Category: Cyber Warfare
Pathology of Western Games (feminism – video)
PATHOLOGY of WESTERN GAMES as defined by Iranian hackers and their analysis of Western video games – (emulation?) Issues Save the world Femininity Or proof of concept? Nature and culture The relative values Defect creation Cultural induction Evil sin Violence and addiction Political territory Contempt of religions Money axial Aquaculture myth Fantasy Aquaculture Evil sin Destructive nature of sin is sin Style game is considered…
Implementing Effective Criminal Justice Responses for Countering Crimes related to Terrorism and Violent Extremism
…preventing the misuse of the internet and social media for terrorist purposes, strengthening support for victims of terrorism and the use of victims stories and other counter narratives to terrorist propaganda; the effective de-radicalization…
Cyber Intelligence Course
The latest comment: Cyber Intelligence course comments: … Looking back at the week and the challenge you had per getting us through a necessary set of material, you had your work cut out for you. There’s just so much ground to cover in such little time. The necessary, minimal set is extensive – not surprisingly…
Treadstone 71 Series of Intelligence Courses – FAQ
Who benefits from the Treadstone 71 series of intelligence courses? Information technology and information security organizations are struggling to produce actual intelligence. Most of what is delivered as intelligence is in fact either data or at best, information. Additionally, these same organizations receive data and information from analyst-type organizations who provide general products. General from…
Read More “Treadstone 71 Series of Intelligence Courses – FAQ” »
Active Defense – Strike, CounterStrike, Mercenary or Vigilante?
The opponent lands combination after combination to the head, ribs, and kidneys. This barrage continues until the defender boxer is knocked out, dragged off the mat to hopefully fight another day. The fighter cannot continue. (Bardin, 2011) This picture is much like our cyber defenses today. Culturally trained to block every punch, cyber defenses attempt…
Read More “Active Defense – Strike, CounterStrike, Mercenary or Vigilante?” »
They Paid the Ultimate Sacrifice – Green Revolution 2009 – Iran
As we proceed through the negotiations with Iran we must not forget who we are dealing with and the recent history of the Green Revolution of 2009. Many sacrificed all they could. Oppression and censorship were but a few of the actions taken by the IRGC and Basij under the direction of the government. Many…
Read More “They Paid the Ultimate Sacrifice – Green Revolution 2009 – Iran” »
Rather Drink in a Cantina than Have to Use the Cantina Against Phishing
Defcon 3 – Fox News Interview with Treadstone 71
Video at the link below Defcon 3 Interview – Treadstone 71 with Dr. Max Abrahms from Northeastern University http://www.foxnews.com/tech/2015/05/11/us-still-lags-behind-isis-in-social-media-fight-experts-warn/
Education on Honeypots – Sharif University Courses on Honeypot Detection
There are many documents available on honeypot detection. Not too many are found as a Master’s course at University levels. Sharif University as part of the Iranian institutionalized efforts to build a cyber warfare capability for the government in conjunction with AmnPardaz, Ashiyane, and shadowy groups such as Ajax and the Iranian Cyber Army is…
Read More “Education on Honeypots – Sharif University Courses on Honeypot Detection” »

You must be logged in to post a comment.