Cyber Intelligence

Huge list of OSINT tools by link

@getcontact_real_bot - идеально подойдёт для проверки номера(вирт или не вирт)@UsersSearchBot - найдет не мало хорошей информации по номеру, так же возможны другие методы поиска@detectiva_bot - найдет информации по номеру и другим методам поиска(так же по номеру ищет соц-сети)@vk2017robot - найдет информации по странице которая была зарегестрироваться в 17 и ранее году@EyeCultist_bot - зеркало оригинального глаза бога@n3fm4xw2rwbot - найдет информацию по почте, номеру, авто@BotAvinfo_bot - найдет информации по авто@helper_inform_bot - найдет чу чуть информации по номеру,…

Read More

Leakage of information as a technology of information operations.

Creating the appearance of an accidental or purposeful leakage of information (document, letter, correspondence archive, etc.) is actively used to disguise an information operation. Allegedly, hackers stole something and posted it. Or an unknown well-wisher, seeing the imperfection of this world, became disillusioned with life and thus decided to restore justice. Or a sleepy c 27 ommunications officer forgot his laptop at a public transport stop.... And somewhere on the Internet, there is such a…

Read More

Searching in Russia?

Start here Search by full name of a Russian citizen @egrul_bot - find individual entrepreneurs and companies reestr-zalogov.ru - search in the register of mortgagors, will give passport data, place anddate of birth, etc. zytely.rosfirm.info - will find the address of registration and date of birth, you need to know the city mmnt.ru - find references in documents kad.arbitr.ru - will find cases of arbitration courts bankrot.fedresurs.ru - search in the bankrupt register, you can…

Pages: 1 2

Read More

RU Tracking Studies in Intelligence

|Studies in Intelligence 67, No. 2| 🕵️‍♂️A new issue of the magazine for intelligence officers has been released: "Studies in Intelligence". Briefly what kind of magazine can be read here . 📕Magazine contents:📑 Becoming a learning organization: Reflections on the study of intelligence 📑 Intelligence and Congress: The story behind the unprecedented open testimony about the Soviet Strategic Forces 📑 Long discussion: US intelligence: profession, community or enterprise? 📑 Comments and feedback: Transformational Learning Theory…

Read More

Psychologists at the University of Cambridge have developed the first validated “misinformation sensitivity test”

Psychologists at the University of Cambridge have developed the first validated "misinformation sensitivity test": a quick two-minute test that assesses a person's ability to tell real news from fake news. According to the survey, young people aged 18 to 29 (11%) are worse than adults aged 65 and over (36%) at detecting false headlines, and the more time a user spends online for entertainment, the more susceptible they are to misinformation. About 30% of those…

Read More

Cyber Intelligence Tradecraft and Cognitive Warfare Courses | Treadstone 71

Cyber Intelligence Tradecraft Certified Cyber CounterIntelligence Analyst Certified Cyber Intelligence Analyste Threat detection: AI-powered systems can scan large volumes of data and find patterns of behavior that show potential threats. This can help security teams quickly find and respond to threats before they can cause harm. Fraud detection: AI tools can analyze financial transactions, user behavior and other data sources to find anomalies that may indicate fraudulent activity. Malware detection: AI algorithms can analyze code…

Read More

Treadstone 71 Online Courses

Online Courses  (www.cyberinteltrainingcenter.com) Advanced Cyber Intelligence Tradecraft Advanced Strategic Intelligence Analysis Adversary Targeting Analytic Writing (Reporting and Briefs) Aspects of Disinformation Basic Cyber Intelligence Tradecraft Big Five in Cyber Intelligence Certified Cyber Counterintelligence Analyst Cialdini's Principles in Influence Operations Cognitive Warfare Definitions Part 1 Collection Management Color Revolutions - Cognitive Warfare Conspiracy Theories Critical Thinking and Cognitive Bias for Cyber Intelligence Cyber Cointelpro Dirty Tricks in CounterIntelligence and Deception Intelligence Requirements Intermediate Cyber Intelligence Tradecraft…

Read More

In Person and Online Intelligence Training

Cyber Intelligence, Counterintelligence, and Cognitive Warfare Training Courses online and in-person Washington, DC, Miami Florida, New York City, Chicago, Seattle, Los Angeles, Phoenix, Dallas, OrlandoOur In-Person courses cover intelligence, counterintelligence, influence operations, how to build a cyber intelligence program, geopolitical and strategic intelligence, open-source intelligence, clandestine cyber human intelligence, persona development and use, and operational security in online environments. Our courses include the adversary OSINT techniques, methodical procedures for OPSEC, and the use of ChatGPT…

Read More

Cyber war – large-scale destruction without the use of military force

Cyber war has the potential of large-scale destruction without the use of military force and can be used without an official declaration of war. As a strong current, the "soft" paradox is a good guide to dealing with hybrid threats and hybrid warfare and its responses and countermeasures, as well as resilience and vulnerability. https://cybershafarat.com/2023/02/18/cognitive-warfighter/ To achieve success, one cannot focus only on difficult defense or security issues and only look for war. This can…

Read More