theosintjournal.blogspot.com
The OSINT Journal: Air Force continues to work with DOD, OPM on cybersecurity incident
http://theosintjournal.blogspot.com/2015/07/air-force-continues-to-work-with-dod.html
July 24, 2015. Air Force continues to work with DOD, OPM on cybersecurity incident. Posted 7/23/2015 Updated 7/22/2015. Secretary of the Air Force Public Affairs Command Information. 7/23/2015 - WASHINGTON (AFNS). The Air Force maintains its commitment to protect personal information from cyber threats by continuing efforts with the Defense Department and the Office of Personnel Management to assist those impacted by the recent cyber incident involving federal background investigation data. While backgro...
theosintjournal.blogspot.com
The OSINT Journal: Hacking Team hit by breach; leak suggests it sold spyware to oppressive regimes
http://theosintjournal.blogspot.com/2015/07/hacking-team-hit-by-breach-leak.html
July 07, 2015. Hacking Team hit by breach; leak suggests it sold spyware to oppressive regimes. The elusive Italian spyware. And hacking tool provider - particularly for law enforcement - had its corporate insides revealed over the weekend. July 6, 2015 - 04:07 GMT (05:07 BST). About 400GB worth of data was stolen by hackers. Even hackers can get hacked. After apparently taking over its Twitter account. The administrative innards of the Milan, Italy. The Italian company makes surveillance technology.
theosintjournal.blogspot.com
The OSINT Journal: Publications
http://theosintjournal.blogspot.com/p/publications.html
What Are The Core Principles of Collaboration? Http:/ www.scribd.com/doc/77719733/What-Are-The-Core-Principles-of-Collaboration. The notion of how we collaborate has been one that whilst often discussed has never really been nailed down. Game theory offers up the basic tit-for-tat. Principle whereby we collaborate until the other party proves themselves untrustworthy, at which point collaboration breaks down. Subscribe to: Posts (Atom). There was an error in this gadget. Financial Action Task Force (OECD).
theosintjournal.blogspot.com
The OSINT Journal: Multimedia
http://theosintjournal.blogspot.com/p/multimedia-video.html
A History of Hacktivism [INFOGRAPHIC]. Hacktivism has hit its tipping point. The year 2011 had the most hacktivism-related crimes in history. Hacktivists use digital tools to breach security systems to protest or take a stand on political issues. The New Age hacker is motivated by the pursuit of justice, and is often hard to stop. On Tuesday, Shawn Henry, an FBI agent. Who will soon leave his post, told the Wall Street Journal. Cyber criminals are too powerful. Verzion Data Breach Investigation. The firs...
secret-bases.co.uk
Secret Bases Part 1 • WWW.SECRET-BASES.CO.UK
http://www.secret-bases.co.uk/secret.htm
An entertaining guide to using. OS maps, aerial photos and Google Earth. To reveal the UK's hidden. MoD facilities and military sites. Featuring covert spy bases,. Underground bunkers and more. The website that caused. But with a Twist in the Tale. Please scroll down fully for all the contents. As featured in the. PART 1 OF 5. Underground and yet still visible. On (some) aerial photos. Spooks by the Sea. Aerial view of IONEC. The many heads of. SOCA – the British FBI. Serious Organised Crime Agency.
theosintjournal.blogspot.com
The OSINT Journal: Hacked Opinions: Vulnerability disclosure – Ryan Smith
http://theosintjournal.blogspot.com/2015/07/hacked-opinions-vulnerability.html
July 08, 2015. Hacked Opinions: Vulnerability disclosure – Ryan Smith. Accuvant's Ryan Smith talks about disclosure, bounty programs, and vulnerability marketing. Jun 29, 2015. Accuvant's Ryan Smith talks about disclosure, bounty programs, and vulnerability marketing with CSO, in the first of a series of topical discussions with industry leaders and experts. ALSO ON CSO: The things end users do that drive security teams crazy. Where do you stand: Full Disclosure. Or somewhere in the middle? Full disclosu...
theosintjournal.blogspot.com
The OSINT Journal: French Surveillance Law Implicates Internet Service Providers, Web Hosts
http://theosintjournal.blogspot.com/2015/07/french-surveillance-law-implicates.html
July 24, 2015. French Surveillance Law Implicates Internet Service Providers, Web Hosts. Friday, July 24 2015. Internet service providers in France will have to install black boxes that analyze users’ metadata and alert authorities of possible terrorist activity under the country’s sweeping surveillance bill, which the Constitutional Council approved on Thursday night. 8220;Last night’s decision clears the last hurdle for a law that will deal a major blow to human rights in France. The surveill...8220;Th...
theosintjournal.blogspot.com
The OSINT Journal: Ashley Madison Extortion Attack: Critical Lessons For Enterprise Cybersecurity
http://theosintjournal.blogspot.com/2015/07/ashley-madison-extortion-attack.html
July 24, 2015. Ashley Madison Extortion Attack: Critical Lessons For Enterprise Cybersecurity. Do you cheat on our spouse? Then chances are, you’re sweating bullets over the recent Ashley Madison hack. However, if you’re in enterprise IT, you should be as distressed as any cheater, regardless of how faithful to your other half you actually happen to be. Here are the facts: earlier this week, an anonymous group of hackers going by the name The Impact Team hacked the adultery website Ashley Madison. Lookin...
SOCIAL ENGAGEMENT