<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5760850110489525993</id><updated>2024-10-05T02:57:35.999+01:00</updated><category term="United States"/><category term="Cyberwarfare"/><category term="Iran"/><category term="Terrorism"/><category term="Middle East"/><category term="Al-Qaeda"/><category term="Computer security"/><category term="China"/><category term="Israel"/><category term="Warfare and Conflict"/><category term="Russia"/><category term="Somalia"/><category term="CyberSecurity"/><category term="European Union"/><category term="Federal Bureau of Investigation"/><category term="Pakistan"/><category term="Yemen"/><category term="Afghanistan"/><category term="India"/><category term="Security"/><category term="Africa"/><category term="Twitter"/><category term="Government"/><category term="National Security Agency"/><category term="Syria"/><category term="Asia"/><category term="Counter-terrorism"/><category term="Google"/><category term="Saudi Arabia"/><category term="NATO"/><category term="Stuxnet"/><category term="al Qaeda"/><category term="Denial-of-service attack"/><category term="Egypt"/><category term="Islam"/><category term="Al-Shabaab"/><category term="Central Intelligence Agency"/><category term="Iraq"/><category term="Libya"/><category term="Tehran"/><category term="Turkey"/><category term="Australia"/><category term="France"/><category term="Kenya"/><category term="Mexico"/><category term="Microsoft"/><category term="Taliban"/><category term="Uk"/><category term="United Nations"/><category term="Computer crime"/><category term="Government Communications Headquarters"/><category term="Gulf of Aden"/><category term="London"/><category term="Malware"/><category term="Open Source"/><category term="Osama bin Laden"/><category term="Soviet Union"/><category term="United Arab Emirates"/><category term="anonymous"/><category term="Al-Qaeda in the Arabian Peninsula"/><category term="Canada"/><category term="Cloud computing"/><category term="Crime"/><category term="Cyber-attack"/><category term="FBI"/><category term="Information warfare"/><category term="Islamic terrorism"/><category term="Japan"/><category term="John Leyden"/><category term="Military"/><category term="Nigeria"/><category term="Piracy"/><category term="Transitional Federal Government"/><category term="alqaeda"/><category term="Ali Abdullah Saleh"/><category term="Barack Obama"/><category term="Bashar al-Assad"/><category term="Credit card"/><category term="Cyber Operations"/><category term="DARPA"/><category term="GCHQ"/><category term="IP address"/><category term="Internet service provider"/><category term="Mogadishu"/><category term="Muammar al-Gaddafi"/><category term="OSINT"/><category term="Open Source Intelligence"/><category term="Pentagon"/><category term="SCADA"/><category term="Surveillance"/><category term="Technology"/><category term="US"/><category term="US government"/><category term="Ukraine"/><category term="WikiLeaks"/><category term="World War II"/><category term="facebook"/><category term="BEIJING"/><category term="Business"/><category term="Cold War"/><category term="Cyberterrorism"/><category term="Director of National Intelligence"/><category term="EU"/><category term="Edward Snowden"/><category term="IBM"/><category term="Indian Ocean"/><category term="Indonesia"/><category term="Information Security"/><category term="Internet"/><category term="Moscow"/><category term="Mossad"/><category term="NASA"/><category term="New York"/><category term="New York City"/><category term="Risk management"/><category term="Sri Lanka"/><category term="Telecommunication"/><category term="United States Cyber Command"/><category term="United States Department of Defense"/><category term="United States armed forces"/><category term="Unmanned aerial vehicle"/><category term="War on Terrorism"/><category term="White House"/><category term="African Union Mission to Somalia"/><category term="Al Shabaab"/><category term="Associated Press"/><category term="Ayman al-Zawahiri"/><category term="BBC"/><category term="Big data"/><category term="Bitcoin"/><category term="Critical infrastructure"/><category term="Electronic Frontier Foundation"/><category term="European Commission"/><category term="European Network and Information Security Agency"/><category term="Georgia"/><category term="Germany"/><category term="Home Office"/><category term="Hong Kong"/><category term="Hosni Mubarak"/><category term="International Atomic Energy Agency"/><category term="Islamic State of Iraq"/><category term="Islamism"/><category term="KGB"/><category term="Kaspersky Lab"/><category term="Lashkar-e-Taiba"/><category term="McAfee"/><category term="Ministry of Defence"/><category term="Money laundering"/><category term="Mumbai"/><category term="NSA"/><category term="National security"/><category term="Navy"/><category term="Network security"/><category term="Nuclear program of Iran"/><category term="Nuclear weapon"/><category term="PayPal"/><category term="People&#39;s Liberation Army"/><category term="Police"/><category term="Politics"/><category term="RSA"/><category term="Research"/><category term="Reuters"/><category term="Sana&#39;a"/><category term="Sharia"/><category term="Somali"/><category term="Stratfor"/><category term="Suicide attack"/><category term="Symantec"/><category term="Tunisia"/><category term="UN"/><category term="United States Department of Homeland Security"/><category term="Weapon of mass destruction"/><category term="hackers"/><category term="AQAP"/><category term="Amnesty International"/><category term="Australian Secret Intelligence Service"/><category term="Australian Security Intelligence Organisation"/><category term="Azerbaijan"/><category term="Benjamin Netanyahu"/><category term="Boko Haram"/><category term="Britain"/><category term="British Armed Forces"/><category term="Brussels"/><category term="Business intelligence"/><category term="CIA"/><category term="Cabinet Office"/><category term="Cheltenham"/><category term="Cyber spying"/><category term="Damascus"/><category term="Data"/><category term="Data mining"/><category term="David Miliband"/><category term="Defence minister"/><category term="Denver"/><category term="Encryption"/><category term="Espionage"/><category term="F-Secure"/><category term="Federal government of the United States"/><category term="Flame"/><category term="Gaza Strip"/><category term="Hacker (computer security)"/><category term="Hamas"/><category term="Hezbollah"/><category term="Human rights"/><category term="Hypertext Transfer Protocol"/><category term="ISIS"/><category term="Illegal drug trade"/><category term="Intelligence agency"/><category term="Internet of Things"/><category term="Jakarta"/><category term="JavaScript"/><category term="Kabul"/><category term="Kenyan"/><category term="Latin America"/><category term="LinkedIn"/><category term="Mahmoud Ahmadinejad"/><category term="Member State of the European Union"/><category term="Nairobi"/><category term="Natanz"/><category term="North Korea"/><category term="Northrop Grumman"/><category term="Organized crime"/><category term="Paris"/><category term="Password"/><category term="Pastebin"/><category term="Personal computer"/><category term="Piracy in Somalia"/><category term="Politics of Iran"/><category term="Programming"/><category term="Recep Tayyip Erdoğan"/><category term="San Francisco"/><category term="Sana"/><category term="Serious Organised Crime Agency"/><category term="Shabaab"/><category term="Silicon Valley"/><category term="Sinaloa Cartel"/><category term="Singapore"/><category term="Skype"/><category term="Social networks"/><category term="Sophos"/><category term="Switzerland"/><category term="Transport Layer Security"/><category term="US Navy"/><category term="Vulnerability (computing)"/><category term="Wall Street Journal"/><category term="Wars and Conflicts"/><category term="Washington DC"/><category term="Website"/><category term="West Bank"/><category term="Windows XP"/><category term="Yahoo"/><category term="Yemeni"/><category term="YouTube"/><category term="Zinjibar"/><category term="cyber-threat"/><category term="2008 Mumbai attacks"/><category term="AK-47"/><category term="ARM architecture"/><category term="Abbottabad"/><category term="Abdelbaset Ali Mohmed Al Megrahi"/><category term="Abkhazia"/><category term="Abu Dua"/><category term="African Union"/><category term="Agence France-Presse"/><category term="Air force"/><category term="Aircraft"/><category term="Al-Qaida"/><category term="Algeria"/><category term="Algiers"/><category term="Ali Khamenei"/><category term="American Civil Liberties Union"/><category term="Amsterdam"/><category term="Android"/><category term="Ansar al Sharia"/><category term="Antivirus"/><category term="Anwar al-Awlaki"/><category term="Apple"/><category term="Arab League"/><category term="Arabic language"/><category term="Army"/><category term="Army of the Guardians of the Islamic Revolution"/><category term="Artificial intelligence"/><category term="Asia-Pacific"/><category term="Automated teller machine"/><category term="Baghdad"/><category term="Balkans"/><category term="Benghazi"/><category term="Bin Laden"/><category term="BitPay"/><category term="Blackhole"/><category term="Botnet"/><category term="Brian Krebs"/><category term="Bulgaria"/><category term="Burkina Faso"/><category term="CNN"/><category term="Cargo ship"/><category term="Chechnya"/><category term="Cisco Systems"/><category term="Citizen Lab"/><category term="Ciudad Juárez"/><category term="Colorado"/><category term="Combating Terrorism Center"/><category term="Computer Emergency Response Team"/><category term="Congress"/><category term="Counter Terrorism"/><category term="Creech Air Force Base"/><category term="CrowdStrike"/><category term="Cyberspace"/><category term="Czech Republic"/><category term="DF-31"/><category term="DHS"/><category term="DNA"/><category term="Danny Ayalon"/><category term="Data Analysis"/><category term="Data breach"/><category term="Databases"/><category term="David Cameron"/><category term="Defense Department"/><category term="Defense Intelligence Agency"/><category term="Defense contractor"/><category term="Delhi"/><category term="Diplomacy"/><category term="Domain name"/><category term="Dynamic-link library"/><category term="Eastern Europe"/><category term="Education"/><category term="Egyptians"/><category term="Electronic Warfare"/><category term="Embassies and Consulates"/><category term="Environment"/><category term="European External Action Service"/><category term="European Parliament"/><category term="Fast Company"/><category term="Federal Aviation Administration"/><category term="Felipe Calderón"/><category term="File Transfer Protocol"/><category term="Financial Services"/><category term="FireEye"/><category term="Forensic science"/><category term="Fort Hood"/><category term="Friday"/><category term="GMail"/><category term="Georgian government"/><category term="GhostNet"/><category term="Golan Heights"/><category term="Graham Cluley"/><category term="Greece"/><category term="Guardian"/><category term="Gulf Cartel"/><category term="HTTP Secure"/><category term="Haaretz"/><category term="Hacktivism"/><category term="Hans M. Kristensen"/><category term="Hashid"/><category term="Homeland security"/><category term="Homs"/><category term="Horn of Africa"/><category term="House of Lords"/><category term="Huawei"/><category term="Humanitarian aid"/><category term="IAEA"/><category term="ICANN"/><category term="INTERPOL"/><category term="ISI"/><category term="Incapsula"/><category term="Industrial control system"/><category term="Information Age"/><category term="Information privacy"/><category term="Information technology"/><category term="Infrastructure"/><category term="Intel"/><category term="Intelligence analysis"/><category term="Intelligence and Security Committee"/><category term="Intercontinental Ballistic Missile"/><category term="Interior ministry"/><category term="International Telecommunication Union"/><category term="International relations"/><category term="Islamic State"/><category term="Jemaah Islamiyah"/><category term="Jerusalem Post"/><category term="Jihad"/><category term="Keith Alexander"/><category term="Kevin Rudd"/><category term="Kidnapping"/><category term="Koobface"/><category term="Kurdistan Workers Party"/><category term="LTTE"/><category term="Laser"/><category term="Law"/><category term="Lesley Stahl"/><category term="Liberation Tigers of Tamil Eelam"/><category term="Linux"/><category term="Lisbon Treaty"/><category term="LulzSec"/><category term="MI5"/><category term="Malaysia"/><category term="Mali"/><category term="Manhattan"/><category term="MasterCard"/><category term="Meir Dagan"/><category term="Mexico City"/><category term="Microsoft Windows"/><category term="Military intelligence"/><category term="Mohamed ElBaradei"/><category term="Mohammad Reza Rahimi"/><category term="MoneyGram"/><category term="Mosul"/><category term="Mt.Gox"/><category term="Multilateral"/><category term="Muslim"/><category term="Muslim