Werzit

Intel - Regions
Cyber Space
Articles

"In God we trust.
All others we monitor."

Economics | History | Intelligence | Military | Regions | Religion | Terrorism

    

 

A Comparative Analysis of Cybersecurity Initiatives Worldwide
  • Authors: Myriam Dunn
  • Source: International Telecommunication Union
  • Issue: June 2005
  • Outline
  • PDF
  • URL
  •  

 

A Heart Device is Found Vulnerable to Hacker Attacks
  • Authors: Barnaby J. Feeder
  • Source: New York Times
  • Issue: March 12, 2008
  • DOC
  • Outline
  • URL
  •  

 

A Tool for Internet Chatroom Surveillance
  • Authors: Ahmet Camtepe
  • Source: RPI.edu
  • Issue: undated
  • Outline
  • PDF
  • URL
  •  

 

About Screwhead Types
  • Authors: Lara Specialty Tools
  • Source: Lara.com
  • DOC
  • URL
  •  

 

Activism, Hacktivism and Cyberterrorism
  • Authors: Dorothy E. Denning
  • Source: Rand Corporation
  • Issue: May 17, 2008
  • Outline
  • TXT
  • URL
  •  

 

Advanced Hardware Hacking Techniques
  • Authors: Joe Grand
  • Source: Grand Idea Studio
  • Issue: July 30, 2002
  • PPT
  • TXT
  • URL
  •  

 

Analysis of WEP and RC4 Algorithms
  • Authors: Sean Whalen
  • Source: Chocobosphore
  • Issue: March 2002
  • Outline
  • PDF
  • URL
  •  

 

Brute-Force Exploitations of Web Application Session IDs
  • Authors: David Endler
  • Source: iDEFENSE Labs
  • Issue: November 1, 2001
  • Outline
  • PDF
  • URL
  •  

 

Cold Boot Attacks on Hard Drive Encryption
  • Authors: Seth Schoen
  • Source: Electronic Frontier Foundation
  • Issue: 2008
  • Outline
  • PDF
  • TXT
  • URL
  •  

 

Critical Information Infrastructure: Vulnerabilities, Threats, and Responses
  • Authors: Myriam Dunn Cavelty
  • Source: Center for Security Studies
  • Issue: 2007
  • Outline
  • PDF
  • TXT
  • URL
  •  

Fiber Optics

 

Danger: Fiber Optic Intruders
  • Authors: Mickey McCarter
  • Source: Military Information Technology Online
  • Date: July 9, 2004
  • Issue: 5
  • Volume: 8
  •  

Data Mining

 

Email Traffic Patterns Can Reveal Ringleaders
  • Authors: Hazel Muir
  • Source: New Scientist
  • Issue: March 27, 2003
  • Outline
  • DOC
  • TXT
  • URL
  •  

 

Ethereal User's Guide
  • Authors: Richard Sharpe
  • Source: NS Computer Software and Services P/L
  • Issue: 2004
  • Outline
  • PDF
  • TXT
  • URL
  •  

 

 

FBI Criminal Investigation: Cisco Routers
  • Authors: Raul Roldan
  • Source: FBI
  • Issue: January 11, 2008
  • PPT
  • URL
  •  

 

 

FBI Fears Counterfeit Networking Equipment Could Compromise Security
  • Authors: K.C. James
  • Source: Information Week
  • Issue: May 12, 2008
  • DOC
  • URL
  •  

 WEP

 

Feds Can Own Your WLAN Too
  • Authors: Humphrey Cheung
  • Source: Tom's Networking
  • Issue: March 31, 2005
  • DOC
  • URL
  •  

Fiber Optics

 

Fiber Optics and Its Security Vulnerabilities
  • Authors: Kimberlie Witcher
  • Source: SANS Institute
  • Issue: February 17, 2005
  • Outline
  • PDF
  • TXT
  • URL
  •  

 

Forensic Examination of Digital Evidence
  • Authors: US Department of Justice
  • Source: US Department of Justice
  • Issue: April 2004
  • Outline
  • PDF
  • TXT
  • URL
  •  

Fiber Optics

 

