Category identity management

How Russia Is Using LinkedIn As A Tool Of War Against Its U.S. Enemies

How Russia Is Using LinkedIn As A Tool Of War Against Its U.S. Enemies By Jeff Stein, www.newsweek.com View Original One night in mid-March, Alan Malcher, a British military veteran, dropped into the Queen’s Arms, a working-class pub in north London. He took a seat at the bar and ordered his customary pint of Foster’s. Within a […]

‘Is That Really You Typing?  New Pentagon Technology Will Know’; But, Beware Of Over-Reliance, Or over-Confidence In This Technique — Only The Digital Shadow…….Really Knows

‘Is That Really You Typing?  New Pentagon Technology Will Know’; But, Beware Of Over-Reliance, Or over-Confidence In This Technique — Only The Digital Shadow…….Really Knows   http://www.fortunascorner.com        Mohana Ravindranath had an article last week by NextGov.com, and posted on the national security website, DefenseOne.com, with the title above.  He begins, “in its quest to drop […]

U.S. Special Operations Commander Says LEAKS To New York Times Are The Reason Islamic State Leader Abu Bakr al-Baghdadi Escaped U.S. Forces And Is Likely Still Alive

U.S. Special Operations Commander Says LEAKS To New York Times Are The Reason Islamic State Leader Abu Bakr al-Baghdadi Escaped U.S. Forces And Is Likely Still Alive http://www.fortunascorner.com      General Raymond ‘Tony’ Thomas, Commander, U.S. Special Operations Command (USSOCOM), told an audience at the Aspen Security Forum last week, that Islamic State leader Abu […]

How To Steal a Mobile Phone Number & Everything Linked To It  — Meet Signaling System 7, A Hacker’s Best Friend

How To Steal a Mobile Phone Number & Everything Linked To It  — Meet Signaling System 7, A Hacker’s Best Friend   www.frotunascorner.com        Steven Melendez has a July 18, 2017 article on the website, FastCompany, with the title above.  Mr. Melendez begins by writing how even the most tech-savvy can still be vulnerable, and […]

Staying Secret in The Age Of Social Media

Staying Secret in The Age Of Social Media thecipherbrief.com · July 19, 2017 July 19, 2017 | Mark Kelton Mark Kelton Former Deputy Director for Counterintelligence, CIA National Clandestine Service Intelligence officers must often use a false identity – a legend or cover. How has social media and digital technology changed how they create and preserve these cover […]

How Hostile Spies Study Social Media to Crack CIA Cover, Spot Likely Agents

How Hostile Spies Study Social Media to Crack CIA Cover, Spot Likely Agents thecipherbrief.com · July 19, 2017 July 19, 2017 | Daniel Hoffman The Newsletter Get exclusive analysis delivered to your inbox daily. subscribe now Daniel Hoffman Former Chief of Station, Central Intelligence Agency Intelligence officers’ tradecraft is highly guarded for good reason. One of its most […]

‘Click Here To Kill Everyone,’:  Internet Of Things (IoT) Physical Attack Exploit To Be Revealed At Upcoming Black Hat Convention In Las Vegas, July 26-27, 2017; 20th Year Of Annual Gathering Of World’s Elite White Hat Hackers 

‘Click Here To Kill Everyone,’:  Internet Of Things (IoT) Physical Attack Exploit To Be Revealed At Upcoming Black Hat Convention In Las Vegas, July 26-27, 2017; 20th Year Of Annual Gathering Of World’s Elite White Hat Hackers    http://www.fortunascorner.com       For the 20th straight year, the world’s most — must-attend event — for the […]

“Identity Intel Ops” Turn U.S. Special Operators Into Combat Detectives

Excerpts: Though it’s just one piece of the intelligence puzzle, so-called “identity intelligence,” or I2, has become an essential part of the action cycle, which broadly involves gathering information, tracking individual terrorists, neutralizing them, and then repeating the process with any new data obtained during those raids. U.S. Special Operations Command (SOCOM) has codified these […]

“Everybody Lies: Big Data, New Data, And What The Internet Can Tell Us About Who We Really Are”

“Everybody Lies:  Big Data, New Data, And What The Internet Can Tell Us About Who We Really Are” https://fortunascorner.com      The above, is the title of new book just out this week by Seth Stephens Davidowitz; and published by Harper Collins.  Mr. Davidowitz was interviewed this morning (Friday/May 12, 2017) on CNBC’s Squawk Box. […]

The Dangerous Mission To Undermine North Korea With Flash Drives — Evil Personified, Can Only Be Extinguished With Terminal Authority, I.E., Guns And Bombs,By Those Who Will Open The Hearts And Minds Of The Average North Korean To A Better And More Meaningful Existence, And Future

The Dangerous Mission To Undermine North Korea With Flash Drives — Evil Personified, Can Only Be Extinguished With Terminal Authority, I.E., Guns And Bombs,By Those Who Will Open The Hearts And Minds Of The Average North Korean To A Better And More Meaningful Existence, And Future   www.fortunascorner.com        A May 8, 2017 article […]