
You're listening to the Cyberwire Network powered by N2K. The word is red. Teaming spelled red as in opposition and teaming as in group activity. Definition the practice of emulating known adversary behavior against an organization's actual defensive posture. Example sentence In Computer Security, the Red Team assumes the role of the adversary group trying to penetrate the Blue team's digital infrastructure. Origin and context. The Roman Catholic Church may have invented the concept in 1587 when Pope Sixtus V assigned the job of Devil's Advocate during the beatification process of St. Lawrence Justinian. The avocatus diable was to be the opposing force, the Red Team to make sure that, according to Ellen Lloyd of Ancient Pages, no person received the honors of sainthood recklessly and too fast. Every potential weakness or objection to the state's canonization was raised and evaluated in order to ensure that not only those who were truly worthy would be raised to the dignity of the altars. The origin of the Red Team and Blue Team names to indicate adversary and good guy activity, respectively, isn't a random choice. We have the Prussian army to thank for that. According to Peter Attia over at Media, in the early 19th century the Prussian army adopted war games to train its officers. One group of officers developed a battle plan and another group assumed the role of the opposition using a tabletop game called Kriegspiel, literally war game in German, resembling the popular board game Risk. Blue game pieces stood in for the home team, the Prussian Army. Since most Prussian soldiers wore blue uniforms, red blocks represented the enemy forces, the Red Team, and the name has stuck ever since Red teaming hit the digital age in the form of penetration testing. In the 1960s and 1970s, just as mainframe computers started to become useful for government in the commercial space in 1971, the US Air Force contracted James Anderson to run Tiger teams against their multics operating systems, the precursor to Unix. His 1972 After Action Report described a methodology to penetrate and compromise those systems, which is fundamentally the basis for all penetration testing, even today. In the early 2000s, the idea of a combined Red Team, Blue Team exercise or Purple Team exercise became popular to test defenses against known adversary attack campaigns in an intrusion kill chain kind of way. This had the added benefits of exercising incident response teams and accelerating the training of newbie and mid tier analysts in the Soc Nerd Reference at maybe the first cybersecurity conference ever hosted by the System Development Corporation In California in 1965, 15,000 mainframe operators from around the world discussed all the ways in which these new machines could be penetrated by unsavory people. By the late 1960s and the early 1970s, elite computer operators were passing around a paper authored by Dr. Willis Ware and others called the Willis Paper that, according to William Hunt at the College of William and Mary, the paper showed how spies could actively penetrate computers, steal or copy electric files, and subvert the devices that normally guard top secret information. The study touched off more than a decade of quiet activity by these elite groups of computer scientists working for the US Government who tried to break into sensitive computers. They succeeded in every attempt. Wordnotes is written by Naila Genowi, executive produced by Peter Kilp, and edited by John Petrick and me, Rick Howard. The mixed sound, design and original music have all been crafted by the ridiculously talented Elliot Eltzman. Thanks for listening.
![red teaming (noun) [Word Notes] - Hacking Humans cover](/_next/image?url=https%3A%2F%2Fpod.wave.co%2Flogo.png&w=1920&q=75)