intelligence gathering

The Asynchronous Nature of Asymmetric Cyberwarfare: Success Factors of Cyberattacks
Winning against an asymmetric cyberattack first requires we recognize an attack is occurring It has been given many names: soft war, non-linear war, unconventional hybrid warfare, cyber cold war, Cold War 2.0, ...

Insecure Storage Buckets Expose 1.8 Billion Online Posts Scraped for U.S. Military
A Pentagon contractor left three storage buckets publicly accessible on Amazon’s S3 service, exposing more than 1.8 billion online posts collected since 2009. The messages, posted by people from around the world, ...