Anti-phishing and Email Hygiene Journalists and newsrooms are increasingly the victims of hacking and malware, and often hackers target them through their email. Virtually every “sophisticated” hack of an individual reporter or entire newsroom starts with a relatively simple attack: phishing and spear phishing. Phishing is a social-engineering attack where an adversary crafts an email…
Category: Reference Materials
IED Awareness: The Blast Zone
(Note: This is a companion piece to the article I re-posted titled IED Awareness for First Responders and Civilians.) In this companion piece to my previous article, IED Awareness for First Responders, I cover the basics of what every first responder should know about the area around a bomb which is affected by the blast….
Intel Tradecraft: Geo-Tagging and Identifying a Picture by it’s Background (Similar Image Search)
In the most recent episode of Homeland, Carrie while trying to figure out what direction to go in searching a stolen laptop for intel, is distracted by the computer’s screen saver which is a picture that shows the suspect in a beachfront bar in what appears to be a tropical location. Thinking back, Carrie remembers…
OPSEC and Burner Phones
This was published in several places, but I wanted to re-post it for reference..some good stuff in here. Original Source Article can be found HERE
Churchill’s Take on Islam as Relevant in 2015 as when it was written in 1899
I have been with great urgency for the last few weeks and especially since the attacks in Paris doing as much historical research as I possibly can for a series of articles I am planning to do on the “problem of islam in the world today”… Notice I did not say Terrorism, yeah we will…
Can the Counter-Insurgency Doctrine Be Saved?
After failures in Afghanistan and Iraq, it’s time for a new understanding of counterinsurgency. With the apparent lack of progress and success in Afghanistan and Iraq, counterinsurgency (COIN) has fallen out of favor within the political and military establishments in the U.S. and elsewhere. Regardless of whether these failures were due to erroneous implementation or…
Understanding Counter-Insurgency Warfare in under 3 minutes
This clip was edited out of the final movie We Were Soldiers for some reason, but I have to agree with Tom Ricks’ Article, they should have left it in. “You Won’t Run the little Bastards back home sir, They Are Home….” As I Said, that sums up COIN.
Cold War Files: The Third World War that Almost Was in 1950
With the comfort and hindsight of a half-century, President Harry Truman’s decision to commit American power to save South Korea from Communist aggression in late June 1950 stands as perhaps America’s finest moment of the Cold War. By making a difficult commitment, by sacrificing 50,000 American lives in the end, Truman upheld Western values…
Knowing Your Enemy: Mujahideen, The Strategic Tradition of Sunni Jihadism
By Brett A. Friedman The world is in the grips of the group known as ISIS. Unable to look away but equally unable to fathom the group’s extreme violence, the civilized world marvels at a terrorist threat that is seemingly al Qaeda cranked up to eleven. Its media blitzkrieg has recently been described by Jessica…
Psychological Warfare Files: Ghost Tape #10 and Operation Wandering Soul
“Vietnamese legends held that on the anniversary of a person’s death, a spiritual channel between our world and the afterlife can open making communication possible. Was this just such a phenomenon?” JUST AFTER dusk on the night of Feb. 10, 1970, the jungles near the U.S. Army’s Fire Support Base Chamberlain in Hau Niga Province, South Vietnam…