Blog Archives
OSINT: Internet Failure
Here is some very well done analysis of the impact of failing internet cables. Here is what can only be called a short book (actually a Wired article) by Neal Stephenson on the laying of fiber optic cable circa 1996. … Continue reading
Cyber Assassination
DefenseTech – “Cyber assassination” is when an individual is unaware that he or she is the subject of a cyber attack designed to discredit them and to call into question his or her credibility or loyalty. Note this that this … Continue reading
Review: “The Lost Room”
Thirding John and Dan‘s recommendations. Very impressed with the story, especially with the layers not becoming cumbersome (like Lost). We were left looking for more. -Shlok Sign up for my newsletter.
Social Engineering Emergency Responders
ThreatLevel: An example of leveraging open social systems to collect intelligence from people who are generally not trained for INFOSEC and usually don’t think in terms of security: Someone is staging social engineerings attacks against emergency responders in a mysterious … Continue reading
Caldwell On Reform
Lt. General William B. Caldwell has an article at Small Wars Journal in which he calls for the Army to adapt to modern warfare by: Encouraging soldiers to engage in information operations. “Tell their story.” Empower subordinates. Underwriting risk-taking and … Continue reading

