Information operations, impact operations or the so-called active measures are quite a specific aspect of cyber activities. It would seem that this is an issue completely separate from cyber espionage or sabotage. However, due to the great role played by the Internet, social media and other forms of digital communication, often [...]
Month: August 2022
France and its doctrine of cyber operations - offensive actions
The state's approach to activities in cyberspace is a river topic and a subject of discussion both on the political and academic level. It is all the more interesting how different countries develop their doctrines and face, for example, the problem of how to react to incidents, how to treat those whose source is criminal activity, and how [...]
I won a case about an undelivered 3060Ti from morele.net! (Update 8/24/2022: Received the money)
[Disclaimer: This post has nothing to do with threat intelligence, osint, opsecs, natsecami and other secs. I post it here only because counterintelligence.pl is my site, the content of which is fully controlled, so it's more convenient for me to describe the matter here than to post on any social networking sites.] TL; DR: I ordered a computer from morele.net (selected [... ]
Kent and Heuer - The roots of CTI in a traditional interview
The holiday season is good for catching up on books, so let's take a look at the subject at counterintelligence.pl, so let's call it a book-historical topic. It will be no secret that CTI is quite a fledgling field. Even if we look at the distance that separates information protection as such from information protection in the context of computer networks, threat intelligence will be an even younger discipline. […]