Threat Inteliigence / OSINT / NETSEC / NATSEC

China's intelligence operations under the scrutiny of the Justice Department

The name of the blog obliges us, therefore, this time we deal with the latest events in the field of catching intelligence officers and fighting the operations they conduct. The opportunity for this was provided by the US Department of Justice, publishing indictments against a total of thirteen people accused of espionage, as well as Mandiant who published a report describing the detected Chinese outflow operations. IN […]

MPS - Ministry of Public Security of China and cyber policy

We have already dealt with the military and civilian face of Chinese intelligence in the context of cyber operations. This time we will look at a service focused on more internal activities - the Ministry of Public Security. This organization was established in 1949 as a successor to the Central Department of Social Affairs. Functionally, its assumption was to ensure the overall internal security of China - from [...]

Keyboard strike - cyber anti-terrorist operations

In the previous post, we looked at how terrorist groups use social media to support their activities, and this time we will look at how the intelligence and military services can use the Internet to carry out anti-terrorist activities. As I indicated previously, terrorism is prosecuted and fought with all the power of the state apparatus, including in [...]

When the DoJ publishes your photo - about indictments and cyber operations

Observing the practice of the US administration in the field of political tools applied to entities responsible for cyber operations against the States, indictments are one of the most visible elements. In recent years, we have seen, for example, indictments against a GRU officer, Chinese intelligence, or more recently FSB officials. On the surface, it may seem that such actions do not [...]

CyberPolice - REvil 1: 0 - on the risks of being a ransomware operator

Washington Post journalists published yesterday an article about the end of activities by the REvil group as a result of an action carried out by the American Cyber Command - the command of cyber forces. Curbing the actions of REvil is certainly good news for everyone - criminals are responsible, for example, for ransomware attacks on Kaseye or JBS and poisoned the lives of many [...]

en_USEnglish