Hacking at the Speed of Light
  • Authors: Sandra Kay Miller
  • Source: Access Control and Security Systems
  • Issue: April 1, 2006
  • Outline
  • PDF
  • TXT
  • URL
  •  

Fiber Optics

 

Hezbollah's Cyber Warfare Program
  • Authors: Kevin Coleman
  • Source: Defense Tech Blog
  • Date: June 2, 2008
  • DOC
  • URL
  •  

Fiber Optics

 

Hezbollah Phone Network Spat Sparks Beirut
  • Authors: Nicholas Blanford
  • Source: Christian Science Monitor
  • Date: May 9, 2008
  • Outline
  • DOC
  • URL
  •  

 

How to Find Hidden Cameras
  • Authors: Marc Roessler
  • Source: Manuscript
  • Issue: undated
  • Outline
  • PDF
  • TXT
  • URL
  •  

 

Identification Evasion
  • Authors: Adam Bresson
  • Source: Defcon 12
  • Outline
  • PDF
  • URL
  • ZIP
  •  

 Tempest

 

Information Leakage from Optical Emanations
  • Authors: Joe Loughry
  • Source: ACM Transactions on Information and System Security
  • Issue: August 2002
  • Outline
  • PDF
  • TXT
  • URL
  •  

 

Information Warfare: An Emerging and Preferred Tool of the People's Republic of China
  • Authors: William G. Perry
  • Source: Center for Security Policy
  • Issue: October 2007
  • Number: 28
  • Outline
  • PDF
  • TXT
  • URL
  •  

 

Information Warfare: Hype or Reality?
  • Authors: E. Anders Eriksson
  • Source: Non-Proliferation Review
  • Issue: Spring-Summer 1999
  • Outline
  • PDF
  • TXT
  • URL
  •  

Fiber Optics
VOIP

 

Lebanon: Hezbollah's Communications Network
  • Authors: Stratfor
  • Source: Stratfor.com
  • Date: May 9, 2008
  • DOC
  • URL
  •  

 

Make a Passive Network Tap
  • Authors: Hongjun Wu
  • Source: Instructuables
  • Issue: Undated
  • Outline
  • PDF
  • TXT
  • URL
  •  

 

Misuse of RC4 in Microsoft Word and Excel
  • Authors: Hongjun Wu
  • Source: Institute fo Infocomm Research, Singapore
  • Issue: Undated
  • Outline
  • PDF
  • TXT
  • URL
  •  

 

Moldova Uprising Organized on Twitter
  • Authors: Saeed Ahmed
  • Source: CNN
  • Issue: Undated
  • Outline
  • DOC
  • TXT
  • URL
  •  

Fiber Optics

 

Optical Nets Easier to Hack than Copper
  • Authors: Bryan Betts
  • Source: Techworld
  • Issue: April 27, 2007
  • Outline
  • PDF
  • TXT
  • URL
  •  

 Tempest

 

Optical Time-Domain Eavesdropping Risks of CRT Displays
  • Authors: Markus G. Kuhn
  • Source: IEEE Symposium on Security and Privacy
  • Issue: May 12-15, 2002
  • Outline
  • PDF
  • TXT
  • URL
  •  

 

Passive Information Gathering: The Analysis of Leaked Network Security Information
  • Authors: Gunter Ollman
  • Source: Next Generation Security Software Ltd.
  • Issue: January 2004
  • Outline
  • PDF
  • TXT
  • URL
  •  

Biometrics

 

Practical Techniques for Defeating Biometric Devices
  • Authors: Mark Lane and Lisa Lordan
  • Source: Dublin City University
  • Issue: undated
  • Outline
  • PDF
  • TXT
  • URL
  •  

 

 

Project Rogue Server
  • Authors: Jared Bouck
  • Source: InventGeek
  • Issue: January 21, 2006
  • Outline
  • DOC
  • TXT
  • URL
  •  

Fiber Optics

 

Protecting Your Network from Fiber Hacks
  • Authors: Tom Olzak
  • Source: Tech Republic
  • Issue: May 3, 2007
  • Outline
  • DOC
  • TXT
  • URL
  •  

DNS

 

Redirect Al Qaeda to Your Favorite Website
  • