Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Monday, May 22, 2006

Travel Without Moving - Cheyenne Mountain Operations Center

›
It's a small world -- and a busy one, this post was supposed to appear the previous week so here it goes. There are certain places you ...
Tuesday, May 16, 2006

Techno Imperialism and the Effect of Cyberterrorism

›
It's been a while since I've last blogged about Cyberterrorism , and while many did mentioned the topic in between the recent DRDoS...

Insider Competition in the Defense Industry

›
While there aren't any smoking emails mentioned in this case, where else can we spot insiders if not in the defense industry, an indus...

EMP Attacks - Electronic Domination in Reverse

›
Yesterday, I came across to an updated(April 14, 2006) CRS report - High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM...
Monday, May 15, 2006

Valuing Security and Prioritizing Your Expenditures

›
I often blog on various market trends related to information security and try to provide an in-depth coverage of emerging or current trends ...
Friday, May 12, 2006

Terrorist Social Network Analysis

›
In previous posts " Visualization, Intelligence and the Starlight project " and " Visualization in the Security and New Media...
Thursday, May 11, 2006

Travel Without Moving - Scratching the Floor

›
You don't really need a reconnaissance satellite to spot this, it's precisely the type of "sight" you can see for yoursel...

Pocket Anonymity

›
While the threats posed by improper use of removable media will continue to make headlines, here's a company that's offering the com...

Is Bin Laden Lacking a Point?

›
If I were to name the masters of PSYOPS, that would be terrorists, who without a super power's financial capabilities still manage to ac...

Pass the Scissors

›
Counterfeiting U.S currency is a profitable business given its stability and actual valuation, and so is money printing ! It's just tha...

Snooping on Historical Click Streams

›
In a previous post " The Feds, Google, MSN's reaction, and how you got "bigbrothered"? I gave practical advices on how c...
Tuesday, May 09, 2006

Wiretapping VoIP Order Questioned

›
There's been a lot of buzz recently on the FCC's order requiring all VoIP providers to begin compliance with CALEA in order to la...

The Cell-phone Industry and Privacy Advocates VS Cell Phone Tracking

›
I've once mentioned various privacy issues related to mobile devices , the growing trend of "assets tracking", and of course, ...
Monday, May 08, 2006

Shaping the Market for Security Vulnerabilities Through Exploit Derivatives

›
In a previous post " 0bay - how realistic is the market for security vulnerabilities? " I gave a brief overview of the current mar...
Thursday, May 04, 2006

The Current State of Web Application Worms

›
Remeber the most recent Yahoo! Mail's XSS vulnerabilities , or the MySpace worm ? I just read through a well written summary on Web App...

Travel Without Moving - Typhoon Class Submarines

›
In previous posts " Security quotes : a FSB (successor to the KGB) analyst on Google Earth ", " Suri Pluma - a satellite imag...
Wednesday, May 03, 2006

Biased Privacy Violation

›
This is a very interesting initiative, going beyond the usual MySpace's teen heaven privacy issues, but directly exposing the mature a...
Tuesday, May 02, 2006

April's Security Streams

›
Hi folks, it's about time to quickly summarize April's Security Streams. As of today, my blog is officially six months old and the f...
Thursday, April 27, 2006

A comparison of US and European Privacy Practices

›
A new study on " US and European Corporate Privacy Practices " was released two days ago, and as I constantly monitor the topic k...

DIY Marketing Culture

›
Problem - big name advertising agencies, and self forgotten copywriters easily turn into an obstacle for a newly born startup, the way mark...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.