Brotherhood"/><category term="NCTC"/><category term="National Cyber Security Alliance"/><category term="National Defense Authorization Act"/><category term="National Geospatial-Intelligence Agency"/><category term="National Investigation Agency"/><category term="National Transitional Council"/><category term="Nazi Germany"/><category term="Near East"/><category term="NetSuite"/><category term="Netherlands"/><category term="New Delhi"/><category term="New York Times"/><category term="New Zealand"/><category term="Nidal Malik Hasan"/><category term="Niger"/><category term="North Africa"/><category term="Nuclear power"/><category term="Office of Foreign Assets Control"/><category term="Open data"/><category term="Open-source intelligence"/><category term="PLA"/><category term="PNC Financial Services"/><category term="Palestinian people"/><category term="Payment Card Industry Data Security Standard"/><category term="Persian Gulf"/><category term="Poland"/><category term="President of the United States"/><category term="Prime minister"/><category term="Privacy"/><category term="Privacy law"/><category term="Psychology"/><category term="REAL ID Act"/><category term="Register"/><category term="Robert McClelland"/><category term="Robots Exclusion Standard"/><category term="Roman Bukary"/><category term="SSL"/><category term="Saddam Hussein"/><category term="Saint Petersburg"/><category term="Sana&#39;a University"/><category term="Satellite"/><category term="Saturday"/><category term="Scientific Method"/><category term="Scotland"/><category term="Search engine optimization"/><category term="Secretary of State for Foreign and Commonwealth Affairs"/><category term="September 11 attacks"/><category term="Shia Islam"/><category term="Ship"/><category term="Sinaloa"/><category term="Social Sciences"/><category term="Somali pirates"/><category term="South Africa"/><category term="South America"/><category term="South Asia"/><category term="South Ossetia"/><category term="Spain"/><category term="Steganography"/><category term="Strait of Malacca"/><category term="Suicide Bombers"/><category term="Sun Tzu"/><category term="Tamaulipas"/><category term="Tel Aviv"/><category term="Telecommunications network"/><category term="Transportation Security Administration"/><category term="Trend Micro"/><category term="Tuareg people"/><category term="Turing Test"/><category term="USA Patriot Act"/><category term="Uniform Resource Locator"/><category term="United Nations Security Council"/><category term="United State"/><category term="United States Intelligence Community"/><category term="United States Navy"/><category term="VMware"/><category term="Vic Toews"/><category term="Virginia"/><category term="Wednesday"/><category term="Windows"/><category term="World Wide Web"/><category term="Yemen Arab Republic"/><category term="16th Street Northwest"/><category term="2006 Ontario terrorism plot"/><category term="2010 Digital Hate Report"/><category term="2010 Haiti earthquake"/><category term="2012 Summer Olympics"/><category term="3D printing"/><category term="3dprinting"/><category term="50 Cent"/><category term="50 Cent Army"/><category term="60 Minutes"/><category term="7 July 2005 London bombings"/><category term="9/11 Commission"/><category term="AAI RQ-7 Shadow"/><category term="ABB Group"/><category term="ABC News"/><category term="ABU DHABI"/><category term="AES"/><category term="AIVD"/><category term="AKP"/><category term="AOL"/><category term="ASIS"/><category term="AT T"/><category term="AT&amp;T"/><category term="ATM"/><category term="AUV&#39;s"/><category term="Aaron Swartz"/><category term="Abdul Majeed al-Zindani"/><category term="Abdullah Gül"/><category term="Abdullah II of Jordan"/><category term="Abu Sayyaf"/><category term="Abu Yahya al Libi"/><category term="Abubakar Shekau"/><category term="Abyan Governorate"/><category term="Access to Information Act"/><category term="Active Directory"/><category term="Active Directory Application Mode"/><category term="Active electronically scanned array"/><category term="Adam Shostack"/><category term="Address space layout randomization"/><category term="Aden"/><category term="Adiala Jail"/><category term="Advanced Encryption Standard"/><category term="Adventure of the Speckled Band"/><category term="Aerospace Industries Association"/><category term="Agatha Christie"/><category term="Agdam Rayon"/><category term="Agent.AWF"/><category term="Ahlu Sunna"/><category term="Ahmadiyya"/><category term="Air India Flight 182"/><category term="Airbus"/><category term="Airbus A320 family"/><category term="Aircraft hijacking"/><category term="Airport security"/><category term="Airports Authority of India"/><category term="Ajdabiya"/><category term="Ajmal Kasab"/><category term="Akula class submarine"/><category term="Al Anbar Governorate"/><category term="Al Capone"/><category term="Al Mukhabarat Al A&#39;amah"/><category term="Al-Azhar University"/><category term="Al-Dhahab"/><category term="Al-Qaeda Organization in the Islamic Maghreb"/><category term="Al-Raqqah"/><category term="Al-Shabab"/><category term="Alan Johnson"/><category term="Alan Nunn May"/><category term="Alan Turing"/><category term="Albania"/><category term="Alexa Internet"/><category term="Alexander"/><category term="Ali Abdullah Salih"/><category term="Ali Akbar Salehi"/><category term="Ali Asghar Soltanieh"/><category term="Ali Hassan al-Majid"/><category term="Ali Modu Sheriff"/><category term="Alice"/><category term="Altaf Hussain"/><category term="American Civil War"/><category term="Amman"/><category term="Anambra State"/><category term="Anatolia"/><category term="Anders Fogh Rasmussen"/><category term="Andhra Pradesh"/><category term="Andreas Baumhof"/><category term="Andrew Marr"/><category term="Andrew McCarthy"/><category term="Angry Bird"/><category term="Ankara"/><category term="Ann Todd"/><category term="Anonymous (group)"/><category term="Ansar al Islam"/><category term="Ansar al Shariah"/><category term="Ansar al-Shariah"/><category term="Anthony Shaffer"/><category term="Anti -Terrorism"/><category term="Anti-Counterfeiting Trade Agreement"/><category term="Anti-Phishing Working Group"/><category term="Anti-aircraft warfare"/><category term="Anubisnetworks"/><category term="Anzac"/><category term="Application programming interface"/><category term="Arab Spring"/><category term="Armed Forces (Special Powers) Act  1958"/><category term="Armed Forces of Armenia"/><category term="Armed Forces of the Islamic Republic of Iran"/><category term="Armed Forces of the Philippines"/><category term="Armed forces"/><category term="Armed forces of the Netherlands"/><category term="Arms Control"/><category term="Arthur Conan Doyle"/><category term="Aryan Nation"/><category term="Ashdod"/><category term="Ashkan Soltani"/><category term="Asia Pacific Network Information Centre"/><category term="Asia Terrorism"/><category term="Asif Ali Zardari"/><category term="Asimo"/><category term="Assembly line"/><category term="Association of Old Crows"/><category term="Asynchronous Transfer Mode"/><category term="Athens"/><category term="Atlantic"/><category term="Atlas Elektronik"/><category term="Atomic Energy Organization of Iran"/><category term="Auckland"/><category term="Aurora"/><category term="Austin  Texas"/><category term="Australia and New Zealand Banking Group"/><category term="Australian Customs and Border Protection Service"/><category term="Australian Defence Force"/><category term="Australian Federal Police"/><category term="Australian Government Information Management Office"/><category term="Austria"/><category term="Avast"/><category term="Awlaki"/><category term="Ayatollah"/><category term="Ayman al Zawahiri"/><category term="Azerbaijani people"/><category term="Azeri"/><category term="B. H. Liddell Hart"/><category term="BAMAKO"/><category term="BDR"/><category term="BMW"/><category term="BOC Aviation"/><category term="BOSSIER CITY"/><category term="Bahrain"/><category term="Baidoa"/><category term="Baidu"/><category term="Bali"/><category term="Ban Ki-moon"/><category term="Bangladesh"/><category term="Bangladesh Rifles"/><category term="Bank"/><category term="Bank Secrecy Act"/><category term="Bank of America"/><category term="Banking in Switzerland"/><category term="Banner Bank"/><category term="Barclays"/><category term="Bardin"/><category term="Barry Irwin"/><category term="Base rate"/><category term="Beersheba"/><category term="Behavior Analysis"/><category term="Belarus"/><category term="Belgium"/><category term="Bell AH-1 Cobra"/><category term="Belmarsh"/><category term="Ben Curtis"/><category term="Ben Medlock"/><category term="Benazir Bhutto International Airport"/><category term="Bernhard Riemann"/><category term="Beşiktaş"/><category term="Bill Rammell"/><category term="Bill Schuster"/><category term="BioCatch"/><category term="Biological warfare"/><category term="Biometrics"/><category term="Birmingham"/><category term="BitDefender"/><category term="Bitstamp"/><category term="Black Sea"/><category term="Black Sea Fleet"/><category term="Black market"/><category term="BlackBerry"/><category term="Bletchley Park"/><category term="Block chain"/><category term="Bob"/><category term="Bob Brown"/><category term="Boeing"/><category term="Boeing 737 MAX"/><category term="Boeing 787 Dreamliner"/><category term="Boeing AH-64 Apache"/><category term="BokoHaram"/><category term="Booz-Allen"/><category term="Booz-Allen Hamilton"/><category term="Border"/><category term="Border Security Force"/><category term="Boris Yeltsin"/><category term="Borno State"/><category term="Bosnia Herzegovina"/><category term="Boston Consulting Group"/><category term="Bradley Manning"/><category term="Bram Cohen"/><category term="Brazil"/><category term="British Army"/><category term="British Empire"/><category term="British Insurance Brokers Association"/><category term="Broadband"/><category term="Bruce Schneier"/><category term="Brunei"/><category term="Brunei Darussalam"/><category term="Burma"/><category term="Business Continuity"/><category term="Business Insider"/><category term="CERN"/><category term="CMOS"/><category term="CSDP"/><category term="CSEC"/><category term="Cairo"/><category term="Cambridge University"/><category term="Canadian Institute of International Affairs"/><category term="Canadian Security Intelligence Service"/><category term="Capital One"/><category term="Capital punishment"/><category term="Car bomb"/><category term="Carl von Clausewitz"/><category term="Carnegie Corporation of New York"/><category term="Carnegie Endowment for International Peace"/><category term="Carnegie Mellon University"/><category term="Catherine Ashton"/><category term="Caucasus"/><category term="Ceasefire"/><category term="Celaton"/><category term="Cell Phones"/><category term="Cell site"/><category term="Censorship"/><category term="Center for Public Integrity"/><category term="Central Asia"/><category term="Central Bureau of Investigation"/><category term="Central Military Commission"/><category term="Central Sulawesi"/><category term="Centre for the Protection of National Infrastructure"/><category term="Charitable organization"/><category term="Charlie Hebdo"/><category term="Check Point"/><category term="Chengdu"/><category term="Chiba Institute of Technology"/><category term="Chief Minister"/><category term="Chief executive officer"/><category term="Chief financial officer"/><category term="Chief information officer"/><category term="Chief information security officer"/><category term="Chief of police"/><category term="Chihuahua"/><category term="Chinese"/><category term="Chinese government"/><category term="Chinese style name"/><category term="Chris Woods"/><category term="Christmas"/><category term="Christmas Eve"/><category term="Christof Heyns"/><category term="Christopher Andrew"/><category term="Chrome Web Store"/><category term="Ciudad Juarez"/><category term="Civil liberties"/><category term="Classified information"/><category term="Climate change"/><category term="Cluley"/><category term="Cobra"/><category term="Cofer Black"/><category term="Cohen"/><category term="Coinbase"/><category term="Colchester"/><category term="College of Europe"/><category term="Colombia"/><category term="Colour revolution"/><category term="Combustor"/><category term="Command-line interface"/><category term="Commission"/><category term="Common Gateway Interface"/><category term="Commonwealth Bank"/><category term="Commonwealth of Independent States"/><category term="Communications Security Establishment Canada"/><category term="Communist Party"/><category term="Communist Party of China"/><category term="Communist Party of India"/><category term="Communist Party of the Philippines"/><category term="Computer file"/><category term="Computer network operations"/><category term="Consultants"/><category term="Control system"/><category term="Conventional Warfare"/><category term="Coronal mass ejection"/><category term="Corsham"/><category term="Counter -Terrorism"/><category term="Counter-Terrorism Rapid Prototyping"/><category term="Counterinsurgency"/><category term="Country code top-level domain"/><category term="Creativity"/><category term="Crimea"/><category term="Croatia"/><category term="Cryptography"/><category term="Cyber Innovation Center"/><category term="Cyber Warriors Team"/><category term="Cyberthreats"/><category term="Cyberwar"/><category term="DAS"/><category term="DEF CON"/><category term="DOD"/><category term="Daily Princetonian"/><category term="Dakota State University"/><category term="Dallas"/><category term="Dan Clements"/><category term="Dancho Danchev"/><category term="Daniel Patrick Boyd"/><category term="Danny Yatom"/><category term="Dari"/><category term="DarkMarket"/><category term="Darktrace"/><category term="Data Protection Act 1998"/><category term="Data Retention"/><category term="Data center"/><category term="Data set"/><category term="Data warehouse"/><category term="David Copeland"/><category term="David Omand"/><category term="David Stirling"/><category term="David Willetts"/><category term="Dawood Ibrahim"/><category term="December 2011"/><category term="Deep Blue"/><category term="DeepWeb"/><category term="Defacement (flag)"/><category term="Default (finance)"/><category term="Defence"/><category term="Defence Intelligence Organisation"/><category term="Defence Signals Directorate"/><category term="Defense Advanced Research Projects Agency"/><category term="Defense News"/><category term="Delhi Police"/><category term="Delta Air Lines"/><category term="Democracy"/><category term="Democratic Republic of Afghanistan"/><category term="Denial of Service"/><category term="Department of Defense"/><category term="Department of Home Affairs"/><category term="Department of National Defence"/><category term="Department of Telecommunication"/><category term="Deputy Inspector General of Police"/><category term="Derrick Harris"/><category term="Detica"/><category term="Detroit"/><category term="Deutsche Telekom"/><category term="Deutsche Welle"/><category term="Dhaka"/><category term="Digital forensics"/><category term="DigitalGlobe"/><category term="Directories"/><category term="Distance Learning"/><category term="Dmitry Medvedev"/><category term="Dmitry Rogozin"/><category term="DoT"/><category term="Domain Name System"/><category term="Domain name registrar"/><category term="Domain specificity"/><category term="Donetsk"/><category term="Driessen"/><category term="Drones"/><category term="Dropbox"/><category term="Drug lord"/><category term="Ductility"/><category term="Duqu"/><category term="Durango"/><category term="Dutch"/><category term="Dutch Hosting Provider Association"/><category term="Dutch Military Intelligence &amp; Security Service"/><category term="Dylan Boyd"/><category term="E-Trade"/><category term="E-learning"/><category term="EBay"/><category term="ECA"/><category term="ENISA"/><category term="ERP"/><category term="ETA"/><category term="ETH Zurich"/><category term="Earth"/><category term="Earth&#39;s magnetic field"/><category term="East Africa University"/><category term="East Asia Summit"/><category term="East Germany"/><category term="East Java"/><category term="Eastern Partnership"/><category term="Eastleigh"/><category term="Economic Times"/><category term="Economics"/><category term="EgyptSat-1"/><category term="Ehsanullah Ehsan"/><category term="Eighth Avenue (Manhattan)"/><category term="El Al"/><category term="Elbit Systems"/><category term="Electromagnetic Spectrum"/><category term="Eli Lake"/><category term="Email address"/><category term="Embedded system"/><category term="Emergency service"/><category term="Energy"/><category term="England"/><category term="English language"/><category term="Enriched uranium"/><category term="Enterprise resource planning"/><category term="Equipment"/><category term="Equipment and Supplies"/><category term="Ergenekon"/><category term="Estonia"/><category term="Ethics"/><category term="Ethiopia"/><category term="Eunice Reddick"/><category term="Europe"/><category term="European Cybercrime Centre"/><category term="Europol"/><category term="Evan"/><category term="Everdream"/><category term="Evin Prison"/><category term="Executive Branch"/><category term="Explosive detection"/><category term="Explosive material"/><category term="Extortionist Hacker"/><category term="FAA"/><category term="FAIRMONT"/><category term="FAQ"/><category term="FTC"/><category term="Facial recognition system"/><category term="Faisal Shahzad"/><category term="Falkland Islands"/><category term="Falklands War"/><category term="Feb 15  2012"/><category term="Federal Air Marshal Service"/><category term="Federal Communications Commission"/><category term="Federal Reserve Bank of New York"/><category term="Federal Security Service (Russia)"/><category term="Federal Trade Commission"/><category term="Federally Administered Tribal Areas"/><category term="Feige"/><category term="Ferguson"/><category term="Fiberlink"/><category term="Field-programmable gate array"/><category term="Filesharing"/><category term="Filezilla"/><category term="Financial"/><category term="Financial Crimes Enforcement Network"/><category term="Financial crisis"/><category term="Firefox"/><category term="Firmware"/><category term="Floppy disk controller"/><category term="Forbes Avenue"/><category term="Force.com"/><category term="Fordo"/><category term="Foreign Intelligence Service (Russia)"/><category term="Foreign Intelligence Surveillance Act"/><category term="Foreign Intelligence Surveillance Court"/><category term="Foreign Internal Defense"/><category term="Foreign Minister"/><category term="Foreign Office"/><category term="Foreign Policy"/><category term="Foreign Policy Research Institute"/><category term="Foreign Secretary David Miliband"/><category term="Foreign and Commonwealth Office"/><category term="Foreign direct investment"/><category term="Fort Gordon"/><category term="Fort Leavenworth"/><category term="Francis Maude"/><category term="Frankfurt Airport"/><category term="Fraud"/><category term="Free Syrian Army"/><category term="Free and open source software"/><category term="Freedom and Justice Party"/><category term="Freedom of the press"/><category term="Frequency comb"/><category term="Fritz Zwicky"/><category term="Fukushima"/><category term="Fukushima Daiichi Nuclear Power Plant"/><category term="Fukushima Prefecture"/><category term="Fusion"/><category term="Fusion-io"/><category term="Future Issues"/><category term="GE Intelligent Platforms"/><category term="GEOINT"/><category term="Gadchiroli district"/><category term="Galgala"/><category term="Garcia Simental"/><category term="Gareth Williams"/><category term="Gartner"/><category term="Gary McKinnon"/><category term="Gaza"/><category term="General Intelligence and Security Service"/><category term="General People&#39;s Congress"/><category term="GeoEye"/><category term="GeoEye-2"/><category term="George"/><category term="George C. Marshall Institute"/><category term="George Smiley"/><category term="George W Bush"/><category term="George W. Bush"/><category term="George Washington University Law School"/><category term="Geospatial intelligence"/><category term="German"/><category term="Getty Images"/><category term="Gilani"/><category term="GitHub"/><category term="Giulio Douhet"/><category term="Glenn Greenwald"/><category term="Global Positioning System"/><category term="Global Television Network"/><category term="Global Times"/><category term="Global commons"/><category term="Global financial crisis of 2008–2009"/><category term="Global financial system"/><category term="Globalization"/><category term="Glonass"/><category term="Gloria Macapagal-Arroyo"/><category term="Glossary of chess"/><category term="Gloucestershire"/><category term="Goodluck Jonathan"/><category term="Google Alerts"/><category term="Google Search"/><category term="Google Social Graph API"/><category term="Gov 2.0"/><category term="Gov 2.0 Summit"/><category term="Government Accountability Office"/><category term="Government Communication Headquarters"/><category term="Government Communications Security Bureau"/><category term="Government agency"/><category term="Government of India"/><category term="Government of Sweden"/><category term="Government of the People&#39;s Republic of China"/><category term="Government of the United Kingdom"/><category term="Grand Rapids  Michigan"/><category term="Grand Valley State University"/><category term="Graphics"/><category term="Grenade launcher"/><category term="Grum"/><category term="Grumman"/><category term="Guangdong"/><category term="Guatemala"/><category term="Gujarat"/><category term="Gulf War"/><category term="Gurgaon"/><category term="Guzmán"/><category term="HCL Technologies"/><category term="HGST"/><category term="HSBC"/><category term="HTML"/><category term="HTTP Strict Transport Security"/><category term="Hacker"/><category term="Hacker News"/><category term="Hadhramaut"/><category term="Hafiz Gul Bahadur"/><category term="Haiti"/><category term="Hamas government"/><category term="Hamid Karzai"/><category term="Han Chinese"/><category term="Hans Blix"/><category term="Harare Declaration"/><category term="Harrison"/><category term="Hash function"/><category term="Hassan Dahir Aweys"/><category term="Havex"/><category term="Hazardous waste"/><category term="Health"/><category term="Hector Levesque"/><category term="Helmand Province"/><category term="Her Majesty&#39;s Government"/><category term="Herrmann"/><category term="Hewlett Packard"/><category term="Hewlett-Packard"/><category term="Hinckley Institute of Politics"/><category term="History"/><category term="Hizballah"/><category term="Holland"/><category term="Holmes"/><category term="Homeland Security Department"/><category term="Honda"/><category term="Honeypots"/><category term="Hossein Derakhshan"/><category term="Hotmail"/><category term="House"/><category term="Houthis"/><category term="Hu Jintao"/><category term="Hudson Street"/><category term="Hugo Chávez"/><category term="Human Rights Watch"/><category term="Human Rights and Liberties"/><category term="Hyper-V"/><category term="IACR"/><category term="ICIJ"/><category term="ICO"/><category term="ICQ"/><category term="ICS"/><category term="ICT"/><category term="ID fraudsters"/><category term="IDG"/><category term="IGCI"/><category term="IOPS"/><category term="IOS"/><category term="IPad"/><category term="IRGC"/><category term="IRobot"/><category term="ISIL"/><category term="ITIC"/><category term="ITU"/><category term="Iain Lobban"/><category term="Ice IX"/><category term="Identity document"/><category term="Identity theft"/><category term="Idlib"/><category term="Illinois"/><category term="Image scanner"/><category term="Imperial College London"/><category term="Imperva"/><category term="Indian Army"/><category term="Indian Navy"/><category term="Indian Ocean Rim Association for Regional Cooperation"/><category term="Indian government"/><category term="Indiana"/><category term="Industrial espionage"/><category term="Inmarsat"/><category term="Institute of Nuclear Materials Management"/><category term="Institutions"/><category term="Insurance"/><category term="Intel-sharing"/><category term="Intelligence"/><category term="Intelligence Bureau"/><category term="Intelligence and Terrorism Information Center"/><category term="Internally displaced person"/><category term="International Association of Chiefs of Police"/><category term="International Committee of the Red Cross"/><category term="International Maritime Bureau"/><category term="International Security Assistance Force"/><category term="International Space Station"/><category term="International waters"/><category term="Internet Explorer"/><category term="Internet Governance Forum"/><category term="Internet Protocol"/><category term="Internet Security Alliance"/><category term="Internet Storm Center"/><category term="Internet access"/><category term="Internet censorship"/><category term="Internet censorship in Syria"/><category term="Iran Israel"/><category term="Iran Nuclear Program"/><category term="Iranian Revolution"/><category term="Iranian rial"/><category term="Iraqi"/><category term="Iraqi Army"/><category term="Iraqi National Intelligence Service"/><category term="Iraqi security forces"/><category term="Iron Dome"/><category term="Islamic Courts Union"/><category term="Islamic Jihad Movement in Palestine"/><category term="Islamic Movement of Uzbekistan (IMU)"/><category term="Islamic Republic News Agency"/><category term="Islamic charities"/><category term="Islamic republic"/><category term="Israel Aerospace Industries"/><category term="Israel Defense Forces"/><category term="Israel-Palestine"/><category term="Israeli Air Force"/><category term="Israeli Declaration of Independence"/><category term="Israeli–Palestinian conflict"/><category term="Istanbul"/><category term="Italian Franco Lamolinara"/><category term="Ivan Lewis"/><category term="Izz ad-Din al-Qassam"/><category term="JL-2"/><category term="JW Marriott Hotels"/><category term="Jack Clark"/><category term="Jack Jones"/><category