Author Archives: Cyber Reconnaissance

Scrum Test Engineer

itjobpro.com - 124344BR Job Description: JOB SUMMARY: Raytheon Intelligence, Information and Services (IIS) is seeking a Testing Engineer to join our team in anticipation of supporting an upcoming Cyber program. Tr…


Tweeted by @scrum_jobs https://twitter.com/scrum_jobs/status/1073526278781714432

Rich Roth on LinkedIn: “Kevin Murray posted this, and like most of what he does, hits a very critical area of Espionage Law. One point I would add, is that everyone is concentrating on data and or cyber storage, the same is true of Paper files with employee information as well as business secrets. The business owner that collects them has a duty to protect them, and this has been true for years. Most human resources staff understand that paper files have the same legal requirement to protect the data, like Social Security numbers, or health files, and this is true of business secrets as well. If you do not take the effort to protect business secrets, they at times have been considered not secret anymore. This is the same of electronic data, if it is open on your web site for all to see, you will be hard put to claim anyone has stolen the data. In doing counter espionage surveys, one of the biggest culprits to letting secrets out, tends to be the Marketing staff. They often want to get the new product out there for the world to see, and give to much away or too soon. Counter Espionage sweeps are helpful, and at times needed, but Counter Espionage surveys can be what it really needed. Trash dumpsters are still one of the biggest and richest hauls for Espionage teams.”

linkedin.com - Kevin Murray posted this, and like most of what he does, hits a very critical area of Espionage Law. One point I would add, is that everyone is concentrating on data and or cyber storage, the same is…


Tweeted by @RichRoth1 https://twitter.com/RichRoth1/status/1073461054699683841

Iran’s European Hit Men

investigativeproject.org - The victim, Ahmad Mola Nissi, dies that night of his wounds – including several shots to the head. He leaves a family grieving, but not surprised; there have been threats against him for some time, a…

Deep State Daily: FBI Says Chinese Hacks Are ‘Severe’ Threat to National Security, Russian Agent Pleads Guilty to Conspiracy » Deep State Radio Network

deepstateradionetwork.com - Maria Butina, accused Russian agent, pleaded guilty to conspiracy charges of acting with a Russian official to infiltrate the US conservative movement on behalf of the Russian government. She has agr…


Tweeted by @deepstateradio https://twitter.com/deepstateradio/status/1073355134875377664

Smart City ICT Infrastructure Market Outlook and Opportunities in Grooming Regions : Edition 2018-2025 – Journal of Industry

industryjournal24.com - Global Smart City ICT Infrastructure Market 2018 by Manufacturers, Regions, Type and Application, Forecast to 2025 This report tracks the major market events including product launches, development t…


Tweeted by @MinSongX https://twitter.com/MinSongX/status/1073289797354078215

Cyber Deterrence: An Oxymoron for Years to Come

globalsecurityreview.com - Western states largely renounced the concepts of defense and deterrence after the end of the Cold War. Instead, Western powers focused on expeditionary warfare—military crisis management, counterterr…


Tweeted by @MuratTebatebai https://twitter.com/MuratTebatebai/status/1073251599915646978

Yannik Petry on LinkedIn: “From cyber espionage to energy dependency, forced technology transfers, and debt-dependency. In a globalized world of rising regional hegemons like China and Russia, Geoeconomics and its tool of economic coercion is playing an increasing role in executing geopolitical power through the back door. Center for Strategic and International Studies (CSIS) #security #politics #economics #geopolitics #russia #china #unitedstates “

linkedin.com - From cyber espionage to energy dependency, forced technology transfers, and debt-dependency. In a globalized world of rising regional hegemons like China and Russia, Geoeconomics and its tool of econ…


Tweeted by @YaPeGer https://twitter.com/YaPeGer/status/1073233287424983041

Soft skills still drive success in an increasingly data-driven world | Articles | Chief Human Resources Officer

channels.theinnovationenterprise.com - Data runs the modern enterprise – a trend we are only going to see grow exponentially. The digital economy is giving companies access to more information than ever before and simplifying the way busi…


Tweeted by @IE_RoyAsterley https://twitter.com/IE_RoyAsterley/status/1073225155948830720

Ransomware Protection

commvault.com - You need to ensure your data is always available in an increasingly complex environment. You're managing more endpoints and applications, with more potential points of attack and risk. You also may h…


Tweeted by @NigelTozer https://twitter.com/NigelTozer/status/1073171916964401152

The Dukes: 7 Years Of Russian Cyber-Espionage

labsblog.f-secure.com - Today we release a new whitepaper on an APT group commonly referred to as “the Dukes”. We believe that the Dukes are a well-resourced, highly dedicated, and organized cyber-espionage group that has b…


Tweeted by @Foltermaschine https://twitter.com/Foltermaschine/status/1073149048880881665

