Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Tuesday, October 17, 2006

Registered Sex Offenders on MySpace

›
Should you be filtering online predators, prosecuting them, or monitoring their activities to analyze and model the behaviour of the rest o...
Monday, October 16, 2006

CIA's In-Q-Tel Investments Portfolio

›
In a previous post " Aha, a Backdoor! " I discussed the "exemption" of publicly traded companies from reporting to the S...

Observing and Analyzing Botnets

›
Informative and rich on visual materials, research presenting a " A Multifaceted Approach to Understanding the Botnet Phenomenon "...
Sunday, October 15, 2006

North Korea's Wake-up Call

›
"Hey Dick, do you know what time it is? It's Time to Bomb Kim Jong! "
Saturday, October 14, 2006

Hunting the Hacker - Documentary

›
Here's a recently released documentary -- in Russian -- entitled " Охота на хакера ", or Hunting the Hacker, discussing IT sec...
Thursday, October 12, 2006

The Return on Investment of Blogging

›
What's the return on investment (ROI) of blogging? Blogging for dollars is happening already, whereas this great post by Charlene Li e...

North Korea's Nuclear Testing Roundup

›
Way too much is happening right now, so here's are some of the articles, imagery and comments that made me an impression recently. Go th...

The History and Future of U.S. Military Satellite Communication Systems

›
Resourceful and visually rich retrospective on the developments related to the U.S. Military Satellite Communication Systems : " Satel...

China Targeting U.S Satellite - Laser Ranging or Demonstration of Power?

›
In previous posts " Is a Space Warfare Arms Race Really Coming? ," Weaponizing Space and the Emerging Space Warfare Arms Race ...

Luxury Vehicles on Demand

›
Sharing luxury vehicles among club members who got bored of their Rolls Royce and want to experiment? Propositions like these are rather co...

The Insider's Guide to Georgia-Russia Espionage Case

›
An informative FAQ on the most recent nation-2-nation espionage case, David vs Goliath aka Georgia's counter-intelligence services spot...

Automated SEO Spam Generation

›
In a previous post " An Over-performing Spammer " I commented an impossible to both, read and detect scam message -- loading remot...
Thursday, October 05, 2006

SCADA Security Incidents and Critical Infrastructure Insecurities

›
A decent article on the topic of the most hyped cyberterrorism threat of them all - direct attack on the critical infrastrcture of a count...

Terrorist Letters and Internet Intentions

›
A juicy recently de-classified letter to Zarqawi courtesy of the Combating Terrorism Center , reveals possible intentions for Internet base...

Filtering "Good Girls" and IM Threats

›
Respecting your kids' right to privacy while wanting to ensure you're aware of the type of people they IM with? Consider a recently ...
Wednesday, October 04, 2006

Mark Hurd on HP's Surveillance and Disinformation

›
Straight from the source - HP's CEO, one that compared to Fiorina's qualitative approaches decided to shift the company's strat...
Thursday, September 28, 2006

Government Data Mining Programs - Interactive

›
A very extensive visualization of various U.S government data mining programs : " Individually, each piece of information gives only a...

Satellite Imagery of Secret or Sensitive Locations

›
Continuing the Travel Without Moving Series , and a previous post on Open Source North Korean IMINT Reloaded , this collection of Google Ear...

NSA Mind Control and PSYOPS

›
Basics of recruiting, interrogations, brainwashing and PSYOPS on the foundations of Visual Hallucinations, Event-Triggered (conditional) I...

Anti-Counterfeiting Technologies

›
Handy overview of various anti-counterfeiting technologies and where they're primarily used at, such as Holograms, Optically variable i...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.