Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Thursday, October 05, 2006

SCADA Security Incidents and Critical Infrastructure Insecurities

›
A decent article on the topic of the most hyped cyberterrorism threat of them all - direct attack on the critical infrastrcture of a count...

Terrorist Letters and Internet Intentions

›
A juicy recently de-classified letter to Zarqawi courtesy of the Combating Terrorism Center , reveals possible intentions for Internet base...

Filtering "Good Girls" and IM Threats

›
Respecting your kids' right to privacy while wanting to ensure you're aware of the type of people they IM with? Consider a recently ...
Wednesday, October 04, 2006

Mark Hurd on HP's Surveillance and Disinformation

›
Straight from the source - HP's CEO, one that compared to Fiorina's qualitative approaches decided to shift the company's strat...
Thursday, September 28, 2006

Government Data Mining Programs - Interactive

›
A very extensive visualization of various U.S government data mining programs : " Individually, each piece of information gives only a...

Satellite Imagery of Secret or Sensitive Locations

›
Continuing the Travel Without Moving Series , and a previous post on Open Source North Korean IMINT Reloaded , this collection of Google Ear...

NSA Mind Control and PSYOPS

›
Basics of recruiting, interrogations, brainwashing and PSYOPS on the foundations of Visual Hallucinations, Event-Triggered (conditional) I...

Anti-Counterfeiting Technologies

›
Handy overview of various anti-counterfeiting technologies and where they're primarily used at, such as Holograms, Optically variable i...
Wednesday, September 27, 2006

Afterlife Data Privacy

›
Have you ever asked yourself what's going to happen with your digital data in case the worst happens, or most importantly, the pros and ...

Media Censorship in China - FAQ

›
Controversial to the generally accepted perspective that China's Internet censorship efforts are primarily a technological solution on...
Monday, September 25, 2006

Terrorism and Response 1990-2005

›
Very informative and objective retrospective on the response to terrorism from 1990 to 2005. The syllabus by Bruce D. Larkin and Ben Lozano...

Able Danger's Intelligence Unit Findings Rejected

›
The much hyped Able Danger Intelligence unit which has supposedly collected and identified information on the 9/11 terrorist attacks claim...

HP's Surveillance Methods

›
Seems like it's not just Board of Directors' Phone Records that were obtained by HP under the excuse of enforcing an exemplary corp...
Friday, September 22, 2006

Hezbollah's DNS Service Providers from 1998 to 2006

›
Nice visual representation trying to emphasize on the U.S hosting companies connection : " In the following, we examine the Hizballah ...

Interesting Anti-Phishing Projects

›
Seven anti-phishing projects , I especially find the browser recon and countermeasures one as a trendy concept, as phishers are already taki...

Airport Security Flash Game

›
Ever wanted to snoop through the luggage of others in exactly the same fashion yours gets searched through? Try this game , and make sure yo...

Soviet Propaganda Posters During the Cold War

›
Posters are a simple, yet influential form of PSYOPS , and their type of one-to-many communication method successfully achieves a decent vir...
Tuesday, September 19, 2006

Banking Trojan Defeating Virtual Keyboards

›
The folks behind VirusTotal , just released an analysis and an associated video of trojan generating video sessions of the infected end u...
Monday, September 18, 2006

Results of the Cyber Storm Exercise

›
The Cyber Storm exercise conducted in January " simulated a sophisticated cyber attack campaign through a series of scenarios directe...

Examining Internet Privacy Policies

›
Accountability, public commitment, or copywriters charging per word, privacy policies are often taken for fully enforced ones, whereas the t...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.