中国 国際航空博覧会でワイドボディ機を公開、露企業「恥知らずの盗用」

epochtimes.jp - 中国広東省珠海市で現在、第12回中国国際航空航天博覧会(珠海エアショー)が開催されている。博覧会では、世界40カ国の航空宇宙関連企業が参加し、多くの軍事武器が展示された。中国当局は、中国とロシアが共同開発した長距離ワイドボディ旅客機「CR929」の実物大模型を披露した。国内外から高い関心が寄せられた。 米ラジオ・フリー・アジアは7日、ロシアメディア「Взгляд」の報道を引用し、ロシア航空機関連…


Tweeted by @oyamakachoichoi https://twitter.com/oyamakachoichoi/status/1073132765929820160

Bytes, Bombs, and Spies

brookings.edu - Offensive cyber operations have become increasingly important elements of U.S. national security policy. From the deployment of Stuxnet to disrupt Iranian centrifuges to the possible use of cyber met…


Tweeted by @FSIStanford https://twitter.com/FSIStanford/status/1073072780630024192

McAfee report suggests hackers hitting global government and defense firms with cyber espionage campaign – Hackerpost

hackerpost.co - Hackers invaded many organizations around the globe with cutting edge malicious software that extracted data from their frameworks, as per McAfee. Research released by the cybersecurity firm on Wedne…


Tweeted by @HackerPost2 https://twitter.com/HackerPost2/status/1073050338096279552

Assessment of North Atlantic Treaty Organisation Forces in the Baltic States: Credible Deterrent or Paper Tiger?

divergentoptions.org - Mr. Callum Moore currently works for Intelligence Fusion, where he operates as an analyst focusing the Baltic States and Finland. Divergent Options’ content does not contain information of an officia…


Tweeted by @DivergentOption https://twitter.com/DivergentOption/status/1073029853576859648

CONFIDENTIAL – Public Library U.S. Diplomacy – ESTONIA CHARTS LEGAL, MILITARY FUTURE OF CYBER WARFARE (INCLUDING APPLICABILITY OF NATO’S ARTICLE V)

brazilopenermedia.blogspot.com - 1. (C) Summary and Comment: In the wake of the August cyber attacks against government websites in the Republic of Georgia, Estonia has provided both material and technical assistance to Tbilisi. Law…


Tweeted by @oan_max_ik https://twitter.com/oan_max_ik/status/1073012889873731590

Putin’s Spy Ring

frontpagemag.com - Russian espionage professionals never quit targeting America. And let’s just call them the KGB, as their specific name of the moment doesn’t really matter. They infiltrated American society and plant…


Tweeted by @Zero_Gov https://twitter.com/Zero_Gov/status/1073011487327678464

Augmented And Virtual Reality In Healthcare Market Report Disclosing Latest Trends and Clinical Advancement 2018 to 2025 – Journal of Industry

industryjournal24.com - Global Augmented And Virtual Reality In Healthcare Market 2018 by Manufacturers, Regions, Type and Application, Forecast to 2025 This report tracks the major market events including product launches,…


Tweeted by @cyberanimax https://twitter.com/cyberanimax/status/1073006287233957889

Pompeo says China hacked Marriott

politico.com - "Our effort, from Department of Homeland Security and the FBI and the State Department, is to push back against these threats to America from China," Secretary of State Mike Pompeo said Wednesday. | …


Tweeted by @BobCarter385761 https://twitter.com/BobCarter385761/status/1072964895338045440

McAfee: a coordinated cyber espionage campaign focused on defense organizations sent malware via targeted phishing messages to at least 87 firms in 24 countries

techmeme.com - Issie Lapowsky / @issielapowsky: I transcribed this whole exchange between Rep. Cicilline and Sundar Pichai on China, because Pichai's evasive responses are so, so telling. #googlehearing http://twit…


Tweeted by @netmobz https://twitter.com/netmobz/status/1072924977169604609

Political economy 101 for yellow vests

freecriticalthinking.org - A French translation would be very useful but my linguistic skills fall way short of doing this justice but if someone else can (or into any language), it would be much appreciated. We are ruled by f…


Tweeted by @FCriticalThink https://twitter.com/FCriticalThink/status/1072900746188898308

Cyber Forensic Analyst/Software Engineer

itjobpro.com - Job Description: KeyW is seeking a Cyber Forensic Analyst/Software Engineer to support technical counter intelligence work for an IC customer. The selected candidate will be part of a small team perf…


Tweeted by @python_IT_jobs https://twitter.com/python_IT_jobs/status/1072892607208972288

What is cyber warfare?

itpro.co.uk - Cyber warfare is a rather scary-sounding title that refers to the use of cyber technologies to launch a virtual war against countries, governments and citizens. Although it’s really just a name rathe…


Tweeted by @cloudsparkuk https://twitter.com/cloudsparkuk/status/1072883022175920128

Cyber Power and The Return of Major War

e-ir.info - In 1998, Michael Mandelbaum declared major war to be obsolete. “The great chess game of international politics is finished,” he announced, and the rising costs and falling gains of conflict have made…