term="Jalisco"/><category term="James Steinberg"/><category term="James Ujaama"/><category term="Jamestown Foundation"/><category term="Jammu"/><category term="Jammu  and Kashmir"/><category term="Jammu and Kashmir"/><category term="Jane"/><category term="Jane&#39;s Information Group"/><category term="Janet Napolitano"/><category term="Japan Atomic Energy Agency"/><category term="Jeh Johnson"/><category term="Jerry Sanders"/><category term="Jihadism"/><category term="Jim Duffy"/><category term="Jim Wolf"/><category term="John Grieve Centre"/><category term="John Harrison"/><category term="John Howard"/><category term="John Key"/><category term="John Naughton"/><category term="Joint Chiefs of Staff"/><category term="Joint Special Operations Command"/><category term="Jonathan Coleman"/><category term="Jonathan Evans"/><category term="Jordan"/><category term="Julia Angwin"/><category term="Julian Assange"/><category term="Justice and Development Party"/><category term="Justice ministry"/><category term="Juárez Cartel"/><category term="Kadir Has University"/><category term="Kashmir"/><category term="Kayhan"/><category term="Kenneth Clarke"/><category term="Kenny MacAskill"/><category term="Kenyans"/><category term="Key (cryptography)"/><category term="Keystroke logging"/><category term="Khoo Boon Hui"/><category term="Khyber Pakhtunkhwa"/><category term="Knappenberger"/><category term="Knowledge discovery"/><category term="Koblenz"/><category term="Kofi Annan"/><category term="Korean Central News Agency"/><category term="Kunduz Province"/><category term="Kurdistan Worker"/><category term="Kuwait"/><category term="LATVIA"/><category term="LIDAR"/><category term="Labour"/><category term="Laden"/><category term="Lancaster University"/><category term="Large Hadron Collider"/><category term="Las Vegas"/><category term="Latakia"/><category term="Law Council of Australia"/><category term="Law Enforcement"/><category term="Law Society"/><category term="Law enforcement in Algeria"/><category term="Law enforcement in the United Kingdom"/><category term="Law of the European Union"/><category term="Law of the Netherlands"/><category term="Learning platform"/><category term="Leaseweb"/><category term="Lebanon"/><category term="Lecturer"/><category term="Legacy system"/><category term="Legitimacy (political)"/><category term="Levant"/><category term="Library Journal"/><category term="Library of Congress"/><category term="Libyan"/><category term="Lima"/><category term="Linksys"/><category term="Liquid"/><category term="List of diplomatic missions of Syria"/><category term="List of space agencies"/><category term="Lockerbie"/><category term="Lockheed Martin F-35 Lightning II"/><category term="Lockheed Martin RQ-170 Sentinel"/><category term="London Metropolitan University"/><category term="Long Island"/><category term="Los Angeles"/><category term="Los Zeta"/><category term="Los Zetas"/><category term="Los Zetas Cartel"/><category term="Lower Manhattan"/><category term="Lunar Precursor Robotic Program"/><category term="Lunar Reconnaissance Orbiter"/><category term="Luxembourg"/><category term="Lyon"/><category term="MENA"/><category term="MIDI"/><category term="MIVD"/><category term="MOX fuel"/><category term="Macedonia"/><category term="Machine learning"/><category term="Maginot Line"/><category term="Magnetic Levitation"/><category term="Mahanagar Telephone Nigam Limited"/><category term="Maharashtra"/><category term="Maher Center"/><category term="Mahmoud Abbas"/><category term="Mainland China"/><category term="Majid Shahriari"/><category term="Maksim Mrvica"/><category term="Malawi"/><category term="Malekpour"/><category term="Maltego"/><category term="Manhattan Project"/><category term="Manila"/><category term="Mansion House  London"/><category term="Manuel Noriega"/><category term="Manufacturing"/><category term="Maoism"/><category term="Margaret Thatcher"/><category term="Mark Russinovich"/><category term="Market research"/><category term="Marouf al-Bakhit"/><category term="Marriott International"/><category term="Martin Mignot"/><category term="Martin Scheinin"/><category term="Martin Vargic"/><category term="Mary Landrieu"/><category term="Maryland"/><category term="Masoud Alimohammadi"/><category term="Mass media"/><category term="Math"/><category term="Matthew Hansen"/><category term="Maude"/><category term="Mazatlán"/><category term="McDonnell Douglas F-4 Phantom II"/><category term="Mediterranean"/><category term="Megaupload"/><category term="Metal detector"/><category term="Methylenedioxypyrovalerone"/><category term="Metropolitan Police Service"/><category term="Michael Geist"/><category term="Michael Ross"/><category term="Michel Juneau-Katsuya"/><category term="Michiel Steltman"/><category term="Microsoft Excel"/><category term="Microsoft PowerPoint"/><category term="Middle East Media Research Institute"/><category term="Mike Rogers"/><category term="Mikheil Saakashvili"/><category term="Militant Islamic Network"/><category term="Military of Mali"/><category term="Military of Yemen"/><category term="Mine Warfare"/><category term="Minibus"/><category term="Minister for the Cabinet Office"/><category term="Minister of Justice (Canada)"/><category term="Minister of Public Safety"/><category term="Ministry of Foreign Affairs of the People&#39;s Republic of China"/><category term="Ministry of Home Affairs (India)"/><category term="Missouri"/><category term="Mitsubishi Heavy Industries"/><category term="Moammar Gadhafi"/><category term="Mobile app"/><category term="Mobile computing"/><category term="Mobile phone"/><category term="Mohammad Sidique Khan"/><category term="Mohammed Junaid Babar"/><category term="Mohammed Yusuf"/><category term="Mombasa"/><category term="Money mule"/><category term="MongoDB"/><category term="Mons"/><category term="Monzer al-Kassar"/><category term="Moran"/><category term="Moro Islamic Liberation Front"/><category term="Morse code"/><category term="Mostafa Ahmadi-Roshan"/><category term="Motion Picture Association of America"/><category term="Mountain View  California"/><category term="Movement for the Emancipation of the Niger Delta"/><category term="Moxie Marlinspike"/><category term="Muammer Güler"/><category term="Muhammad"/><category term="Mumbai Police"/><category term="Municipal Corporation"/><category term="Municipal solid waste"/><category term="Muttahida Qaumi Movement"/><category term="MySQL"/><category term="NCR Corporation"/><category term="NEWSWIRE"/><category term="NIST"/><category term="NSFOCUS"/><category term="NTC"/><category term="NYPD"/><category term="Nahid Almanea"/><category term="Najibullah Zazi"/><category term="Nakba Day"/><category term="Narilam"/><category term="Nasrin Soltankhah"/><category term="National Academies Press"/><category term="National Applications Office"/><category term="National Association of Manufacturers"/><category term="National Australia Bank"/><category term="National Bank of Ukraine"/><category term="National Counterterrorism Center"/><category term="National Crime Agency"/><category term="National Cyber Security Awareness Month"/><category term="National Defence Radio Establishment"/><category term="National Defense University"/><category term="National Institute of Standards and Technology"/><category term="National Oil Corporation"/><category term="National Police"/><category term="National Security Advisor"/><category term="National Security Council"/><category term="National Security Database"/><category term="National Security Guard"/><category term="National Security Guards"/><category term="National Security Letter"/><category term="National Telecommunications and Information Administration"/><category term="Naval Postgraduate School"/><category term="Nawaz Sharif"/><category term="Naxal"/><category term="Naxalite"/><category term="Neil MacDonald"/><category term="Neiman Marcus"/><category term="Nelson Mandela"/><category term="Net neutrality"/><category term="Netezza"/><category term="Network Segmentation"/><category term="Network Time Protocol"/><category term="Network packet"/><category term="New Jersey"/><category term="New START"/><category term="New York City Police Department"/><category term="New York Community Bank"/><category term="News Corporation"/><category term="News International"/><category term="News agency"/><category term="Nick Warner"/><category term="Niqāb"/><category term="No-fly zone"/><category term="NoSQL"/><category term="Nokia"/><category term="North Carolina"/><category term="Northeastern University"/><category term="Northrop Grumman Electronic Systems"/><category term="November 2012"/><category term="Nuclear"/><category term="Nuclear reactor"/><category term="Nuclear safety"/><category term="Nuclear weapons testing"/><category term="Nyenrode Business University"/><category term="OPM"/><category term="OSCE"/><category term="OTTAWA"/><category term="Occupy Central"/><category term="Office Open XML"/><category term="Office of Field Operations"/><category term="Office of National Assessments"/><category term="Office of the Comptroller of the Currency"/><category term="Office of the Director of National Intelligence"/><category term="Oguz Celikkol"/><category term="Oil exploration in Puntland"/><category term="Oleg Gordievsky"/><category term="Ollanta Humala"/><category term="Olympia"/><category term="Olympic"/><category term="Omar Khyam"/><category term="Omar Suleiman"/><category term="Online banking"/><category term="Open source hardware"/><category term="Operation Ababil"/><category term="Operations security"/><category term="Optics Express"/><category term="Organization for Security and Co-operation in Europe"/><category term="Oussama Kassir"/><category term="Outlook Web App"/><category term="OxOmar"/><category term="P. Chidambaram"/><category term="PC World"/><category term="PCI Express"/><category term="PKK"/><category term="Pacific Northwest National Laboratory"/><category term="PadPin"/><category term="Pakistan Army"/><category term="Pakistan Muslim League"/><category term="Pakistan Navy"/><category term="Pakistan People"/><category term="Palestinian political violence"/><category term="Pan Am Flight 103"/><category term="Panama"/><category term="Pandemiya"/><category term="Parliamentary Office of Science and Technology"/><category term="Parties"/><category term="Pashentchev"/><category term="Patrick Meier"/><category term="Paul Broun"/><category term="Paul Martin"/><category term="Payment processor"/><category term="Peace process in the Israeli–Palestinian conflict"/><category term="Pearson"/><category term="Peoples Republic of China"/><category term="Personally identifiable information"/><category term="Peru"/><category term="Peter MacKay"/><category term="Peter Mutharika"/><category term="Philippine"/><category term="Philippine National Police"/><category term="Philippines"/><category term="Philosophy"/><category term="Phishing"/><category term="Phoenix Convention Center"/><category term="Phoning home"/><category term="Pittsburgh"/><category term="Police Coast Guard"/><category term="Police officer"/><category term="Polipo"/><category term="Political divisions of Mexico"/><category term="Political party"/><category term="Political science"/><category term="Politics of Sri Lanka"/><category term="Politics of the Netherlands"/><category term="Popular Resistance Committee"/><category term="Portugal"/><category term="Poster"/><category term="PostgreSQL"/><category term="Postmedia News"/><category term="Powys County Council"/><category term="Predictive analytics"/><category term="President of Afghanistan"/><category term="President of Egypt"/><category term="Press TV"/><category term="Prime Minister of Australia"/><category term="Prime Minister of Pakistan"/><category term="Prince Mohammed bin Nayef"/><category term="Prison"/><category term="Private sector"/><category term="Privately held company"/><category term="Program management"/><category term="Proprietary software"/><category term="Protect IP Act"/><category term="Public"/><category term="Public key certificate"/><category term="Public-key cryptography"/><category term="Puntland"/><category term="Python (programming language)"/><category term="QEMU"/><category term="Qasim al Raymi"/><category term="Qasim al-Raymi"/><category term="Qatar"/><category term="Qinghai"/><category term="Quds Force"/><category term="Queensland Newspapers"/><category term="Quinn Norton"/><category term="R. James Woolsey  Jr."