For six months, starting in the fall of 2014, I investigated a shadowy online Russian propaganda operation called the Internet Research Agency. The agency has been widely reported in Russian media to be the brainchild of Evgeny Prigozhin, an oligarch and ally of Vladimir Putin. At the time, it employed hundreds of Russians in a…
Category: Cyber-Skills
Examining Terrorist Tactics: The Jihadist Comms Toolkit
A new report documents how extremist groups’ use of secure digital tools software has evolved. “I don’t think that there are too many [makers of encrypted communication tools who] can say that bad guys don’t use their stuff, accurately,” NSA deputy director Richard Ledgett said during the recent Defense One Tech Summit, describing ISIS’ use…
4GW: Cyberpower Crushes Coup in Turkey
Rewriting the Rulebook on coups, time to add cyberpower Mere hours after the putsch in Turkey has failed, it is still too early to understand exactly what went on. Given those constraints, I still want to discuss something which has altered “the game” so much that the existing guidebook needs to be significantly revised….
OPSEC Tradecraft: Modern Clandestine Groups Face New Challenges
There were no mobile phones or recording devices allowed at this bizarre encounter. The digital era is perceived as posing new threats to the security of terror groups in Ireland in terms of their being tracked and covertly recorded. Source: The Guardian Bottom Line Up Front Compartmentation via unlinking Strict anti forensic practices to mitigate…
Modern Crime: Is This A Vast Government Conspiracy or Just A Simple Story About Revenge?
This is a really good object lesson in adhering to the old adage by Edgar Allen Poe: “Believe only HALF of what you SEE and NOTHING that you HEAR.” -SF Who is this man who seems to die in every terrorist attack? If you’ve clicked on any articles about the victims of recent terror…
Deconstructing Terrorism: World-Check Terrorism Database Exposed
A financial crime database used by banks has been “leaked” on to the net. World-Check Risk Screening contains details about people and organisations suspected of being involved in terrorism, organised crime and money laundering, among other offences. Access is supposed to be restricted under European privacy laws. The database’s creator, Thomson Reuters, has confirmed an…
Espionage Files: Surveillance For Hire In Africa
In July 2012, one year after the Arab Spring shook Arab regimes around the world, an email appeared in the inbox of Mamfakinch, a Moroccan online publication critical of the government. Under the subject line “dénonciation” — French for “denunciation” — was a single sentence. “Please don’t use my name or anything else, I don’t want any trouble.” And…
Cyber-War: The Big Hack of NYC
A scenario that could happen based on what already has. On December 4, 2017, at a little before nine in the morning, an executive at Goldman Sachs was swiping through the day’s market report in the backseat of a hired SUV heading south on the West Side Highway when his car suddenly swerved to the…
Surveillance State: The F.B.I.’s Growing Surveillance Gap
There are more homegrown jihadists than the feds can actually watch. And not everyone likes what the FBI is doing instead. A day after Omar Mateen killed 49 and wounded 53 in an Orlando nightclub, purportedly under the banner of the Islamic State or other terrorist groups, the FBI announced that it had repeatedly scrutinized…
Modern Crime: Will Cyber-Assassinations Soon Be A Reality?
As we hurtle forward into the digital, connected future, ever more objects are becoming targets for hackers and malicious software. Where once hacks only affected computers, they now bring down everything from cars to power grids and thermostats to secretive nuclear enrichment programs. So how long until a hack doesn’t just cause a nuisance or…