Warning: Use of undefined constant add_shortcode - assumed 'add_shortcode' (this will throw an Error in a future version of PHP) in /nfs/c03/h02/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/stray-quotes/stray_quotes.php on line 615

Warning: Use of undefined constant MSW_WPFM_FILE - assumed 'MSW_WPFM_FILE' (this will throw an Error in a future version of PHP) in /nfs/c03/h02/mnt/49321/domains/hackingtheuniverse.com/html/wp-content/plugins/wordpress-file-monitor/wordpress-file-monitor.php on line 39
Tag: information warfare

Archive for information warfare

You are browsing the archives of information warfare.

Integrated Attack Strategy

Integrated attack strategies involve combining hacking computer systems with attack vectors such as: espionage, blackmail, medical/health attacks, asymmetric “guerrilla-style” attacks, weapons of mass destruction, and conventional kinetic military attacks. The video below shows an example using a medical vector, and an unprotected printer, to compromise patient and identity records that can be used in future […]

Super Criminal from Silk Road

Ross Ulbricht is a super criminal like Lex Luthor in the Superman comics. Ross is the creator of the darknet trading post and web site known as “the Silk Road”. Named after the trade route of history that connected China and Europe, the Silk Road became an online black market where illicit goods could be […]


Kaspersky Lab uncovers online spy tools with potential NSA connections – [youtube.com] Equation Group: The Crown Creator of Cyber-Espionage – [kaspersky.com] For several years, Kaspersky Lab’s Global Research and Analysis Team (GReAT) has been closely monitoring more than 60 advanced threat actors responsible for cyber-attacks worldwide. The team has seen nearly everything, with attacks becoming […]

British Army “Twitter Brigade”

During World War II, the British Army created a commando/special forces unit called the “Chindits” that operated in Burma and India, using guerrilla warfare tactics to operate deeply behind Japanese lines. They were formally known as the 77th Indian Infantry Brigade and operated on foot, getting resupplied by parachute drops. They were known for collecting […]

Backdoor Meltdown

If the NSA has managed to inject backdoor access into most U.S. produced technology, they can win a victory in the intelligence war, but we the citizens may find it necessary to abandon some of the use of American technology ourselves. If we can make our enemies afraid that we can access their computers and […]

New OPSEC Controls in 800-53 rev4

NIST SP 800-53 includes the catalog of security controls that form the core of the “security bible” that is required guidance for federal agencies. NIST periodically reviews the list of controls and updates them. They are currently in the process of taking public comments on the latest revision (rev4) before they go “final”. Included in […]

Operations Security = OPSEC

Operations Security or OPSEC is about identifying critical information that can be used against you by an opponent and minimizing access to that information. This is a sub process of risk assessment and follows the same basic process flow: Characterization and scope determination Assessment of threats Assessment of vulnerabilities Likelihood and impact analysis Determine risk […]

Clouds Will Become APT Targets

Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. NIST SP 800-145 Advanced Persistent Threat APT or Advanced Persistent Threat describes cyber […]

Chinese Cyberwarfare Exposed

Slip-Up in Chinese Military TV Show Reveals More Than Intended – [theepochtimes.com] Piece shows cyber warfare against US entities A standard, even boring, piece of Chinese military propaganda screened in mid-July included what must have been an unintended but nevertheless damaging revelation: shots from a computer screen showing a Chinese military university is engaged in […]

Cyberwar Defined

War is violent conflict on a large scale, often involving organizations on a national scale. There are many different forms of war and many different levels. We use the terms; civil, conventional, nuclear, chemical, biological, guerilla, asymmetric, urban, jungle, naval, air, desert, trench, psychological, cold and more to describe types of war. A “cold” war […]