/><category term="RIA Novosti"/><category term="RSA Conference"/><category term="Race and ethnicity in the United States Census"/><category term="Rackspace"/><category term="Radicalisation"/><category term="Radioactive contamination"/><category term="Radioactive decay"/><category term="Raleigh"/><category term="Raman spectroscopy"/><category term="Ramnit"/><category term="Ransomware (malware)"/><category term="Raqqa"/><category term="Raspberry Pi"/><category term="Raw material"/><category term="Rawalpindi"/><category term="Rebellion"/><category term="Recording Industry Association of America"/><category term="Red Army Faction"/><category term="Red Brigade"/><category term="Red Sea"/><category term="Reddit"/><category term="Relational database"/><category term="Reliance Communications"/><category term="Religion and Spirituality"/><category term="Republic Day"/><category term="Republican Party"/><category term="Republican People&#39;s Party"/><category term="Research  Analysis Wing"/><category term="Research Centre for East European Studies"/><category term="Research and Analysis Wing"/><category term="Research and development"/><category term="Research reactor"/><category term="Reverse engineering"/><category term="Reza Taghipour"/><category term="Rezwan Ferdaus"/><category term="Richard Dearlove"/><category term="Richard Garwin"/><category term="Richard O&#39;Dwyer"/><category term="Risk Mitigation"/><category term="Ritz-Carlton"/><category term="Riyadh"/><category term="Robert Fisk"/><category term="Robert Mueller"/><category term="Robert Seldon Lady"/><category term="Robin Hood"/><category term="Rodong Sinmun"/><category term="Rogers"/><category term="Rose Gottemoeller"/><category term="Ross J. Anderson"/><category term="Rovio"/><category term="Royal Artillery"/><category term="Royal Commonwealth Society"/><category term="Royal Institute of Technology"/><category term="Royal Marine"/><category term="Royal Television Society"/><category term="Royal United Services Institute"/><category term="Ruhr University Bochum"/><category term="Russell Weigley"/><category term="Russia and Georgia"/><category term="Russian Air Force"/><category term="Russian Federal Space Agency"/><category term="SANS Institute"/><category term="SAP AG"/><category term="SBN"/><category term="SDF"/><category term="STOCKHOLM"/><category term="SWOT analysis"/><category term="Saba"/><category term="Sabrine Saad"/><category term="Sabu"/><category term="Saeed Malekpour"/><category term="Salafi"/><category term="Saleh"/><category term="Sami Abu Zuhri"/><category term="San Fernando  Tamaulipas"/><category term="Sana a"/><category term="Sarpanch"/><category term="Satellite phone"/><category term="Saudi Interior Ministry"/><category term="Savannah"/><category term="Science and Technology"/><category term="Scottish Government"/><category term="Scud"/><category term="Seaglider"/><category term="Search"/><category term="Search Engines"/><category term="Seattle Post-Intelligencer"/><category term="Secrecy"/><category term="Secret Intelligence Service"/><category term="Seculert"/><category term="Secure Shell"/><category term="SecureWorks"/><category term="Security certificate"/><category term="Security guard"/><category term="Seidman College of Business"/><category term="Semtech"/><category term="Sensemaking"/><category term="Serbia"/><category term="Service Providers"/><category term="Sevastopol"/><category term="Sewage treatment"/><category term="Seward"/><category term="ShadowCrew"/><category term="Shane MacDougall"/><category term="Sharif Ahmed"/><category term="Shebaa Farms"/><category term="Sheikh Hasina"/><category term="Sheikh Mohamed Tantawi"/><category term="Shimon Peres"/><category term="Shin Bet"/><category term="Ships"/><category term="Shostack"/><category term="Sichuan University"/><category term="Sidoarjo"/><category term="Simurgh"/><category term="Singapore Airshow"/><category term="Situation awareness"/><category term="Skandinaviska Enskilda Banken"/><category term="SkyTran"/><category term="Sleep deprivation"/><category term="Smart Grid"/><category term="Snowden"/><category term="Sochi"/><category term="Social engineering"/><category term="Social network"/><category term="Social science"/><category term="Societal Issues"/><category term="Society and Culture"/><category term="Solar Dynamics Observatory"/><category term="Solar flare"/><category term="Soldier"/><category term="Solicitation"/><category term="Somali American"/><category term="Somali Civil War"/><category term="Somali Football Federation"/><category term="Somali National Movement"/><category term="Somali people"/><category term="Somaliland"/><category term="Somerset County  New Jersey"/><category term="Sony"/><category term="Sorm"/><category term="Source code"/><category term="South Korea"/><category term="Southeast Asia"/><category term="Southwark Crown Court"/><category term="Soviet"/><category term="Space"/><category term="Space Weather Prediction Center"/><category term="Space science"/><category term="Sparkhill"/><category term="Special Boat Service"/><category term="Special Forces"/><category term="Special Reconnaissance"/><category term="Splunk"/><category term="Sri Lanka Army"/><category term="Sri Lankan"/><category term="Stahl"/><category term="Stanford University"/><category term="State Department"/><category term="StegAlyzerAS"/><category term="Stereoscopy"/><category term="Steven Aftergood"/><category term="Steven Fox"/><category term="Stop It"/><category term="Strait of Hormuz"/><category term="Stratasys"/><category term="Sudan"/><category term="Suez Canal"/><category term="Sufi Muhammad"/><category term="Sulim Yamadayev"/><category term="Sun"/><category term="Sunni"/><category term="Sunni Arab"/><category term="Sunni Islam"/><category term="Supermicro"/><category term="Supreme Headquarters Allied Powers Europe"/><category term="Supreme Leader of Iran"/><category term="Surveillance Catalog"/><category term="Susilo Bambang Yudhoyono"/><category term="Swedbank"/><category term="Sweden"/><category term="Swedish Military Intelligence and Security Service"/><category term="Swedish Security Service"/><category term="SwiftKey"/><category term="Swine influenza"/><category term="Syrian"/><category term="Syrian Air"/><category term="Syrian Embassy"/><category term="Syrian Telecom"/><category term="Süddeutsche Zeitung"/><category term="TTP"/><category term="Ta&#39;izz"/><category term="Tal Afar"/><category term="Tallinn"/><category term="Tamil Tiger"/><category term="Tamil language"/><category term="Tamper Data"/><category term="Tank truck"/><category term="Target Corporation"/><category term="Tata Communications"/><category term="Tbilisi"/><category term="Tehrik-i-Taliban Pakistan"/><category term="Telecommunications service"/><category term="Telephone tapping"/><category term="Terence P. Jeffrey"/><category term="Terrorist training camp"/><category term="Terry Greer"/><category term="Terry Winograd"/><category term="Text file"/><category term="Theft"/><category term="Thomson Reuters"/><category term="Threat model"/><category term="ThreatMetrix"/><category term="Thunderstruck"/><category term="Thuraya"/><category term="Thursday"/><category term="Tiananmen Square"/><category term="Tijuana"/><category term="Tim McKnight"/><category term="Times Now"/><category term="Times Roman"/><category term="Tokyo Institute of Technology"/><category term="Tomahawk"/><category term="Tor"/><category term="Tor missile system"/><category term="Torture"/><category term="Toulouse"/><category term="Trade union"/><category term="Train station"/><category term="Training"/><category term="Trans-Tasman"/><category term="Travel and Tourism"/><category term="Treaty on Conventional Armed Forces in Europe"/><category term="Tripoli"/><category term="Trusteer"/><category term="Turing Machine"/><category term="Turkish Air Force"/><category term="Turkmenistan"/><category term="Typeface"/><category term="U.S government"/><category term="U.S. Customs and Border Protection"/><category term="U.S. Immigration and Customs Enforcement"/><category term="U.S. Navy Seals"/><category term="U.S. government"/><category term="U.S. outside Iran"/><category term="U.S.-flagged Maersk Alabama"/><category term="UAS"/><category term="UK Justice Minister"/><category term="UK government"/><category term="UNCLOS"/><category term="US Air Force"/><category term="USB flash drive"/><category term="UTC"/><category term="Ukrainian Navy"/><category term="Ullrich"/><category term="Umar Farouk Abdulmutallab"/><category term="United Kingdom"/><category term="United Nation"/><category term="United Nations Office on Drugs and Crime"/><category term="United Nations Special Rapporteur"/><category term="United States Army"/><category term="United States Army Air Corps"/><category term="United States Army Air Forces"/><category term="United States Army Combined Arms Center"/><category term="United States Army Corps of Engineers"/><category term="United States Capitol"/><category term="United States Department of Commerce"/><category term="United States Department of Energy"/><category term="United States Department of Justice"/><category term="United States House Committee on Armed Services"/><category term="United States House Committee on Science  Space and Technology"/><category term="United States House Permanent Select Committee on Intelligence"/><category term="United States National Research Council"/><category term="United States Navy Armed Guard"/><category term="United States Navy SEALs"/><category term="United States Senate Committee on Appropriations"/><category term="Universal Serial Bus"/><category term="University College London"/><category term="University of Bremen"/><category term="University of Bristol"/><category term="University of Pennsylvania"/><category term="University of Southampton"/><category term="University of St Andrews"/><category term="University of Tulsa"/><category term="Univision"/><category term="Unlawful Activities (Prevention) Act"/><category term="Uranium"/><category term="Urumqi"/><category term="Ushahidi"/><category term="Utah"/><category term="Uyghur people"/><category term="VBMS"/><category term="VML"/><category term="Vector"/><category term="Venezuela"/><category term="Veracruz"/><category term="Verisign"/><category term="Vernor Vinge"/><category term="Veterans Benefits Administration"/><category term="Vice Admiral"/><category term="Vienne"/><category term="Vietnam"/><category term="Virtual Revolution"/><category term="Virtual currency"/><category term="Virtual reality"/><category term="Virus"/><category term="Visa"/><category term="Vladimir Kryuchkov"/><category term="Vladimir Putin"/><category term="Vodafone"/><category term="Vostok Battalion"/><category term="WSJ"/><category term="War"/><category term="War Powers Resolution"/><category term="War in Afghanistan (2001–present)"/><category term="Wardak Province"/><category term="Warsaw"/><category term="Washington"/><category term="Washington DC Terrorism"/><category term="Washington Metro"/><category term="Washington Post"/><category term="Waste Isolation Pilot Plant"/><category term="Wastewater"/><category term="Water supply"/><category term="WeCU Technologies"/><category term="Weapon"/><category term="Web application security"/><category term="Web crawler"/><category term="Web search engine"/><category term="West"/><category term="West Midlands"/><category term="West Yorkshire Police"/><category term="Western Hemisphere Travel Initiative"/><category term="Western world"/><category term="White House Iraq Group"/><category term="White hat (computer security)"/><category term="Wi-Fi"/><category term="Williams"/><category term="Windows PowerShell"/><category term="Windows Server"/><category term="Windows Server 2003"/><category term="Windows Vista"/><category term="Winter Olympic Games"/><category term="Wireless"/><category term="Wireless network"/><category term="Woodrow Wilson School of Public and International Affairs"/><category term="World Economic Forum"/><category term="World Trade Organization"/><category term="World Wide Web Consortium"/><category term="Xinjiang"/><category term="Yemeni Congregation for Reform"/><category term="Yomiuri Shimbun"/><category term="York"/><category term="Yousaf Raza Gillani"/><category term="Yucca Mountain"/><category term="ZTE"/><category term="Zabadani"/><category term="Zakariya Boyd"/><category term="Zeus Trojan"/><category term="Zine El Abidine Ben Ali"/><category term="Zionism"/><category term="Zionist entity"/><category term="Zscaler"/><category term="Zurich Financial Services"/><category term="al-Arabiya"/><category term="al-Jazeera"/><category term="base-rate"/><category term="bigdata"/><category term="dangeer"/><category term="fund raising"/><category term="iSIGHT Partners"/><category term="linear model"/><category term="security analyst"/><category term="transfer"/><category term="trojan horse"/><category term="violence"/><category term="wiretapping"/><category term="Ümraniye"/><category term="İzmir"/><title type='text'>The OSINT Journal</title><subtitle type='html'>The OSINT Journal provides news, information, intelligence,  analysis and opinions based on open sources, OSINT, on major issues related to global security and intelligence gathering and analysis</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://theosintjournal.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>674</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-3545541372504803798</id><published>2015-10-10T12:25:00.005+01:00</published><updated>2015-10-10T12:25:50.867+01:00</updated><title type='text'>Gangs of Detroit: OSINT and Indictment Documents</title><summary type="text">&lt;!--[if !mso]&gt;

