Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Tuesday, May 23, 2006

Bedtime Reading - The Baby Business

›
While not necessarily an AI , a Project 2501 type of living entity breakthrough development, there's a growing (underground) market for...

The Current, Emerging, and Future State of Hacktivism

›
Zone-H recently reported yet another major hacktivism case in what's stated to be the biggest hacking incident in the web-hosting histo...

Arabic Extremist Group Forum Messages' Characteristics

›
Ever wondered what's the font size of a terrorist forum posting? These guys are really deep into using AI for gathering intelligence on ...

Espionage Ghosts Busters

›
In previous posts, " Insider Competition in the Defense Industry ", and " The anti virus industry's panacea - a virus rec...

Nation Wide Google Hacking Initiative

›
The idea of doing reconnaissance for the purpose of pen testing or malicious activity through google hacking, has already reached levels of ...
Monday, May 22, 2006

Travel Without Moving - Cheyenne Mountain Operations Center

›
It's a small world -- and a busy one, this post was supposed to appear the previous week so here it goes. There are certain places you ...
Tuesday, May 16, 2006

Techno Imperialism and the Effect of Cyberterrorism

›
It's been a while since I've last blogged about Cyberterrorism , and while many did mentioned the topic in between the recent DRDoS...

Insider Competition in the Defense Industry

›
While there aren't any smoking emails mentioned in this case, where else can we spot insiders if not in the defense industry, an indus...

EMP Attacks - Electronic Domination in Reverse

›
Yesterday, I came across to an updated(April 14, 2006) CRS report - High Altitude Electromagnetic Pulse (HEMP) and High Power Microwave (HPM...
Monday, May 15, 2006

Valuing Security and Prioritizing Your Expenditures

›
I often blog on various market trends related to information security and try to provide an in-depth coverage of emerging or current trends ...
Friday, May 12, 2006

Terrorist Social Network Analysis

›
In previous posts " Visualization, Intelligence and the Starlight project " and " Visualization in the Security and New Media...
Thursday, May 11, 2006

Travel Without Moving - Scratching the Floor

›
You don't really need a reconnaissance satellite to spot this, it's precisely the type of "sight" you can see for yoursel...

Pocket Anonymity

›
While the threats posed by improper use of removable media will continue to make headlines, here's a company that's offering the com...

Is Bin Laden Lacking a Point?

›
If I were to name the masters of PSYOPS, that would be terrorists, who without a super power's financial capabilities still manage to ac...

Pass the Scissors

›
Counterfeiting U.S currency is a profitable business given its stability and actual valuation, and so is money printing ! It's just tha...

Snooping on Historical Click Streams

›
In a previous post " The Feds, Google, MSN's reaction, and how you got "bigbrothered"? I gave practical advices on how c...
Tuesday, May 09, 2006

Wiretapping VoIP Order Questioned

›
There's been a lot of buzz recently on the FCC's order requiring all VoIP providers to begin compliance with CALEA in order to la...

The Cell-phone Industry and Privacy Advocates VS Cell Phone Tracking

›
I've once mentioned various privacy issues related to mobile devices , the growing trend of "assets tracking", and of course, ...
Monday, May 08, 2006

Shaping the Market for Security Vulnerabilities Through Exploit Derivatives

›
In a previous post " 0bay - how realistic is the market for security vulnerabilities? " I gave a brief overview of the current mar...
Thursday, May 04, 2006

The Current State of Web Application Worms

›
Remeber the most recent Yahoo! Mail's XSS vulnerabilities , or the MySpace worm ? I just read through a well written summary on Web App...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.