Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Wednesday, November 29, 2006

CIA Personality Quiz

›
An impressive mastermind is what I got as a type of personality, quite a bit of suspicious flattery isn't it? I feel the quiz is more o...

Video of Birds Attacking an Unmanned Aerial Vehicle (UAV)

›
Mother Nature on the basics of asymmetric warfare : " However, on one flight, a test Raven attracted the attention of two nearby crows...
Monday, November 27, 2006

How to Fake Fingerprints

›
With all the buzz of fingerprinting this and that , fingerprint these instructions on how copy and fake fingerprints : " In order to ...

Global Map of Security Incidents and Terrorist Events

›
Outstanding project demonstrating the benefits of open source intelligence positioned on Google Maps while providing you with the very lat...

To Publish a Privacy Policy or Not to Publish a Privacy Policy

›
Here's an article arguing that " publishing a privacy statement may be more harmful than not publishing one "only if enforceme...

How to Tell if Someone's Lying to You

›
Interactive slideshow providing ten tips on how to tell if someone's lying to you. These can of course be interpreted in different ways...
Monday, November 20, 2006

London's Police Experimenting with Head-Mounted Surveillance Cameras

›
Innovative , but a full scale violation of privacy -- what privacy with walking CCTVs nowadays?! " The world draws ever-closer to the ...
Tuesday, November 14, 2006

Widener University Forensics Course

›
Just noticed that the reading materials for the course are also listing my " Steganography and Cyber Terrorism Communications " p...

Satellite Imagery Trade-offs

›
Informative to know : " Eventually, Andersen said, the big but light telescopes could solve a spy-satellite conundrum. Now, those came...

U.S No-Fly-List Enforced at Deutsche Bank NYC

›
Apparently, the no-fly-list has been recently used as an access control measure at the Deutsche Bank's NYC's office according to t...
Monday, November 13, 2006

Jihadi PSYOPS - CIA Attacks on Terrorist Websites

›
Last week, the Internet Haganah reported on rumors around jihadist forums, namely, that the CIA has been attacking jihadi web sites . Now w...

Bill Gates on Traffic Acquisition and Internet Bubbles

›
Confused Bill Gates , but a regularly attacked one too. A rather predictable comment given he's not the only one selling the chewing gum...
Thursday, November 09, 2006

The Nuclear Grabber Toolkit

›
In case you're unaware of Nuclear Grabber's existence -- Babelfish it --WebSense commented on it in their latest " Security T...

All Your Electromagnetic Transmissions Are Belong To Us

›
This is worth mentioning , as while you try not to talk about these locations for as long as someone doesn't start blowing the whistle ...
Tuesday, November 07, 2006

The Blogosphere and Splogs

›
Just read Technorati's latest " State of the Blogosphere, October, 2006 " presented with in-depth visual stats on the 57 milli...
Friday, November 03, 2006

Delicious Information Warfare - Friday

›
Wish I could blog everything I read and makes me an impression but that's not the point. The point is to emphasize on the big picture, ...
Wednesday, November 01, 2006

FAS's Immune Attack Game

›
Professor Falken would have loved this one. The Federation of American Scientists recently released their report from the Summit on Educat...

Proof of Concept Symbian Malware Courtesy of the Academic World

›
Know your enemy to better predict his moves and future strategies as Symbian malware optimization is getting the necessary attention from ...
Monday, October 30, 2006

Fake Search Warrant Generator

›
In response to Christopher Soghoian's home raid -- the masked superhero by night -- a fake search warrant generator was just released...
Sunday, October 29, 2006

Greetings Professor Falken

›
The classic that originally started the war dialing generation seems to never fade, and its core idea of simulating a Global Thermonuclear ...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.