v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}

&lt;![endif]--&gt;
&lt;!--[if gte mso 9]&gt;
 
  12.00
 
&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;
 
  Normal
  0
  false
  
  
  
  false
  false
  false
  
  EN-GB
  X-NONE
  X-NONE
  
   
   
   
   
   
   
   
   
   
   
   
  
  
   
   
   
   
   
   
</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/3545541372504803798'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/3545541372504803798'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/10/gangs-of-detroit-osint-and-indictment.html' title='Gangs of Detroit: OSINT and Indictment Documents'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-1138348722280983630</id><published>2015-10-10T11:46:00.004+01:00</published><updated>2015-10-10T11:46:58.695+01:00</updated><title type='text'>Criminal procedure and the digital revolution</title><summary type="text">&lt;!--[if !mso]&gt;

v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}

&lt;![endif]--&gt;
&lt;!--[if gte mso 9]&gt;
 
  12.00
 
&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;
 
  Normal
  0
  false
  
  
  
  false
  false
  false
  
  EN-GB
  X-NONE
  X-NONE
  
   
   
   
   
   
   
   
   
   
   
   
  
  
   
   
   
   
   
   
</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/1138348722280983630'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/1138348722280983630'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/10/criminal-procedure-and-digital.html' title='Criminal procedure and the digital revolution'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-7916422105675148553</id><published>2015-10-10T11:39:00.000+01:00</published><updated>2015-10-10T11:41:10.096+01:00</updated><title type='text'>OSINT | Introducing Gavel</title><summary type="text">&lt;!--[if !mso]&gt;

v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}

&lt;![endif]--&gt;
&lt;!--[if gte mso 9]&gt;
 
  12.00
 
&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;
 
  Normal
  0
  false
  
  
  
  false
  false
  false
  
  EN-GB
  X-NONE
  X-NONE
  
   
   
   
   
   
   
   
   
   
   
   
  
  
   
   
   
   
   
   
</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/7916422105675148553'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/7916422105675148553'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/10/osint-introducing-gavel.html' title='OSINT | Introducing Gavel'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-2404266866629943064</id><published>2015-10-06T11:30:00.000+01:00</published><updated>2015-10-10T11:31:31.263+01:00</updated><title type='text'>Researcher warns about Security Loopholes in Denmark&#39;s Largest Bank</title><summary type="text">&lt;!--[if !mso]&gt;

v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}

&lt;![endif]--&gt;
&lt;!--[if gte mso 9]&gt;
 
  12.00
 
&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;
 
  Normal
  0
  false
  
  
  
  false
  false
  false
  
  EN-GB
  X-NONE
  X-NONE
  
   
   
   
   
   
   
   
   
   
   
   
  
  
   
   
   
   
   
   
</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/2404266866629943064'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/2404266866629943064'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/10/researcher-warns-about-security.html' title='Researcher warns about Security Loopholes in Denmark&#39;s Largest Bank'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlmFYQxJRhLdfuvG5MhBHhBEzG-NNxvoywH21Z0PG5CTl_flffckYw2Gz7b313LWyTBMSxvnunVdMyOj7OAsa9I-s8oUodptiRW2DZEHpgD-LJ7ASlHVNFIpzjPMkjOjB49FBhRrfOUME/s72-c/Screenshot_1.png" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-4402015238194641434</id><published>2015-07-24T20:25:00.000+01:00</published><updated>2015-07-24T20:26:41.247+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CyberSecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyberthreats"/><category scheme="http://www.blogger.com/atom/ns#" term="Extortionist Hacker"/><category scheme="http://www.blogger.com/atom/ns#" term="Risk Mitigation"/><title type='text'>Ashley Madison Extortion Attack: Critical Lessons For Enterprise Cybersecurity</title><summary type="text">&lt;!--[if !mso]&gt;

v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}

&lt;![endif]--&gt;
&lt;!--[if gte mso 9]&gt;
 
  Normal
  0
  false
  
  
  
  false
  false
  false
  
  EN-GB
  X-NONE
  X-NONE
  
   
   
   
   
   
   
   
   
   
   
   
  
  MicrosoftInternetExplorer4
  
   
   
   
   
   
   
   
   
   
   
</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/4402015238194641434'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/4402015238194641434'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/07/ashley-madison-extortion-attack.html' title='Ashley Madison Extortion Attack: Critical Lessons For Enterprise Cybersecurity'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-5922551385738917755</id><published>2015-07-24T20:21:00.000+01:00</published><updated>2015-07-24T20:27:07.532+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CyberSecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="DOD"/><category scheme="http://www.blogger.com/atom/ns#" term="OPM"/><category scheme="http://www.blogger.com/atom/ns#" term="US Air Force"/><title type='text'>Air Force continues to work with DOD, OPM on cybersecurity incident</title><summary type="text">&lt;!--[if !mso]&gt;

v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}

&lt;![endif]--&gt;


Posted 7/23/2015&amp;nbsp;&amp;nbsp;&amp;nbsp;Updated 7/22/2015 &amp;nbsp;

Secretary of the Air Force Public Affairs Command Information 

7/23/2015&amp;nbsp;-&amp;nbsp;WASHINGTON (AFNS)&amp;nbsp;--&amp;nbsp;The Air Force
maintains its commitment to </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/5922551385738917755'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/5922551385738917755'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/07/air-force-continues-to-work-with-dod.html' title='Air Force continues to work with DOD, OPM on cybersecurity incident'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-2835912649310658686</id><published>2015-07-24T20:11:00.000+01:00</published><updated>2015-07-24T20:11:14.960+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="CyberSecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Data Retention"/><category scheme="http://www.blogger.com/atom/ns#" term="Europe"/><category scheme="http://www.blogger.com/atom/ns#" term="France"/><category scheme="http://www.blogger.com/atom/ns#" term="Surveillance"/><title type='text'>French Surveillance Law Implicates Internet Service Providers, Web Hosts</title><summary type="text">
by&amp;nbsp;Nicole Henderson&amp;nbsp;on&amp;nbsp;Friday, July 24 2015


Internet
 service providers in France will have to install black boxes that 
analyze users’ metadata and alert authorities of possible terrorist 
activity under the country’s sweeping surveillance bill, which the 
Constitutional Council approved on Thursday night.

