Update on Syrian Rebel Media Coordinators
You might recall our Guide to Syrian Rebel Media Spokespeople and PR published back in March. Impending foreign entanglements led us to revisit the network of individuals within Syria that shape our...
View ArticleHead of Iran’s Cyber Warfare Program Latest Victim in Series of Assassinations
The head of Iran’s cyber warfare program, Mojtaba Ahmadi, was found dead earlier this week with initial evidence suggesting he was assassinated. This is far from the first time that a member of Iran’s...
View ArticleThe Evolution of An0nGhost (November 2012 – September 2013)
The most infamous cyber collective, Anonymous, remains highly active several years after its inception. A lesser-known group, An0nGhost, is another globally distributed collective of hackers. In...
View ArticleSyrian Electronic Army Attacks Linked to Political Statements on Syria
Originally published on October 9, 2013 by Mashable in an article entitled Syrian Electronic Army Attacks Linked to Obama’s Mentions of Syria. From Mashable: The frequency of attacks that the infamous...
View ArticleWeb Intelligence Shows Early Signs of OpNSA Cyber Campaign, DDoS Attacks...
The U.S. National Security Agency’s website was down for roughly 11 hours on Friday. The agency says the downtime was caused by an error during a routine website update; others believe the NSA was...
View ArticleSyrian Electronic Army Continues to Adapt, Targeting Communications Partners
Last weekend, the Syrian Electronic Army again grabbed headlines with a high-profile attack on BarackObama.com. An aspect that caught our attention is how the SEA continues to adapt their methods by...
View ArticleFilling the OSINT Void After the World News Connection Feed Shuts Down
The Federation of American Scientist’s blog Secrecy News highlighted several weeks ago the impending loss of the National Technical Information Service’s World News Connection (WNC) newsfeed. The...
View ArticleTrade Treaty Draws Ire of Digital Rights Advocates
According to Wikileaks, a proposed trade agreement between 12 countries would infringe upon internet freedom in ways similar to the stalled Stop Online Piracy Act (SOPA). Recalling the fierce response...
View ArticleMeasuring the Media Impact of Hacktivists
How can we measure the success of hacktivists? Certainly, achievement of a desired political change is the choice outcome. But seeking a non-zero metric, let’s consider the amount of media coverage an...
View ArticleRash of Cyber Threats on Japanese Targets Continues
Hacktivist collective Anonymous recently threatened 22 Japanese websites including prominent government agencies in protest against the annual Taiji dolphin hunt. Though action against these sites has...
View ArticleChina Restricts East China Sea Airspace Amidst Regional Military...
China over the weekend imposed contentious airspace restrictions over the disputed Senkaku Islands. The event was preceded by a series of regional military partnerships and arms contracts as well as...
View ArticleThe Complexities of Myanmar’s International Makeover
Our friends at Ethnographic Edge recently published a thoughtful piece on recent economic and media policy developments in Myanmar. Particularly notable are the reminders of complex social pressures...
View ArticleWhich Hacker Groups Give Warning of Cyber Attacks?
We’ve previously considered media impact as a success criterion for hackers. This led us to report the most media-savvy hacktivists. In their respective ways, groups like the Syrian Electronic Army,...
View ArticleJapan, United States Include Cyber Defense in Joint War Exercise
According to reports out of Japan, ongoing Japan Ground Self-Defense Force and U.S. Army joint training exercises include a cyber attack component. The exercise between December 5th and 12th reportedly...
View ArticleIranian Hacktivists Quiet Amid Nuclear Negotiations
While Iran’s Revolutionary Guards have been busy arresting opposition activists for alleged seditious online activities, hacker groups with supposed ties to the Iranian government have been noticeably...
View ArticleThe Year in Bitcoin Malware and Cybercrime
Where there’s money there’s malware. And as the lights shone brightly on Bitcoin this year, cybercriminals were increasingly active in exploiting security vulnerabilities related to the digital...
View ArticleMass Demonstration Planned for Sunday at Thai PM’s Residence
Thailand’s Prime Minister Yingluck Shinawatra has called for respect of the law as mass demonstrations are planned for Sunday outside of her home. The protest organized by former Thai deputy prime...
View Article‘Islamic Cyber Resistance’ Breaks Iranian Hacker Silence, Exposes Links to SEA
The freeze on Iranian hacktivist activity during nuclear negotiations was broken last week although it doesn’t appear to be government sponsored. The Islamic Cyber Resistance (ICR), not yet discussed...
View ArticleVisualizing RedKit Exploits
The private but popular RedKit exploit kit appears to be experiencing a resurgence based on a report by Kahu Security. Initially spotted back in May 2012, the exploit kit drew attention after...
View ArticleThreat Intelligence Webinar: The Spread of POS Malware
The widely publicized data breach at Target put point-of-sale (POS) malware in the spotlight for security teams. Open source research by Recorded Future found POS malware attacks were on the rise even...
View Article