Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Securing the Campaign by Ben Hagen

Ben Hagen, an acclaimed security consultant from the US who ran Application Security for the Obama re-election campaign, delivers a talk at the 29th Chaos Communication Congress event to share his insider’s view of the recent Presidential Election campaigns from a security perspective. Hello everybody!...

Open Source Intelligence 6: Data Validation

Winding up with his keynote at Hacktivity event, Jeff Bardin provides tips on validating the collected data and provides a general summary on the topic. Another thing I’m going to mention is that you need to validate your sources. This can be kind of difficult. Sometimes you find that everybody’s saying...

Open Source Intelligence 5: The Applicable Tools

This section of Jeff Bardin’s presentation is about using some of the open source tools out there to look up different types of data on the adversaries. So, now that you’ve got your sock puppet created, you’ve got your anonymity in place, you’ve got your cultural, social, political background and...

Open Source Intelligence 4: Know Your Adversary

Jeff Bardin is now clarifying the different aspects that need to be thoroughly studied about the adversary, including historical, cultural, and religious ones. I mentioned earlier the historical, linguistic, cultural, political types of aspects. It really pays to know your target inside and out. Sun Tzu said...

Open Source Intelligence 3: Retrieving the Target’s Online Activity Traces

Based on his actual engagements, Jeff Bardin clarifies some methods for looking up online mentions of a target and recommends a couple of tools for doing that. When I first started doing this, this is an example of some of the things out there that I’ve done. One of the targets I was after was Anwar...

Open Source Intelligence 2: Creating and Validating a Sock Puppet

Getting to the core of the subject matter, Jeff Bardin describes the process of creating personas and making those as trustworthy as possible for optimal assimilation with the adversaries. When you create a sock puppet, if you’re having a hard time with this, you can go to fakenamegenerator.com and start...

Open Source Intelligence by Jeff Bardin

Jeff Bardin, the prominent cyber security professional and consultant with enormous background in intelligence, risk management and information security, shares his expertise at Hacktivity conference, delving into the methods and tools for open source cyber intelligence. Conference Host: It’s my honor to...

Hackers in Government 6: Questions and Answers

In the final part of the keynote, Nick Farr gets to provide answers to some relevant questions on the subject matter from the audience at SIGINT. I suggest that we start a little bit of a discussion now, so I’m glad or take some questions. Question: That all sounds extremely interesting; the only...

Hackers in Government 5: Addressing the Economic and Climate Change Problems

The issues Nick Farr is dissecting here have to do with economics and environmental protection in the context of how hackers would most likely address them. Economics: Current Problems and Possible Solutions Now we’re getting to another point – economics. The greatest period of economic growth in...

Hackers in Government 4: Discretionary Spending That Produces No Value

Herein Nick Farr makes an insight into key traits of the current defense spending in the US, putting accent on what could be changed to raise its expediency. I guess politicians are the most brown-nosing, trying to find a way to not kiss a certain part of the anatomy, but that’s fundamentally what...