The recent history of breaking into Uber or reappearing reports on Emotet's activity may raise questions about the legitimacy of individual functions in the overall security organization of the organization. After all, why advanced forensics teams to produce threat intelligence or threat hunting when the problem is underlying? This very much […]
French doctrine of cyber operations - influence operations
Information operations, impact operations or the so-called active measures are quite a specific aspect of cyber activities. It would seem that this is an issue completely separate from cyber espionage or sabotage. However, due to the great role played by the Internet, social media and other forms of digital communication, often [...]
France and its doctrine of cyber operations - offensive actions
The state's approach to activities in cyberspace is a river topic and a subject of discussion both on the political and academic level. It is all the more interesting how different countries develop their doctrines and face, for example, the problem of how to react to incidents, how to treat those whose source is criminal activity, and how [...]
I won a case about an undelivered 3060Ti from morele.net! (Update 8/24/2022: Received the money)
[Disclaimer: This post has nothing to do with threat intelligence, osint, opsecs, natsecami and other secs. I post it here only because counterintelligence.pl is my site, the content of which is fully controlled, so it's more convenient for me to describe the matter here than to post on any social networking sites.] TL; DR: I ordered a computer from morele.net (selected [... ]
Kent and Heuer - The roots of CTI in a traditional interview
The holiday season is good for catching up on books, so let's take a look at the subject at counterintelligence.pl, so let's call it a book-historical topic. It will be no secret that CTI is quite a fledgling field. Even if we look at the distance that separates information protection as such from information protection in the context of computer networks, threat intelligence will be an even younger discipline. […]
MPS - Ministry of Public Security of China and cyber policy
We have already dealt with the military and civilian face of Chinese intelligence in the context of cyber operations. This time we will look at a service focused on more internal activities - the Ministry of Public Security. This organization was established in 1949 as a successor to the Central Department of Social Affairs. Functionally, its assumption was to ensure the overall internal security of China - from [...]
MSS - Ministry of State Security and its cyber activities
In the previous post, we dealt with the intelligence activity of the People's Liberation Army and how the reforms of the armed forces are aimed at improving their functioning in this field. This time we will focus on an agency dealing with typically intelligence tasks - the Ministry of State Security (国家 安全 部, MSS). To begin with a brief historical outline, the modern organization of the MSS is [...]
PLA on the cyber front - Chinese armed forces and cyber operations
One of the biggest challenges of threat intelligence is determining the intent of attackers. It is not always possible, but if we have to face such a challenge, it is helpful to understand the context of attackers' activities and the organization in which they operate. So in the next posts we will look at one of the main players on the cyber scene - [...]
Keyboard strike - cyber anti-terrorist operations
In the previous post, we looked at how terrorist groups use social media to support their activities, and this time we will look at how the intelligence and military services can use the Internet to carry out anti-terrorist activities. As I indicated previously, terrorism is prosecuted and fought with all the power of the state apparatus, including in [...]
Jack Bauer on Facebook - terrorism and social media
When I started working in cybersecurity as a SOC analyst, I often looked at job offers in the industry in my spare time. Contrary to malicious comments, it was not caused by the will to change the employer as soon as possible, but rather by learning career paths and planning the direction of development. I remember that one of the ads that caught my attention a lot [...]