- Are you interested in having me speak at your event? Are you interested in inviting me to join a classified and potentially sensitive event or research group? Are you interested in becoming a writer at this blog? Are you interested in advertising at this blog? Feel free to approach me - disruptive.individuals@gmail.com
- Exposing Iran's Most Wanted Cybercriminals - FBI Most Wanted Checklist - OSINT Analysis
- Exposing Yet Another Currently Active Fraudulent and Malicious Pro-Hamas Online Infastructure
- Flashpoint Intel Official Web Site Serving Malware - An Analysis
- Historical OSINT - "I Know Who DDoS-ed Georgia and Bobbear.co.uk Last Summer"
- Historical OSINT - A Peek Inside The Georgia Government's Web Site Compromise Malware Serving Campaign - 2010
- Historical OSINT - Profiling a Rogue and Malicious Domain Portfolio of OEM-Pirated Software
- Historical OSINT - Able Express Courier Service Re-Shipping Mule Recruitment Scam Spotted in the Wild
- Historical OSINT - Global Postal Express Re-Shipping Mule Recruitment Scam Spotted in the Wild
- Historical OSINT - Re-Shipping Money Mule Recruitment "Your Shipping Panel LLC" Scam Domain Portfolio Spotted in the Wild
- The Threat Intelligence Market Segment - A Complete Mockery and IP Theft Compromise - An Open Letter to the U.S Intelligence Community
- Historical OSINT - A Portfolio of Fake Tech Support Scam Domains - An Analysis
- Historical OSINT - Georgian Justice Department and Georgia Ministry of Defense Compromised Serving Malware Courtesy of the Kneber Botnet
- Historical OSINT - The Russian Business Network Says "Hi"
- Profiling "Innovative Marketing" - The Flagship Malvertising andf Scareware Distributor - Circa 2008 - An OSINT Analysis
- Exposing Evgeniy Mikhaylovich Bogachev and the "Jabber ZeuS" Gang - An OSINT Analysis
- Profiling a Currently Active Portfolio of High-Profile Cybercriminal Jabber and XMPP Accounts
In this post I'll walk you though the story of my disappearance including a brief introduction and explanation of my "hacker enthusiast" years circa the 90's where I've been busy doing "lawful surveillance" and "lawful interception" throughout my teenage years while I was not busy working full-time with several H/C/P/A (Hacking/Cracking/Phreaking/Anarchy) groups as a full-time member practically setting up the foundations of the Threat Intelligence market segment a few years later including the basics of Technical Collection type of position including Independent Contractor working under NDA in a post 9/11 World including a personal greeting to everyone who's been approaching me and reaching out offering support and technical and operational "know-how" including general "say hi" advice.
I want to express a personal gratitude to a good old research friend - Internet Anthropologist - who actually initiated a track-down action and managed to indirectly find me circa 2010 with the help of international and Bulgarian law-enforcement including fellow colleagues and friends from the Security Industry and U.S Intelligence Community circa 2008-2013 who attempted to track me down and find out more about my disappearance.
In this post I'll discuss my visit to the GCHQ circa 2008 with the Honeynet Project including an in-depth discussion on my "lawful interception" and "lawful surveillance" experience circa the 90's throughout my teenage hacker years including an in-depth discussion on the hacking Scene that I was proud to be a member of throughout the 90's having successfully participated in a variety of community and commercial projects including a personal thanks to the following friends and colleagues for offering support and keeping track of my research:
- Jamie Riden for making a personal contribution to my PayPal account for research purposes
- Steve Santorelli from Team Cymru for expressing interest in a proprietary Threats Database
- Michal Salat for participating in a brief trial of my Threat Data service
- Ian Cook for making a personal introduction to my current part-time employer KCS Group Europe
- Jeffrey Bardin from Treadstone71 who reached out and offered employment opportunity
- Harrison Cook who's been persistently donating and reaching out to support the Offensive Warfare 2.0 community
- John Young from Cryptome.org who helped spread the word about the Offensive Warfare 2.0 Community
- Liran Sorani from Webhose for the opportunity to participate in a part-time project
An In-depth Analysis of the Hacking Scene circa the 90's through the prism of Dancho Danchev also known as tHe mAnIaC:

Personal Photo of bedroom hacker - today's leading expert in the field of cybercrime research security blogging and threat intelligence gathering - Dancho Danchev also known as the tHe mAnIaC circa the 90's with his hacker girlfriend - Yordanka Ilieva - including various personal projects circa the 90's
- I happen to have directly established a connection with one of the primary Sub7 Trojan Horse authors HeLLfiReZ which makes me pretty close to Steve Gibson in one way or another - throughout the 90's where we exchanged Trojan Horse samples while I was busy working for Trojan Defense Suite and the infamous Lockdown2000 anti-trojan software suite where I was busy working on signatures and help-guides compilation while I was also busy being a member of several hacking groups primarily found on the Cyberarmy.com Top 50 Hacking List including Progenic.com Top 100 hacking sites list.
- Mail-bombing was a trend - in particular my personal experience of making jokes with friends who were unable to take care of 100+ email messages in their Inbox
- Mass-Mailing List subscription - in particular the fact that my friends were not capable of finding a productive way to get rid of the messages and unsubscribe themselves
- Telephony Denial of Service attack circa the 90's exploiting a popular for Eastern Europe Mail2SMS mobile provider feature - in particular the fact that it's not necessarily a pleasant experience to get rid of 100+ SMS messages received in a short-period of time
- "Lawful Interception" of friends - something else that I'm not particularly proud of is my "lawful surveillance" and "lawful interception" experience and capabilities of people that I knew and that I used to know largely driven by the need to explore and learn more
- Corporate Experience in the field of anti-trojan detection technologies and categorization - in particular my experience in creating trojan horse signatures and writing actual technical descriptions for the purpose of improving my employer's overall detection rate for a variety of trojan horse vendors circa the 90's.
Do you remember my work from the 90's? Are you familiar with the Scene circa the 90's? Feel free to approach me - disruptive.individuals@gmail.com or make a PayPal donation using my PayPal ID: dancho.danchev@hush.com for the purpose of fueling growth into my research.