Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, September 28, 2006

Government Data Mining Programs - Interactive

›
A very extensive visualization of various U.S government data mining programs : " Individually, each piece of information gives only a...

Satellite Imagery of Secret or Sensitive Locations

›
Continuing the Travel Without Moving Series , and a previous post on Open Source North Korean IMINT Reloaded , this collection of Google Ear...

NSA Mind Control and PSYOPS

›
Basics of recruiting, interrogations, brainwashing and PSYOPS on the foundations of Visual Hallucinations, Event-Triggered (conditional) I...

Anti-Counterfeiting Technologies

›
Handy overview of various anti-counterfeiting technologies and where they're primarily used at, such as Holograms, Optically variable i...
Wednesday, September 27, 2006

Afterlife Data Privacy

›
Have you ever asked yourself what's going to happen with your digital data in case the worst happens, or most importantly, the pros and ...

Media Censorship in China - FAQ

›
Controversial to the generally accepted perspective that China's Internet censorship efforts are primarily a technological solution on...
Monday, September 25, 2006

Terrorism and Response 1990-2005

›
Very informative and objective retrospective on the response to terrorism from 1990 to 2005. The syllabus by Bruce D. Larkin and Ben Lozano...

Able Danger's Intelligence Unit Findings Rejected

›
The much hyped Able Danger Intelligence unit which has supposedly collected and identified information on the 9/11 terrorist attacks claim...

HP's Surveillance Methods

›
Seems like it's not just Board of Directors' Phone Records that were obtained by HP under the excuse of enforcing an exemplary corp...
Friday, September 22, 2006

Hezbollah's DNS Service Providers from 1998 to 2006

›
Nice visual representation trying to emphasize on the U.S hosting companies connection : " In the following, we examine the Hizballah ...

Interesting Anti-Phishing Projects

›
Seven anti-phishing projects , I especially find the browser recon and countermeasures one as a trendy concept, as phishers are already taki...

Airport Security Flash Game

›
Ever wanted to snoop through the luggage of others in exactly the same fashion yours gets searched through? Try this game , and make sure yo...

Soviet Propaganda Posters During the Cold War

›
Posters are a simple, yet influential form of PSYOPS , and their type of one-to-many communication method successfully achieves a decent vir...
Tuesday, September 19, 2006

Banking Trojan Defeating Virtual Keyboards

›
The folks behind VirusTotal , just released an analysis and an associated video of trojan generating video sessions of the infected end u...
Monday, September 18, 2006

Results of the Cyber Storm Exercise

›
The Cyber Storm exercise conducted in January " simulated a sophisticated cyber attack campaign through a series of scenarios directe...

Examining Internet Privacy Policies

›
Accountability, public commitment, or copywriters charging per word, privacy policies are often taken for fully enforced ones, whereas the t...

Cyber Intelligence - CYBERINT

›
HUMINT , SIGINT , TECHINT , all concepts for gathering intelligence and supporting decision makers on emerging trends are invaluable by thei...

Leaked Unmanned Aerial Vehicle Photo of Taliban Militants

›
Missed shot from a predator drone due to moral concerns, remarkable move and one visionary enought not to provoke another media fiasco of ki...
Thursday, September 14, 2006

Internet PSYOPS - Psychological Operations

›
Psychological operations or PSYOPS is an indirect use of information warfare methods to deceive, shape and influence the behavior and att...
Wednesday, September 13, 2006

Prosecuting Defectors and Appointing Insiders

›
In the year 2006, those who control Russia's energy reserves control a huge portion of the world's energy market -- renewable energy...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.