How an abused child was located and rescued using obscure clues A few years ago I wrote about the extreme security practices of the YardBird child abuse media trading group. The security rules they developed and, for the most part, followed enabled a significant portion of the group to evade capture even though they were thoroughly […]
Operational Security and the Real World
An important part of the OPSEC approach to security is implementing compartmentation to limit the damage of any one penetration or compromise. This is sometimes referred to as impact containment. By compartmenting your operations, the control center over your accounts, and the information available from any single persona source, you are limiting the impact of […]
Real Talk on Reality
Leaking is high risk On June 5th The Intercept released an article based on an anonymously leaked Top Secret NSA document. The article was about one aspect of the Russian cyber campaign against the 2016 US election — the targeting of election device manufacturers. The relevance of this aspect of the Russian operation is not exactly clear, but […]
- « Previous Page
- 1
- 2
- 3
- 4
- …
- 9
- Next Page »