Blog Archives

OSINT: Internet Failure

Here is some very well done analysis of the impact of failing internet cables. Here is what can only be called a short book (actually a Wired article) by Neal Stephenson on the laying of fiber optic cable circa 1996. … Continue reading

04. February 2008 by Shlok Vaidya
Categories: Thinking | Tags: , | 1 comment

Cyber Assassination

DefenseTech – “Cyber assassination” is when an individual is unaware that he or she is the subject of a cyber attack designed to discredit them and to call into question his or her credibility or loyalty. Note this that this … Continue reading

03. February 2008 by Shlok Vaidya
Categories: Thinking | Tags: | 3 comments

Review: “The Lost Room”

Thirding John and Dan‘s recommendations. Very impressed with the story, especially with the layers not becoming cumbersome (like Lost). We were left looking for more. -Shlok Sign up for my newsletter.

02. February 2008 by Shlok Vaidya
Categories: Review | Tags: , | Leave a comment

Social Engineering Emergency Responders

ThreatLevel: An example of leveraging open social systems to collect intelligence from people who are generally not trained for INFOSEC and usually don’t think in terms of security: Someone is staging social engineerings attacks against emergency responders in a mysterious … Continue reading

31. January 2008 by Shlok Vaidya
Categories: Thinking | Tags: , | Leave a comment

Caldwell On Reform

Lt. General William B. Caldwell has an article at Small Wars Journal in which he calls for the Army to adapt to modern warfare by: Encouraging soldiers to engage in information operations. “Tell their story.” Empower subordinates. Underwriting risk-taking and … Continue reading

29. January 2008 by Shlok Vaidya
Categories: Thinking | Tags: , | Leave a comment

← Older posts

Newer posts →