Should a Country Physically Bomb the Source of the Cyber Attack? – An Analysis

NOTE:I wrote this post in 2007.It all started with the basic speculation that a superpower should aim to physically bomb the source of the cyber attack.Here are some thoughts:- physically bomb the source of the attack is not a metaphor, its an indicati… Continue reading Should a Country Physically Bomb the Source of the Cyber Attack? – An Analysis

Posted in Uncategorized

People’s Information Warfare vs the U.S DoD Cyber Warfare Doctrine – An Analysis

Folks as it’s been a while since I’ve last posted a high-quality post please bare with me while I take the time to catch up with some of the latest developments worth posting an article about and while I try and do my best to return to the usual bloggi… Continue reading People’s Information Warfare vs the U.S DoD Cyber Warfare Doctrine – An Analysis

Posted in Uncategorized

Exposing a Compilation of Money Mule Recruitment Related Screenshots – An OSINT Analysis

Dear blog readers,I’ve decided to share with everyone a set of personal screenshots courtesy of the money mule recruitment ecosystem throughout the years.Sample money mule recruitment screenshots throughout the years include:Stay tuned! Continue reading Exposing a Compilation of Money Mule Recruitment Related Screenshots – An OSINT Analysis

Posted in Uncategorized

How to Build an Information Security Industry "At Home" – The Definite Manual – An Analysis

Dear blog readers,I’ve decided to make sure of my notes on the information security industry publicly accessible which I produced while I was studying in the Netherlands circa 2003-2006 with the idea to share my knowledge and expertise in the field and… Continue reading How to Build an Information Security Industry "At Home" – The Definite Manual – An Analysis

Posted in Uncategorized