Blog Posts Tagged with "OpSec"

94ae16c30d35ee7345f3235dfb11113c

OPSEC: Is the Juice Worth the Squeeze?

September 06, 2012 Added by:Joel Harding

In the cyber world there is a process called IGL or Intelligence Gain-Loss. Sometimes deploying a new tool would disclose a capability that the US has to gather intelligence, but sometimes the gain outweighs the loss of a source. Ya gotta ask is the juice worth the squeeze?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

On Project Viglio

August 21, 2012 Added by:Infosec Island Admin

A group such as this, extra-legal as they seem to be and rather deliberately evasive using the rubric of “secrecy” as their cloak should set all of your spidey senses off. At best they are a group of people seeking to do good, but in fact may be doing ill by carrying out poor OSINT...

Comments  (30)

Bd623fa766512fdf6b57db66f522b741

About Antivirus, Security Awareness, Security Usability...

July 21, 2012 Added by:Ali-Reza Anghaie

No matter how many times it's warned against, most Security professionals use themselves and their contemporaries as the basis for what's "right". And as security becomes higher profile with more incidents it really starts looking like instead of having cynical contempt for the users, it's more like plain excuses...

Comments  (0)

94ae16c30d35ee7345f3235dfb11113c

Stuxnet: Classified Disclosures for Political Gain

June 04, 2012 Added by:Joel Harding

Operations Security or OPSEC is strictly enforced in the military, this is one of the basic tenets of Information Operations. We have had problems with Senators and Congressmen in the past disclosing classified information when doing so suited their purpose. Now the President has become the “Discloser in Chief”...

Comments  (8)

94ae16c30d35ee7345f3235dfb11113c

Information Warfare and Cyberspace

May 30, 2012 Added by:Joel Harding

Why do I keep running into the phrase Information Warfare? If the discussion is about cyber and warfare in cyberspace, why use the phrase Information Warfare? Has cyber ‘anything’ become so overused that we need to resort to using a much broader term to interest people in a cybersecurity discussion?

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

You’ve Been Phished Without an Email or a PDF

March 12, 2012 Added by:Infosec Island Admin

It seems that someone is making a full sized driftnet for information on those who would like to sign up as well as discuss the INSCOM Cyber Brigade. On the surface like I said, this looks all well and good, but once you start to poke at it though, you get some strange answers...

Comments  (16)

7fef78c47060974e0b8392e305f0daf0

Sabu: The Latter Day Joey Pardella - Oh There Will be Lulz!

March 11, 2012 Added by:Infosec Island Admin

As the press is now digging into his past and finding all the fidly bits about Sabu, they turned up a big one in the fact that Monsegur attended Stuyvesant High in NYC, which is the very same high school where they filmed the cult hacker hit “Hackers” back in 1995. Smirk...

Comments  (1)

68b48711426f3b082ab24e5746a66b36

FBI Bitten by Operational Security

February 13, 2012 Added by:Fergal Glynn

Employees forward confidential calendar events and messages to personal calendars and personal email accounts. This may make their jobs easier but it can put their companies at risk. A recent security incident involving the FBI can teach us something about corporate security...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Game Theory, Anonymous Causality, and 2012

February 05, 2012 Added by:Infosec Island Admin

Over the last year we have seen an evolution within Anonymous and its various movements. The latest being the AntiSec movement, the more cohesive core of Anonymous, one that has a set group of leaders at its center, leaders with an agenda... Anarchy....

Comments  (4)

0ff0a77035f9569943049ed3e980bb0d

Cyber Shafarat 2012: Cyber Warfare, OpSec and Intelligence

January 30, 2012 Added by:

Cyber criminals, nation-states, hacktivists and other adversaries have different approaches to circumventing cyber defenses. They execute sometimes sophisticated, sometimes simple-minded attacks designed to use and exploit threat vectors as required to accomplish the task...

Comments  (0)

0ff0a77035f9569943049ed3e980bb0d

Roadmap to Exploitation: The OIG Imperative to Publish or Perish

January 23, 2012 Added by:

The majority of OIG organizations publish highly sensitive information as if they were assisting the agency. Just the opposite. They are ensuring a more rapid penetration of cyber defenses. Whose side of the equation here are you on? Why does this need to be public information?

Comments  (9)

7fef78c47060974e0b8392e305f0daf0

OpCARTEL: Hubris and Blood

November 04, 2011 Added by:Infosec Island Admin

Let me once again talk about Pablo Escobar it took some serious special operators from the US to go down to Columbia and hunt him down. Not geeks behind computers with little bits of data, no, it took guys with guns who were battle seasoned to get Pablo, and he was just as nuts as these guys in Zeta...

Comments  (4)

7fef78c47060974e0b8392e305f0daf0

OpCARTEL: Kids, Trust Me... You are Not Up to This

November 03, 2011 Added by:Infosec Island Admin

This is not an episode of Miami Vice, kids. YOU do not have a nickel plate .45, slip on shoes, and pastel shirts. This is reality and you are more than likely to run up against blackhats who will find you and one by one, these guys will hunt you down...

Comments  (7)

7fef78c47060974e0b8392e305f0daf0

A Primer on Situational Awareness

September 19, 2011 Added by:Infosec Island Admin

Situational Awareness is a part of OPSEC, in fact, I would dare to say that it is the basic core of OPSEC. If you don’t know the variables of danger in your environment and you are not paying attention, then, well you get hacked in IT and in real life situations, you get dead potentially...

Comments  (0)