Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Monday, September 11, 2006

Secret CIA Prisons

›
It's official, there're indeed (publicly) secret CIA prisons , and a public commitment towards improvement : " All suspects wil...

NSA's Terrorist Records Database

›
Right on time! Inside sources -- this is a creative spoof -- at the NSA finally coordinated their intelligence sharing efforts with the Patr...

The Freedom Tower - 11th September 2006

›
That's of course how it's gonna look like in 2012 -- true leaders never look into the past, they're too busy defining the futur...
Friday, September 08, 2006

A Study on The Value of Mobile Location Privacy

›
Right in between Flickr's introduction of geotagging , the term stalkerazzi got its necessary attention, then again it entirely depends ...

Email Spam Harvesting Statistics

›
Web application email harvesting has always represented an untapped threat, and it's not the basics of parsing or web application vulne...

Benchmarking and Optimising Malware

›
With the growth and diversity of today's malware , performance criteria for a malicious code is reasonably neglected as a topic of inter...
Thursday, September 07, 2006

Google Hacking for Cryptographic Secrets

›
Interesting perspective, for sure could prove handy on a nation-wide scale . The concept of googling for private keys has been around for q...
Wednesday, September 06, 2006

Hezbollah's use of Unmanned Aerial Vehicles - UAVs

›
According to the common wisdom, terrorists -- or let's just say contradictive political fractions -- weren't supposed to be capable ...

HP Spying on Board of Directors' Phone Records

›
Whether a healthy paranoia , or a series of detailed leaks to the press on HP's future long term strategy, it prompted HP's chair wo...
Tuesday, September 05, 2006

Benefits of Open Source Intelligence - OSINT

›
Surprisingly, Forbes, the homepage for the world's business leaders -- and wannabe ones -- has a well written article on Open Source Int...
Monday, September 04, 2006

Stealth Satellites Developments Source Book

›
You can't hijack, intercept or hide from what you don't see or don't know it's there, and stealthy satellites are going to ...

Zero Day Initiative Upcoming Zero Day Vulnerabilities

›
Details on a dozen of " upcoming zero day vulnerabilities " are emerging from TippingPoint's Zero Day Initiative : " Ove...
Sunday, September 03, 2006

Chinese Hackers Attacking U.S Department of Defense Networks

›
This may prove to be an informative forum , and I feel that the quality of the questions and the discussion faciliator's insights in the...
Saturday, September 02, 2006

The Biggest Military Hacks of All Time

›
The biggest military hack of all time, the Pentagon hacker , the NASA hacker - hold your breath, it's another media hype or traffic ac...

The Walls and Lamps are Listening

›
And so are the hardware implanted "covert operatives".
Monday, August 28, 2006

Cyber War Strategies and Tactics

›
Starting from the basic premise that " All warfare is based on deception ", the Cyberspace offers an unprecedented amount of asymm...
Sunday, August 27, 2006

Bed Time Reading - Spying on the Bomb

›
Continuing the Bed Time Reading series , and a previous post related to India's Espionage Leaks , this book is a great retrospective on ...
Saturday, August 26, 2006

Steganography and Cyber Terrorism Communications

›
Following my previous post on Cyber Terrorism Communications and Propaganda , I'm continuing to summarize interesting findings on the to...

Microsoft's OneCare Penetration Pricing Strategy

›
In a previous post, Microsoft in the Information Security Market , I commented on Microsoft's most recent move into the information secu...

Futuristic Warfare Technologies

›
The future of warfare will definitely have to do with technologies and convergence, at least the near one. Some logical developments such as...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.