January 31, 2023 Articles The Info OpDeterrence in Space Deterrence doesn’t work in any domain that isn’t existential in my opinion. The US kept bombing groups in Syria and Iraq to deter Iran from launching attacks at US troops. It singularly failed to stop the attacks. (The threat of war with the US is existential and so they didn’t escalate…Read more2 months ago · 4 likes · the grugq The Info OpLearn from LockBit’s Leaked LogsLockBit leaked logs of the negotiations with the Royal Mail These make for interesting reading. There are a bunch of techniques used by spies handling agents that show up here…Read more2 months ago · 5 likes · the grugq The Info OpNations without bordersRecently I was skimming the European Data Protection Supervisor’s 24/2022 Opinion on the Proposal for a Regulation establishing a common framework for media services in the internal market (European Media Freedom Act) and amending Directive 2010/13/EU…Read more3 months ago · 5 likes · the grugq The Info OpSpying through gamingRead more3 months ago · 7 likes · 1 comment · the grugq The Info OpWill hackers defeat time trackers?This case of a woman who slacked off, got fired, and then sued for wrongful dismissal is pretty interesting. She lost because the audit software monitoring her work on her laptop revealed that She billed for files she didn’t work on, billed for 50 hours of work she didn’t do, And…Read more3 months ago · 5 likes · the grugq The Info OpI refuse to bow to our AI overlordsThere’s been a lot of commentary by security nerds about how ChatGPT et alia ( GPT chat services ) are cause for concern and raising the threat level for everyone. I disagree and believe this reactionary pattern of assuming that any new technological capabilities should raise defense conditions is rooted in ignorance, arrogance, or predation. Same old I…Read more3 months ago · 9 likes · 1 comment · cR0w The Info OpAI masks for online criminals?Apps that can edit video streams and change a face to be unrecognisable already exist. What are the use cases for privacy, security, and maliciousness? A few years ago, in 2019, there was a huge uproar in China when a young woman vlogger glitched out and was revealed as a much older woman…Read more3 months ago · 4 likes · the grugq The Info OpLocal news to big pictureSending holiday greetz to all! I just wanted to shoot out a quick post on an observation I made while doing research. I’ve been looking a little bit at a Ukrainian newspaper that serves transcarpathia — the region of Ukraine that borders Hungary and Romania…Read more4 months ago · 3 likes · the grugq The Info OpCyber. Terrorism. Cyber terrorism.Recently, Danny Moore asked a question about cyber terrorism. His post, and the discussion, is on Mastodon here: https://infosec.exchange/@danny/109422030713833568 The question is: has anyone seen an actual successful attack that could unequivocally be called “cyber terrorism…Read more4 months ago · 7 likes · 3 comments · the grugq The Info OpRussian 0day thirst trapsLast month a Russian exploit company increased their price offer for Signal RCE exploits to three times the Zerodium rate. What, if anything, does this mean? Read on to find out. Attempts to read the tea leaves of public 0day pricing are mostly speculation. That said, I hope I can provide some informed speculation. The change in pricing is an indicator of something, but what…Read more5 months ago · 16 likes · the grugq The Info OpA cool story, buried beneath bollockshttps://www.c4isrnet.com/battlefield-tech/2022/10/17/how-ukraine-learned-to-cloak-its-drones-from-russian-surveillance/ This article is misleading. It paints a picture of China and Russia colluding to make drones vulnerable to tracking technology. DJI’s AeroScope tool…Read more5 months ago · the grugq The Info OpVarious Vignettes I’ve a couple items I want to expand on a bit, but not necessarily develop at length. Hopefully these short expanded thoughts will be interesting…Read more6 months ago · 6 likes · the grugq The Info OpThe Danger of DashboardsRead more7 months ago · 5 likes · the grugq The Info OpOSINT natives vs ACABCase Study: Bad Cops Expose The BBC has an interesting OSINT operation. There are two related investigations. The first involves a group of women doing old-fashioned gumshoe work, running down every clue using leaked databases and the internet. The second has the BBC applying a combination of traditional public records OSINT and modern face recognition software…Read more7 months ago · 4 likes · the grugq The Info OpAlbanian cyber warFor all the disappointment over the lack of spectacular cyber warfare in Ukraine, there's very little interest in the "textbook cyberwar" scenarios unfolding around Iran. Albania has just severed diplomatic ties with Iran over the cyber attacks of July 15th. The Prime Minister announced this in a dramatic fashion with strong language. Iran is embroiled …Read more7 months ago · 12 likes · 1 comment · the grugq The Info OpDeviant Organisational PsychologyI recently learned about organisational psychology, and from there about deviant organisational behavior. It is quite cool. As I was reading it I immediately saw the links to a Perun video on corruption in the Russian army. The Russian army has suffered significantly from corruption. The corruption they face is something covered by organizational psychology as organization deviance. Organization deviance includes “counterproductive work behavior” (CWB), outlined in this white paper. Of the four listed causes for CWB, the Russian army has at least three of them…Read more7 months ago · 4 likes · the grugq The Info OpQuantified Failure Data Driven Intelligence When planning regime change it is useful to know a bit about the target country’s population. How will they feel about the invasion force? What do they think about their leaders? Are they highly motivated extremists? To uncover the answers to these questions requires intelligence collection and analysis…Read more10 months ago · 5 likes · the grugq The Info OpUserland Rootkits are LameMany people may not know this, but fifteen…twenty years ago I knew a thing or two about rootkit development. I wrote detection software for a few years as well. Back then modifying the shared libraries on the disk was also vector for userland rootkits…Read more10 months ago · 7 likes · the grugq The Info OpFoghorn: Signals Through the Fog of WarUkraine Survives and Thrives Russia’s first wave of destructive cyber effects operations against Ukraine were effective. They targeted and disabled Ukrainian air defense systems, government ministries, and the national command and control infrastructure built over VIASAT. These successful operations were accomplished even though Russia’s military intell…Read morea year ago · 7 likes · 2 comments · the grugq The Info OpPutin’s cyber blind spotA common question about the lacklustre Russian cyberwar so far is, why hasn’t Putin unleashed the ransomware gangs? Why isn’t there a massive wave of ransomware across Europe and America? There are two related issues here that need to be addressed on Putin and ransomware: (1) why would he? (2) why hasn’t he? This post will address the second “why he has…Read morea year ago · the grugq Don't miss what's next. Subscribe to the grugq's newsletter: Email address (required) Subscribe Add a comment: Comment and Subscribe Share this email: Share on Twitter Share on Hacker News Share via email Share on Mastodon Share on Bluesky
Add a comment: