Month: January 2023

The theory of reflexive control

Reflexive control theory seeks to guide the target unconsciously in a predefined manner and often against their own interests. This can be done by influencing the enemy's information channels and sending messages that change the flow of information in the adversary's favor. An adversary makes a decision by acting in a manipulated information space, provoking emotional responses  People, commercial organizations, and information security groups are susceptibility to reflexive control is largely due to uncontrolled access…

Read More

Russian Losses 1/29

Losses of Russia on January 29, 2023 Approximate assessment of the Armed Forces from 02/24/2022 殺 Personnel: ~505240 (+2600)killed: ~126,160 (+650)injured: ~378,480 (+1950)captured: ~600 (0)  Military equipment: 20210 (+47)Armored combat vehicles: 6366 (+22)Tanks: 3197 (+8)Artillery: 2195 (+7)Aircraft: 293 (0)Helicopters: 284 (0)RSZV: 453 (0)Air defense means: 221 (0)Automotive equipment and tanks: 5037 (+10)BpLA OTR: 1947 (0)Special equipment: 199 (0)Ships and boats: 18 (0)Missiles: >9000 (no data)

Read More

Trust Erosion in Cognitive Warfare

Trust is a critical asset that can be damaged or completely destroyed through a variety of applied cognitive weapons such as social media. People or institutions that seek to destroy this trust first identify major gaps in the target society and then intensify them in a way that causes distrust towards the honesty and motivation of others in society. https://cybershafarat.com/2022/12/07/cognitive-warfare/ Research studies in the field of cognitive hybrid warfare show that intelligence operations will necessarily…

Read More

Hybrid Warfare Integration across STEMPLES Plus

In simple words, hybrid war can be the attack of an entity (either government or faction) towards the opposite opponent by using non-kinetic tools of power such as "economy, politics, culture, information and cyber (STEMPLES Plus)" with the intention of creating and obtaining a strategic result. https://cybershafarat.com/2021/05/06/what-the-f-is-stemples-plus/ Cognitive warfare must be effectively integrated across land, sea, air, space, and cyber operations and then delivered through a hybrid think tank.Undoubtedly, coordination between cognitive warfare and other…

Read More

The Context of Cognitive Warfare

In the context of cognitive warfare, disinformation is information that is intentionally created to harm or manipulate a "person, social group, organization, or country," while disinformation is false information that is created without intent to harm. https://cybershafarat.com/2023/01/21/intelligence-tradecraft-operator-cyber-cognitive-warfighter-training-2/ Hybrid tactics create instability, destroy institutions, fuel political polarization, and destroy coexistence and consensus.The special importance of the media in legitimizing the "ideology of the movement and protests is actually to make them look authentic and also to…

Read More

FSB Members data UPDATED Again April 25, 2023

New files for download Full name, Date of birth, Place of birth, Passport, Date of issue, Issuing authority, Authority code, Registration address, Authority, Previous address, Special marks, SIGNATURE, Debts, Air tickets, Credits, Sim-cards, modems , Motor transport, System number, Sign "sold earlier" https://anonfiles.com/jb4ex6nbzb/FSB_ziphttps://anonfiles.com/jb4ex6nbzb/FSB_zip https://cybershafarat.com/2023/04/24/putin-appoints-tucker-carlson-chief-of-the-general-staff/ PW: RUdataantiZ https://anonfiles.com/Mc86x4n7z5/RU_7zhttps://anonfiles.com/Mc86x4n7z5/RU_7z wp-1681405748044Download wp-1681405748078Download wp-1681405748070Download ФСБ_listDownload https://cybershafarat.com/2023/02/20/osint-and-darknet-risk-reduction-through-opsec/ База_номеров_руководства_и_элиты_РФ_5000Download wp-1681305812929Download wp-1681305812946Download wp-1681305812962Download wp-1681305812890Download wp-1681305812835Download wp-1681305812857Download wp-1681305812872Download wp-1681305812911Download wp-1681305838148Download Ф.И.О., Дата рождения, Место рождения, Паспорт, Дата выдачи, Орган выдачи, Код органа, Адрес…

Read More

Open-Source Ransomware As A Service for Linux, MacOS and Windows

Features: Generate a ransomware payload With or without GUI payload FUD (Fully Undetectable by Anti-Virus) Works on Windows, MacOS and Linux Super fast encryption with PyCrypto Compile to EXE, APP or Unix/Linux executable Custom icon for your EXE payload Receive keys of victims Decrypt files Demo mode (payload won't encrypt anything) Fullscreen mode (Warning takes over the screen) Custom warning message for your victim Custom image in your payload Ghost mode (Rename by adding .DEMON…

Read More

Drone attack on one of the military centers of the Islamic Republic in Isfahan

Details of tonight's attack according to IRNAUnsuccessful attack on one of the centers of the Ministry of Defense in Isfahan/explosion of small birds in defense trapsDepartment of Defense: On the evening of the 8th of Bahman 1401 around 23:30, an unsuccessful attack was carried out using micro-birds on one of the workshop complexes of the Ministry of Defense, and fortunately, with predictions and defense measures, one of them was hit by the complex's air defense…

Read More