According
 to a report by the Wall Street Journal, the law overhauls </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/2835912649310658686'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/2835912649310658686'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/07/french-surveillance-law-implicates.html' title='French Surveillance Law Implicates Internet Service Providers, Web Hosts'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-3486129200961128669</id><published>2015-07-08T13:42:00.001+01:00</published><updated>2015-07-08T13:54:48.660+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ARM architecture"/><category scheme="http://www.blogger.com/atom/ns#" term="Embedded system"/><category scheme="http://www.blogger.com/atom/ns#" term="Intel"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet of Things"/><category scheme="http://www.blogger.com/atom/ns#" term="Python (programming language)"/><category scheme="http://www.blogger.com/atom/ns#" term="Raspberry Pi"/><category scheme="http://www.blogger.com/atom/ns#" term="Twitter"/><title type='text'>Hacked Opinions: Vulnerability disclosure – Ryan Smith</title><summary type="text">

       
        
        
         Credit:
           
           Jen Anderson
          
        
       
   



  
Accuvant&#39;s Ryan Smith talks about disclosure, bounty programs, and vulnerability marketing





 
 
 
 
 
 
  
 


















 
 


 
















 






 
 



&amp;nbsp;
       
     
      
      
      
      
     
















By Steve Ragan
   


CSO |
    
    
</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/3486129200961128669'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/3486129200961128669'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/07/hacked-opinions-vulnerability.html' title='Hacked Opinions: Vulnerability disclosure – Ryan Smith'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-1204285424072795944</id><published>2015-07-07T13:23:00.000+01:00</published><updated>2015-07-08T13:28:43.779+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="American Civil Liberties Union"/><category scheme="http://www.blogger.com/atom/ns#" term="Citizen Lab"/><category scheme="http://www.blogger.com/atom/ns#" term="Electronic Frontier Foundation"/><category scheme="http://www.blogger.com/atom/ns#" term="Facial recognition system"/><category scheme="http://www.blogger.com/atom/ns#" term="Indiana"/><category scheme="http://www.blogger.com/atom/ns#" term="National Telecommunications and Information Administration"/><category scheme="http://www.blogger.com/atom/ns#" term="Sudan"/><category scheme="http://www.blogger.com/atom/ns#" term="United Nations"/><title type='text'>Hacking Team hit by breach; leak suggests it sold spyware to oppressive regimes</title><summary type="text">



    
The 
elusive Italian spyware and hacking tool provider -- particularly for 
law enforcement -- had its corporate insides revealed over the weekend.



                            
    
                
            

By Zack Whittaker
            
                    
                    for Zero Day
        
                                        |            July 6, 2015 -- 04:07 GMT (</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/1204285424072795944'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/1204285424072795944'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/07/hacking-team-hit-by-breach-leak.html' title='Hacking Team hit by breach; leak suggests it sold spyware to oppressive regimes'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-1249466246080326076</id><published>2015-05-23T12:03:00.001+01:00</published><updated>2015-05-23T12:07:23.231+01:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Computer security"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber-attack"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyberwarfare"/><category scheme="http://www.blogger.com/atom/ns#" term="Data breach"/><category scheme="http://www.blogger.com/atom/ns#" term="Floppy disk controller"/><category scheme="http://www.blogger.com/atom/ns#" term="GitHub"/><category scheme="http://www.blogger.com/atom/ns#" term="Hyper-V"/><category scheme="http://www.blogger.com/atom/ns#" term="MIDI"/><category scheme="http://www.blogger.com/atom/ns#" term="QEMU"/><category scheme="http://www.blogger.com/atom/ns#" term="VMware"/><title type='text'>Just how lethal is the software flaw dubbed &amp;#39;Venom&amp;#39;?</title><summary type="text">
It&#39;s not as widespread as the Heartbleed vulnerability, according to experts. But the flaw threatens the security of data centers and virtual computer environments.&amp;nbsp;


  By Jaikumar Vijayan, Correspondent  May 14, 2015

&amp;nbsp; 





A recently discovered software bug known as &quot;Venom&quot;&amp;nbsp;could give criminal hackers access to business data stored in the cloud or on in-house systems.
But the</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/1249466246080326076'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/1249466246080326076'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/05/just-how-lethal-is-software-flaw-dubbed.html' title='Just how lethal is the software flaw dubbed &amp;#39;Venom&amp;#39;?'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-1937183777779012189</id><published>2015-02-24T08:18:00.001+00:00</published><updated>2015-02-24T08:21:23.810+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AT&amp;T"/><category scheme="http://www.blogger.com/atom/ns#" term="Broadband"/><category scheme="http://www.blogger.com/atom/ns#" term="CyberSecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Federal Communications Commission"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet access"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet service provider"/><category scheme="http://www.blogger.com/atom/ns#" term="Net neutrality"/><category scheme="http://www.blogger.com/atom/ns#" term="Telecommunications service"/><category scheme="http://www.blogger.com/atom/ns#" term="United States"/><title type='text'>Open Internet Archives</title><summary type="text">




Open Internet

Ensuring that every American has access to open and robust high-speed Internet service.






Open Internet Archives





The &quot;Open Internet&quot; is the Internet as we know it. It&#39;s open because it uses free, publicly available standards that anyone can access and build to, and it treats all traffic that flows across the network in roughly the same way. The principle of the Open </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/1937183777779012189'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/1937183777779012189'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/02/open-internet-archives.html' title='Open Internet Archives'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-5211810079720953016</id><published>2015-02-11T13:37:00.001+00:00</published><updated>2015-02-11T13:40:58.419+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cell site"/><category scheme="http://www.blogger.com/atom/ns#" term="CyberSecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Data breach"/><category scheme="http://www.blogger.com/atom/ns#" term="Director of National Intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="Espionage"/><category scheme="http://www.blogger.com/atom/ns#" term="Federal Bureau of Investigation"/><category scheme="http://www.blogger.com/atom/ns#" term="Intelligence"/><category scheme="http://www.blogger.com/atom/ns#" term="United States"/><title type='text'>A New Cyber Agency is Born</title><summary type="text">

English: Seal of the United States Department of Homeland Security. (Photo credit: Wikipedia)







E-Notes






Lawrence Husick is an FPRI Senior Fellow, Co-Chair of FPRI’s Center for the Study of Terrorism, and Co-director of FPRI’s Wachman Center project on Teaching about Innovation. 





Lawrence Husick

February 2015

On February 10, 2015, Lisa Monaco, assistant to the president for </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/5211810079720953016'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/5211810079720953016'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/02/a-new-cyber-agency-is-born.html' title='A New Cyber Agency is Born'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-2289670704123655857</id><published>2015-01-30T17:58:00.001+00:00</published><updated>2015-01-30T18:00:42.035+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Automated teller machine"/><category scheme="http://www.blogger.com/atom/ns#" term="Bitcoin"/><category scheme="http://www.blogger.com/atom/ns#" term="BitPay"/><category scheme="http://www.blogger.com/atom/ns#" term="Bitstamp"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer security"/><category scheme="http://www.blogger.com/atom/ns#" term="Mt.Gox"/><category scheme="http://www.blogger.com/atom/ns#" term="Payment processor"/><category scheme="http://www.blogger.com/atom/ns#" term="Theft"/><category scheme="http://www.blogger.com/atom/ns#" term="Virtual currency"/><title type='text'>Scammers Steal $11 Million in Bitcoins Over Four Years: Study</title><summary type="text">




by&amp;nbsp;Chris Burt&amp;nbsp;on&amp;nbsp;Thursday, January 29 2015, 11:20 am


At least $11 million worth of bitcoins have been stolen via scams in the last four years, according to researchers from Southern Methodist University. The actual total value of bitcoins scammed is likely far higher, as it counts only those scams which the researchers were able to track the revenue of.
Cybersecurity </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/2289670704123655857'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/2289670704123655857'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/01/scammers-steal-11-million-in-bitcoins.html' title='Scammers Steal $11 Million in Bitcoins Over Four Years: Study'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-615482288054482415</id><published>2015-01-30T14:29:00.001+00:00</published><updated>2015-01-30T14:36:43.605+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Border"/><category scheme="http://www.blogger.com/atom/ns#" term="Federal Aviation Administration"/><category scheme="http://www.blogger.com/atom/ns#" term="Firmware"/><category scheme="http://www.blogger.com/atom/ns#" term="McDonnell Douglas F-4 Phantom II"/><category scheme="http://www.blogger.com/atom/ns#" term="No-fly zone"/><category scheme="http://www.blogger.com/atom/ns#" term="United States"/><category scheme="http://www.blogger.com/atom/ns#" term="Washington DC"/><category scheme="http://www.blogger.com/atom/ns#" term="White House"/><title type='text'>DJI Mandatory Firmware Update Will Disable Camera Drones in Washington DC’s No Fly Zone</title><summary type="text">Published on January 28, 2015 by Michael Zhang 



Yesterday we reported that a DJI Phantom quadcopter operator had accidentally crashed his camera drone onto the lawn of the White House at 3 in the morning, causing a security panic among those tasked with ensuring the President’s safety (later reports suggest the man was drunk).
&amp;nbsp;DJI wants to make sure this type of incident never happens </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/615482288054482415'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/615482288054482415'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/01/dji-mandatory-firmware-update-will.html' title='DJI Mandatory Firmware Update Will Disable Camera Drones in Washington DC’s No Fly Zone'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-7790273421407958140</id><published>2015-01-30T14:14:00.001+00:00</published><updated>2015-01-30T14:14:22.220+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Bitcoin"/><category scheme="http://www.blogger.com/atom/ns#" term="Financial"/><category scheme="http://www.blogger.com/atom/ns#" term="ISIS"/><title type='text'>Islamic State Reportedly Uses Bitcoin for Anonymous Financial Transactions</title><summary type="text">&lt;!--[if !mso]&gt;

v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}

&lt;![endif]--&gt;
&lt;!--[if gte mso 9]&gt;
 
  Normal
  0
  false
  
  
  
  false
  false
  false
  
  EN-US
  X-NONE
  X-NONE
  
   
   
   
   
   
   
   
   
   
   
   
  
  
   
   
   
   
   
   
   
   
   
   
   
  
&lt;![endif]--&gt;&lt;!--[if </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/7790273421407958140'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/7790273421407958140'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/01/islamic-state-reportedly-uses-bitcoin.html' title='Islamic State Reportedly Uses Bitcoin for Anonymous Financial Transactions'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-6192793842433585168</id><published>2015-01-29T18:05:00.000+00:00</published><updated>2015-01-30T18:08:18.693+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Airports Authority of India"/><category scheme="http://www.blogger.com/atom/ns#" term="Asynchronous Transfer Mode"/><category scheme="http://www.blogger.com/atom/ns#" term="Burma"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer security"/><category scheme="http://www.blogger.com/atom/ns#" term="Ministry of Home Affairs (India)"/><category scheme="http://www.blogger.com/atom/ns#" term="Singapore"/><title type='text'>Singapore Creates Central Agency for National Cybersecurity Operations</title><summary type="text">





by&amp;nbsp;Chris Burt&amp;nbsp;on&amp;nbsp;Wednesday, January 28 2015, 1:00 pm




Singapore is tightening its cybersecurity operations with the launch of a central agency and a new minister in charge of cybersecurity, according to a report by Reuters. 
Singapore’s national cybersecurity operations will be taken over by the new Cyber Security Agency (CSA) under the direction of the Prime Minister’s </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/6192793842433585168'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/6192793842433585168'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/01/singapore-creates-central-agency-for.html' title='Singapore Creates Central Agency for National Cybersecurity Operations'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-333397617022357054</id><published>2015-01-22T12:28:00.001+00:00</published><updated>2015-01-30T18:09:49.027+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="3D printing"/><category scheme="http://www.blogger.com/atom/ns#" term="CyberSecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Field-programmable gate array"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Open source hardware"/><category scheme="http://www.blogger.com/atom/ns#" term="Raw material"/><category scheme="http://www.blogger.com/atom/ns#" term="Washington DC"/><title type='text'>Researchers create inexpensive versions of NSA&amp;#39;s spying tools</title><summary type="text">

