Dancho Danchev's Blog - Mind Streams of Information Security Knowledge

Email: dancho.danchev@hush.com Bitcoin Donate: bc1qncspyks7uwdkyyxzxzp6zjgqlrwm3er3q88dju TOX ID: 53B409440A6DC34F1BA458869A0462D92C15B467AF6319D481CA353690C88667833A0EE82969

Monday, December 11, 2006

Analysis of the Technical Mujahid - Issue One

›
An OSINT conducted, a tax payer's buck saved somewhere. Last week, the mainstream media was abuzz with the release of the firs...

Analysis of the Technical Mujahid - Issue One

›
An OSINT conducted, a tax payer's buck saved somewhere. Last week, the mainstream media was abuzz with the release of the first jiha...
Sunday, December 10, 2006

Full List of Hezbollah's Internet Sites

›
Some of the propaganda is so catchy it can easily compete with the Soviet propaganda posters during the Cold War visualizing the evil forc...

Digital Terrorism and Hate 2006 CD-ROM

›
In some of my previous investigative posts " Tracking Down Internet Terrorist Propaganda ", " Arabic Extremist Group Forum Me...

Current State of Internet Jihad

›
Very good article on various geopolitical issues related to the Middle East vs the West, and most importantly an overview of the current sta...

Full List of Hezbollah's Internet Sites

›
Some of the propaganda is so catchy it can easily compete with the Soviet propaganda posters during the Cold War visualizing the evil for...

Digital Terrorism and Hate 2006 CD-ROM

›
In some of my previous investigative posts " Tracking Down Internet Terrorist Propaganda ", " Arabic Extremist Group Forum M...

Current State of Internet Jihad

›
Very good article on various geopolitical issues related to the Middle East vs the West, and most importantly an overview of the current ...
Friday, December 08, 2006

Censoring Seductive Child Behaviour

›
define:seductive define:unaware define:immature define:maturing " Covert pedophilia in the Victorian society ". Is that a go...

Censoring Seductive Child Behaviour

›
define:seductive define:unaware define:immature define:maturing " Covert pedophilia in the Victorian society ". Is that a good lin...
Thursday, December 07, 2006

Symantec's Invisible Burglar Game

›
Cheers to Symantec's PR folks for coming up with such an entertaining promotion of Norton 360, so that " if everything gets too m...

Symantec's Invisible Burglar Game

›
Cheers to Symantec's PR folks for coming up with such an entertaining promotion of Norton 360, so that " if everything gets too mu...
Thursday, November 30, 2006

A Chart of Personal Data Security Breaches 2005-2006

›
Following my previous post on " Personal Data Security Breaches - 2000/2005 ", you may also find this " Chart of Security Bre...

A Movie About Trusted Computing

›
Great opinionated introduction to the topic . Trusted computing isn't the panacea of total security simply because there can never be 1...
Wednesday, November 29, 2006

CIA Personality Quiz

›
An impressive mastermind is what I got as a type of personality, quite a bit of suspicious flattery isn't it? I feel the quiz is more o...

Video of Birds Attacking an Unmanned Aerial Vehicle (UAV)

›
Mother Nature on the basics of asymmetric warfare : " However, on one flight, a test Raven attracted the attention of two nearby crows...
Monday, November 27, 2006

How to Fake Fingerprints

›
With all the buzz of fingerprinting this and that , fingerprint these instructions on how copy and fake fingerprints : " In order to ...

Global Map of Security Incidents and Terrorist Events

›
Outstanding project demonstrating the benefits of open source intelligence positioned on Google Maps while providing you with the very lat...

To Publish a Privacy Policy or Not to Publish a Privacy Policy

›
Here's an article arguing that " publishing a privacy statement may be more harmful than not publishing one "only if enforceme...

How to Tell if Someone's Lying to You

›
Interactive slideshow providing ten tips on how to tell if someone's lying to you. These can of course be interpreted in different ways...
‹
›
Home
View web version

About Me

My photo
Dancho Danchev
Independent Security Consultancy, Threat Intelligence Analysis (OSINT/Cyber Counter Intelligence) and Competitive Intelligence research on demand. Insightful, unbiased, and client-tailored assessments, neatly communicated in the form of interactive reports - because anticipating the emerging threatscape is what shapes the big picture at the end of the day. Approach me at dancho.danchev@hush.com
View my complete profile
Powered by Blogger.