Espionage

Economic Statecraft: How China Legally Access Foreign Technology

[gallery ids="38492,38493,38494,38495,38496,38497,38498,38499,38500,38501,38502,38503,38504,38505,38506,38507,38508,38509,38510,38511,38512,38513,38514,38515,38516,38517,38518,38519,38520,38521,38522,38523,38524,38525,38526,38527,38528,38529,38530,38531,38532,38533,38534,38535,38536,38537,38538,38539,38540,38541,38542,38543,38544,38546,38547,38548,38550,38551,38552,38553,38554,38555,38556,38557,38558,38559,38560,38561" type="slideshow"] Economic Statecraft How China Legally Accesses Foreign Tech PDF

Read More

Whitehouse files from Obama and Trump Eras Dropped

The database of  "White House" Related Sites was hacked by an Iranian hacking entity. This is some of the databases that have been extracted from White House Related Sites.In this database, some administrative letters and confidential information of the White House during the presidency of Barack Obama and Donald Trump are available دیتابیس سایت های متصل به "کاخ سفید" هک شد! ⚜️این فایل بخشی از دیتابیس های استخراج شده از سایت های مرتبط با کاخ…

Read More

#FireEye #Tool Used by #Iranian Offense Cyber Ops since April 2019

با سلام خدمت شما دوستان عزیز، امروز شرکت امنیتی FireEye برای اولین بار ویندوز customize شده برای انجام فعالیت های تست نفوذ را منتشر کرد!حالا این ویندوز چه فرقی داره؟!اولا این یک ویندوز آماده و جهت نصب بر روی ماشین مجازی است.با توجه به اینکه در بعضی مواقع برای انجام تست نفوذ در شبکه و مخصوصا در حوزه Active directory باید از سیستم ویندوزی استفاده کرد حالا میتونید با این ویندوز از پیش آماده تست…

Read More

CyberIntellipedia – The Online Intelligence Wiki – Knowledgebase

CyberIntellipedia This wiki is an online system for collaborative data sharing built and used by Treadstone 71 to aid in building Cyber Threat Intelligence programs while establishing intelligence sharing and communities of interest. The Treadstone 71 Cyber Intelligence Training Courses led to the establishment of CyberIntellipedia, a wiki consisting of multiple sections covering strategic planning, policies, procedures, templates, taxonomy, examples, dossiers, finished intelligence, estimative intelligence, open-source tools, adversary research, process flow diagrams, reporting, analytic tools…

Read More

Iranian Intelligence Services – ( Shahid Kaveh ) The Sayad Project and Sayad 2 – Dissident & Foreign Support, Internal Targeting – Khalq Project 99

Treadstone 71 reports on Iranian influence operations, cyber operations, persona generation, Basij Cyber Battalions, and targeted adversary analysis (see the links below).  Iranian intelligence operations demonstrates fear of dissident and opposition activities abroad and an effort to control and eliminate any potential counter narrative to the official revolutionary line, including assassinations. Iran controls internal communications with Dezhfa.

Read More

Biden’s New Cyber Security Program and the Hypocrisy of the US Cyber Security and Threat Intelligence Industry – “ТАЙГЕР ОПТИКС”

The United States faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American people’s security and privacy. President Biden’s new program is ambitious and of great value to the cyber security industry. Companies are salivating over the $200B opportunity on top of the existing spend. SIGN THE PETITION In light of the SolarWinds debacle, Biden is taking action to fix the problems. But there is…

Read More

IRGC Not happy with Mohammad Javad Zarif – Iran’s Foreign Minister, in Leaked Tape, Says Revolutionary Guards Set Policies

As quoted directly from IRGC channels: Mr. Minister of Foreign Affairs, wash your mouth before mentioning the name of Martyr General Soleimani ... The result of the US field commanders was the defeat of the United States in Iraq, Syria, Lebanon, Yemen and Afghanistan, and the result of your diplomacy is a hat to open the door ... Those who are informed were not shocked by your words, you are the one who, by signing…

Read More

Natanz Hack – Not a Mystery? Shahid Ahmadi Roshan Natanz enrichment facility – Sabotage

The Jerusalem Post | 'Mossad behind cyber attack against Iran's Natanz nuclear facility' | 11-04-21 — "The Mossad was reportedly behind the cyber attack at the Natanz nuclear plant on Sunday which has caused extensive damage to Iran's main uranium enrichment facility. Western sources quoted in Israeli media said that the attack - initially referred to as an "accident" by Iran - was carried out by the Mossad Previous activities: Natanz Enrichment Pilot Center (PFEP)…

Read More

Decree of the President of the Russian Federation of 05.01.2013 No. 31 (secret)

The Americans do not share information, psychological, cyber operations, electronic warfare, considering them as an equal "domain" of the Joint Battle Space in Multidomain Operations, on a par with space, air, land and water. US KNS Doctrine: JDN 3-16 Joint Electromagnetic Spectrum Operations US KNS guidelines: P 3-13 Information Operations JP 3-12 Cyberspace Operations JP 3-13.1 Electronic Warfare Field Manual of the U.S. Army: FM 3-12 Cyberspace and Electronic Warfare Operations Russia is awake and…

Read More