The Defense Department’s recent emphasis on the importance of the electromagnetic spectrum could be coming to a head, as the department is considering recognizing the spectrum as a sixth domain of operations, in addition to land, air, sea, space and cyberspace, which officially was declared a domain in 2011. In a statement to Breaking Defense, DOD…
Category: Information Warfare
Propaganda Alert: Exploiting Tragedy and the Continuing Agenda to Disarm America Bullet by Bullet
By Hammerhead The latest tragedy in San Bernardino, California where a jihadist terrorist couple walked into a Christmas Party at the husbands place of work and shot down 14 people in cold blood is just another CHANCE for the no-bama administration to ride the political wave of “public sentiment and anger” toward both terrorism…
Tradecraft: 9 Secrets to Reading People
The ability to read others will greatly affect how you deal with them. When you understand how another person is feeling, you can adapt your message and communication style to make sure it is received in the best way possible. But what should you be listening for? And what other signs can tip you…
Computer Security: Email Hygiene Tips
Anti-phishing and Email Hygiene Journalists and newsrooms are increasingly the victims of hacking and malware, and often hackers target them through their email. Virtually every “sophisticated” hack of an individual reporter or entire newsroom starts with a relatively simple attack: phishing and spear phishing. Phishing is a social-engineering attack where an adversary crafts an email…
Giving Thanks to the OSS
As today’s security depends increasingly on intelligence and special operators, Congress should act to honor those who paved their way. What do attorney James Donovan (portrayed by Tom Hanks in “Bridge of Spies”), the “French Chef” Julia Child, Virginia Hall (the only American civilian woman to receive the Distinguished Service Cross during World War II),…
Intel Tradecraft: Geo-Tagging and Identifying a Picture by it’s Background (Similar Image Search)
In the most recent episode of Homeland, Carrie while trying to figure out what direction to go in searching a stolen laptop for intel, is distracted by the computer’s screen saver which is a picture that shows the suspect in a beachfront bar in what appears to be a tropical location. Thinking back, Carrie remembers…
OPSEC and Burner Phones
This was published in several places, but I wanted to re-post it for reference..some good stuff in here. Original Source Article can be found HERE
The Civilian Guide to Fighting ISIS Online
Anonymous Publishes Guide to ‘Fighting ISIS Online’ Since the FBI and CIA Won’t In the wake of the Paris terror attacks, and several high-casualty acts of terrorism from the so-called Islamic State in the past week, Anonymous has come out with a series of guides for getting involved in the hacktivist group’s Operation ISIS…
Cold War Files: Terror’s KGB Roots
A year ago today, my friend Alexander Litvinenko died in a London hospital, leaving behind a wife and young son. Sasha was poisoned by a tiny nuclear device containing polonium-210 — which, the British Crown Prosecution Service concluded, was planted on him by Russian secret agents. In its way, his murder was an act of…
Where Americans Can Be Tracked Without A Warrant
Since the Paris attacks, there is a growing concern by DHS and the FBI that ISIS are able to communicate via “Dark Comms” or communications that are so highly encrypted they cannot tracked or monitored, common sense would tell you that authorities are going to start casting the “Surveillance” net wider to compensate, meaning more…