Posted on 21 January 2015.
ShmooCon, the hacker convention that welcomes individuals interested in all aspects of computer and information security, was held last week in Washington, D.C.  Among the speakers invited to share their knowledge and projects were also Michael Ossman, a wireless security researcher who makes hardware for hackers, Dominic Spill, a developer working on many </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/333397617022357054'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/333397617022357054'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/01/researchers-create-inexpensive-versions.html' title='Researchers create inexpensive versions of NSA&amp;#39;s spying tools'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-3071726768567448068</id><published>2015-01-21T17:40:00.001+00:00</published><updated>2015-01-30T18:14:05.140+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Brian Krebs"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber-attack"/><category scheme="http://www.blogger.com/atom/ns#" term="CyberSecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyberwarfare"/><category scheme="http://www.blogger.com/atom/ns#" term="Denial-of-service attack"/><category scheme="http://www.blogger.com/atom/ns#" term="Federal Bureau of Investigation"/><category scheme="http://www.blogger.com/atom/ns#" term="Hacker (computer security)"/><category scheme="http://www.blogger.com/atom/ns#" term="hackers"/><title type='text'>Hackers Hit Lizard Squad DDoS-as-a-Service, Leak Customer Data</title><summary type="text">




by&amp;nbsp;Chris Burt&amp;nbsp;on&amp;nbsp;Wednesday, January 21 2015, 11:23 am


Hacker group Lizard Squad’s DDoS-for-hire service has been hacked, and a list of all 14,241 customers, complete with payment method and account information, has been leaked, KrebsonSecurity reports. The groups troubles were further compounded when one alleged member was arrested on Friday by UK law enforcement and charged</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/3071726768567448068'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/3071726768567448068'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/01/hackers-hit-lizard-squad-ddos-as.html' title='Hackers Hit Lizard Squad DDoS-as-a-Service, Leak Customer Data'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-3774343544503893790</id><published>2015-01-21T15:53:00.001+00:00</published><updated>2015-01-30T18:11:53.820+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AAI RQ-7 Shadow"/><category scheme="http://www.blogger.com/atom/ns#" term="Agdam Rayon"/><category scheme="http://www.blogger.com/atom/ns#" term="Armed Forces of Armenia"/><category scheme="http://www.blogger.com/atom/ns#" term="Armed Forces of the Islamic Republic of Iran"/><category scheme="http://www.blogger.com/atom/ns#" term="Azerbaijan"/><category scheme="http://www.blogger.com/atom/ns#" term="Drones"/><category scheme="http://www.blogger.com/atom/ns#" term="Military"/><category scheme="http://www.blogger.com/atom/ns#" term="Poland"/><category scheme="http://www.blogger.com/atom/ns#" term="United States"/><category scheme="http://www.blogger.com/atom/ns#" term="Unmanned aerial vehicle"/><title type='text'>Poland Launches Tactical Drone Tender</title><summary type="text">



 By Jaroslaw Adamowski 2:49 p.m. EST January 19, 2015









(Photo: CARL COURT, AFP/Getty Images)




WARSAW — Poland&#39;s Ministry of Defense has launched a tender to acquire 12 sets of middle-range tactical unmanned aerial vehicles and 15 sets of mini-UAVs for the armed forces. The ministry says it is aiming to significantly boost the military&#39;s surveillance capacity.
All initial bids are </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/3774343544503893790'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/3774343544503893790'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/01/poland-launches-tactical-drone-tender.html' title='Poland Launches Tactical Drone Tender'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-7915638868980716335</id><published>2015-01-21T13:41:00.001+00:00</published><updated>2015-01-30T18:15:10.808+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cloud computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Command-line interface"/><category scheme="http://www.blogger.com/atom/ns#" term="CyberSecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Open Source"/><category scheme="http://www.blogger.com/atom/ns#" term="PostgreSQL"/><category scheme="http://www.blogger.com/atom/ns#" term="Public-key cryptography"/><category scheme="http://www.blogger.com/atom/ns#" term="Secure Shell"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability (computing)"/><title type='text'>Open source tool trawls Github repositories for sensitive data</title><summary type="text">
 Michael Henriksen, a member of the SoundCloud security team, has been recently tasked with creating a system that will constantly check the company&#39;s GitHub organizations (i.e. repositories) for unintentionally leaked sensitive information.

He did it, and at the same time has developed an open source, command line tool that can be used for occasional checks of the same nature both by companies</summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/7915638868980716335'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/7915638868980716335'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/01/open-source-tool-trawls-github.html' title='Open source tool trawls Github repositories for sensitive data'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-6863101519142021145</id><published>2015-01-20T17:48:00.000+00:00</published><updated>2015-01-30T18:13:00.827+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Access to Information Act"/><category scheme="http://www.blogger.com/atom/ns#" term="Canada"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber-threat"/><category scheme="http://www.blogger.com/atom/ns#" term="Electronic Warfare"/><category scheme="http://www.blogger.com/atom/ns#" term="Surveillance"/><title type='text'>Physical Breach Highlights Security Holes at Canada’s Electronic Surveillance Agency</title><summary type="text">


by&amp;nbsp;Chris Burt&amp;nbsp;on&amp;nbsp;Tuesday, January 20 2015, 3:14 pm


The new headquarters of Canada’s electronic surveillance agency had an “extreme vulnerability” which was inadvertently breached by firefighters responding to an emergency call, the Toronto Star reports. The Canadian Communications Security Establishment (CSE) revealed the vulnerability by sending uncensored documents in </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/6863101519142021145'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/6863101519142021145'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/01/physical-breach-highlights-security.html' title='Physical Breach Highlights Security Holes at Canada’s Electronic Surveillance Agency'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-7129262800485004967</id><published>2015-01-19T19:35:00.001+00:00</published><updated>2015-01-30T18:16:36.611+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Anonymous (group)"/><category scheme="http://www.blogger.com/atom/ns#" term="Computer security"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber-attack"/><category scheme="http://www.blogger.com/atom/ns#" term="CyberSecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyberwarfare"/><category scheme="http://www.blogger.com/atom/ns#" term="Denial-of-service attack"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Twitter"/><title type='text'>Outage of Several French News Sites Not Caused by DDoS: Web Host Oxalide</title><summary type="text">





by&amp;nbsp;David Hamilton&amp;nbsp;on&amp;nbsp;Friday, January 16 2015, 2:49 pm


Starting at around 8:30am CET Friday morning, several French news websites including L’Express and Libération, were offline for approximately an hour.
These sites were all hosted by Oxalide, a web host with colocation space in Equinix data centers north of Paris, which has stated on Twitter that the incident went to the </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/7129262800485004967'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/7129262800485004967'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/01/outage-of-several-french-news-sites-not.html' title='Outage of Several French News Sites Not Caused by DDoS: Web Host Oxalide'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-2004430356615311688</id><published>2015-01-17T14:13:00.000+00:00</published><updated>2015-01-30T18:17:54.086+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber-attack"/><category scheme="http://www.blogger.com/atom/ns#" term="CyberSecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyberwarfare"/><category scheme="http://www.blogger.com/atom/ns#" term="Korean Central News Agency"/><category scheme="http://www.blogger.com/atom/ns#" term="North Korea"/><category scheme="http://www.blogger.com/atom/ns#" term="Nuclear weapons testing"/><category scheme="http://www.blogger.com/atom/ns#" term="South Korea"/><title type='text'>Hackers Wage ‘Jihad’ on French Websites, Name Swiss Bank Account Clients and Surveil Pyongyang Newsreaders</title><summary type="text">


View of downtown Pyongyang, capital of the North Korea // Maxim Tupikov/Shutterstock.com



 By  Aliya Sternstein  January 16, 2015

In case you missed our coverage this week in&amp;nbsp;ThreatWatch,&amp;nbsp;Nextgov’s&amp;nbsp;regularly updated index of cyber breaches:
Official North Korean News Site Injects Spyware into Visitors’ Computers
DPRK’s Korean Central News Agency is serving up more than just </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/2004430356615311688'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/2004430356615311688'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/01/hackers-wage-jihad-on-french-websites.html' title='Hackers Wage ‘Jihad’ on French Websites, Name Swiss Bank Account Clients and Surveil Pyongyang Newsreaders'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-2564866307194871858</id><published>2015-01-17T07:52:00.000+00:00</published><updated>2015-01-30T18:19:30.999+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Federal Bureau of Investigation"/><category scheme="http://www.blogger.com/atom/ns#" term="Germany"/><category scheme="http://www.blogger.com/atom/ns#" term="United States"/><category scheme="http://www.blogger.com/atom/ns#" term="White House"/><title type='text'>Cyber Intelligence Report – January 15, 2015</title><summary type="text">


Cyber Warfare&amp;nbsp;


Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI - January 15, 2015



ISRAEL
New agreement signed between Israel and Japan regarding cyber
The cooperation between Israel and Japan was recently announced. The purpose of this agreement is to strengthen and tighten relations between Israel and Japan, even attempting to reach levels of relations similar to other </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/2564866307194871858'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/2564866307194871858'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/01/cyber-intelligence-report-january-15.html' title='Cyber Intelligence Report – January 15, 2015'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry><entry><id>tag:blogger.com,1999:blog-5760850110489525993.post-8752537224674335158</id><published>2015-01-16T19:27:00.000+00:00</published><updated>2015-01-30T18:20:43.542+00:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Algiers"/><category scheme="http://www.blogger.com/atom/ns#" term="Charlie Hebdo"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyber-attack"/><category scheme="http://www.blogger.com/atom/ns#" term="CyberSecurity"/><category scheme="http://www.blogger.com/atom/ns#" term="Cyberwarfare"/><category scheme="http://www.blogger.com/atom/ns#" term="Islam"/><category scheme="http://www.blogger.com/atom/ns#" term="Law enforcement in Algeria"/><title type='text'>Thousands of French Websites Face DDoS Attacks Since Charlie Hebdo Massacre</title><summary type="text">





by&amp;nbsp;Chris Burt&amp;nbsp;on&amp;nbsp;Thursday, January 15 2015, 1:16 pm


Nineteen thousand French websites have been attacked since the Charlie Hebdo terrorist attacks last week, according to French military head of cyberdefense Adm. Arnaud Coustilliere. The attacks have been carried out by a variety of hackers, including “more or less structured groups” and some well-known Islamic groups, </summary><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/8752537224674335158'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5760850110489525993/posts/default/8752537224674335158'/><link rel='alternate' type='text/html' href='http://theosintjournal.blogspot.com/2015/01/thousands-of-french-websites-face-ddos.html' title='Thousands of French Websites Face DDoS Attacks Since Charlie Hebdo Massacre'/><author><name>theosintjournal</name><uri>http://www.blogger.com/profile/01714034800752350857</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='24' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVfoBTfBBvZ5U5MBgwEkINKi7eqJmZApccf8Z_29rQq16EfXb_OPjI-nbWB-BMIkmN4gdOQR4Xu5g4HwUIeh5-G86FfUvSq344x4n5pe_XSRkN1167zo3243iO_u_cnw/s220/Arcana.JPG'/></author></entry></feed>