Tag Archives: Spy

Can Anyone Truly Be Anonymous Online?

The Internet is the single greatest information resource available to mankind today. Unfortunately, the Internet of today has become a… View Article

Posted in Privacy | Tagged , , , , , , , , , , , | 9 Comments

Is Blackphone the World’s First NSA Secure Phone?

If you’ve ever used PGP encryption to communicate over the internet, you may be familiar with its creator, Phil Zimmerman… View Article

Posted in Privacy | Tagged , , , , , , , , , , , , , , | 18 Comments

Squawk Box Broadcast 003

The Squawk Box Broadcast aims to highlight a few of the stories that have caught our attention recently. It’s also… View Article

Posted in ITS Information | Tagged , , , , , , , , , , , , , , , , , , , , | 2 Comments

Visiting the International Spy Museum: A Photo Tour

Ever since learing about the International Spy Museum‘s opening, back in July of 2002, I’ve wanted to visit. Being the… View Article

Posted in Tradecraft | Tagged , , , , , , , , , , , | 9 Comments

U.S. Spies: 4 Steps to Collect, Analyze and Make Intelligence Work For You

This entry is part 3 of 3 in the series U.S. Spies

3 of 3 in the series U.S. SpiesThe world can be an ugly place, even in the relative safety of… View Article

Posted in Tradecraft | Tagged , , , , , , , , | 6 Comments

U.S. Spies: The Intelligence Cycle from Delivery to Consumption

This entry is part 2 of 3 in the series U.S. Spies

2 of 3 in the series U.S. SpiesWhen I first considered entering the intelligence community (“IC”), the notion of classic… View Article

Posted in Tradecraft | Tagged , , , , , , , , , | 5 Comments

U.S. Spies: Understanding the World’s Second Oldest Profession

This entry is part 1 of 3 in the series U.S. Spies

1 of 3 in the series U.S. SpiesI’m often asked what I do and I feel obligated to respond, “I… View Article

Posted in Tradecraft | Tagged , , , , , , , , , | 14 Comments

Burner Phones and the Art of Remaining Anonymous

Sometimes red teams (the bad guys) are hired to test the capabilities of blue teams (the good guys). Some examples… View Article

Posted in Security | Tagged , , , , , , , , , , , , , | 43 Comments

Inside Red Team Operations, Part 3: Execute, Execute, Execute!

This entry is part 3 of 3 in the series Inside Red Team Operations

3 of 3 in the series Inside Red Team OperationsThis is the final article of the Inside Red Team Operations… View Article

Posted in Security | Tagged , , , , , , , , , , | 4 Comments

Using Red Teams Techniques and a Little Common Sense to Defeat Advanced Security Systems

Editor-in-Chief’s note: This post was written by security expert U. Fridman and originally ran on his company blog,  Red Teams…. View Article

Posted in Security | Tagged , , , , , | 5 Comments