Blog Posts Tagged with "Counter-Intelligence"
October 17, 2012 Added by:Infosec Island Admin
I would like to clear the air here a bit on these terms and how they do really apply to the world of INFOSEC that we in this business now find ourselves in, one littered with military and spook terms that you may not be really familiar with. First off, lets look at the terms that have been thrown around here...
August 15, 2012 Added by:Matthijs R. Koot
The intent of deception is "to get the adversary to act confidently and predictably". If you want to be inspired to think about deception/MILDEC as means of counterintelligence (CI) in cyberspace. I recommend this book. If you already work in CI, you may find it useful to evaluate your existing beliefs...
November 15, 2011 Added by:Gabriel Bassett
Engineering is required to provide operations the tools they need. Intel is needed to provide operations information to act. Counter-intel is needed to help operations slow the loss of information. Only when all areas are working in concert for the common operational goal, is security realized...
November 03, 2011 Added by:Richard Thieme
The task of counterintelligence is to figure out what the other side is doing and how they are deceiving us. CI is predicated on double deceiving and triple deceiving the other side into believing fictions nested within fictions, always leavened with some facts, just enough to seem real...
June 20, 2011 Added by:Infosec Island Admin
In the case of LulzSec and Anonymous, they are using many types of systems to protect their anonymity. With the right tools and obfuscation techniques, they feel impervious to attacks, be it from law enforcement or the likes of The Jester. Tactically, they have the advantage in many ways...
New Zero-day in Microsoft OLE Being Exploite... Lisa Harris on 10-30-2014
What PCI Requirements Apply to Us: Tacking a... shahbaz ocpfsd1 on 10-29-2014
Today's Mobile Device Data Protection Must G... karna karn on 10-29-2014