Tweeted by @StephenPaduano https://twitter.com/StephenPaduano/status/1072852747320520704

New Trends Take Off in the Cybermarket

govtech.com - IRAN, desperate to boost revenue following the return of sanctions imposed by the United States, has encouraged its hackers to pursue ransomware attacks on individuals and organizations, according to…


Tweeted by @TrajectoryCaptl https://twitter.com/TrajectoryCaptl/status/1072848053772673025

Tallinn Manual – Wikipedia

en.wikipedia.org - The Tallinn Manual (originally entitled, Tallinn Manual on the International Law Applicable to Cyber Warfare) is an academic, non-binding study on how international law (in particular the jus ad bell…


Tweeted by @unmo300 https://twitter.com/unmo300/status/1072775345550577665

Trump administration to condemn China over hacking and economic espionage, escalating tensions between superpowers

washingtonpost.com - By Ellen Nakashima and Ellen Nakashima National security reporter Email Bio Follow David J. Lynch David J. Lynch Financial writer covering trade and globalization Email Bio Follow December 11 at 11:3…


Tweeted by @sam_vinograd https://twitter.com/sam_vinograd/status/1072543549089112064

中国当局、「千人計画」の情報削除を指示か 逮捕者続出で (大紀元時報 エポックタイムズ) – LINEアカウントメディア

news.line.me - 「私たち家族の経験してきたことは、言葉では言い表せるものではありません」。新潟県新潟市に住んでいた横田さん一家の長女めぐみさんは13歳の時、行方不明になった。のちに、北朝鮮による計画的な日本人拉致が明らかになった。2002年、5人が帰国したが、まだ多くの被害者は北朝鮮に残されたまま。「終わることのない苦しみ」。米政府系メディアVOAの取材に応じた、母親の横田早紀江さんはこう例えた。 「小さいころ…


Tweeted by @TLL_tokyo https://twitter.com/TLL_tokyo/status/1072513304118157313

U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage

justice.gov - A grand jury in the Western District of Pennsylvania (WDPA) indicted five Chinese military hackers for computer hacking, economic espionage and other offenses directed at six American victims in the …


Tweeted by @bonaponta https://twitter.com/bonaponta/status/1072494460687257600

31 Tech Predictions for 2019

inc.com - Predicting the future is hardly an exact science, but when you watch an industry closely it is possible to identify trends and chart a course for where things are likely headed. Here are predictions …


Tweeted by @CharlotteSweene https://twitter.com/CharlotteSweene/status/1072488737043562501

Parting Shots (Q4 2018 Issue)

infosecurity-magazine.com - According to statistics published in October, there are around three million vacancies in the cybersecurity industry. The research came from (ISC)² and of 1452 survey recipients, the highest gap is i…


Tweeted by @InfosecurityMag https://twitter.com/InfosecurityMag/status/1072474203809558529

Spafax CEO predicts 2019 will be the year of cyber warfare and military resources are likely to be deployed – IT Supply Chain

itsupplychain.com - Niall McBain, CEO of leading in-flight entertainment and passenger engagement company, Spafax, is predicting that the misuse of technology could take a dark turn in 2019, and is warning business lead…


Tweeted by @IT_SupplyChain https://twitter.com/IT_SupplyChain/status/1072450819654594560

Contact Center Outsourcing Market Growing Trends, Insights and Future Scope 2018 to 2025 – Journal of Industry

industryjournal24.com - The market report is well designed to provide an all-inclusive field of vision about the Global Contact Center Outsourcing Market in terms of various factors, such as recent trends, competitive lands…


Tweeted by @performatel https://twitter.com/performatel/status/1072403412376002562

The big picture of a criminal presidency

washingtonmonthly.com - It’s no coincidence that on the day Robert Mueller was scheduled to release memos to the court in anticipation of sentencing hearings for both Donald Trump’s personal lawyer Michael Cohen and his cam…


Tweeted by @ANTITRUMPMVMT https://twitter.com/ANTITRUMPMVMT/status/1072321854394687488

Russia’s Latin American Offensive

wsj.com - The West was alarmed when Russia escalated its conflict with Ukraine last month by seizing three Ukrainian navy vessels. Russia launched the attack despite a 2003 treaty allowing Ukrainian ships to p…


Tweeted by @Colombianicomio https://twitter.com/Colombianicomio/status/1072315855164321792

Pharmaceutical Industry – wilsoncgrp

wilsoncgrp.com - Regulatory compliance and information security has become critical in every facet of the pharmaceutical industry. The widespread use information technology and network applications make pharmaceutica…


Tweeted by @WilsonCGroupLLC https://twitter.com/WilsonCGroupLLC/status/1072291136088272896

Air Force Reserve

afreserve.com - Overview: The mission statement of the U.S. Air Force is to fly, fight and win...in air, space and cyberspace. The emerging 21st Century battleground is cyberspace; the computer networks and communic…


Tweeted by @AirForceReserve https://twitter.com/AirForceReserve/status/1072279830987751424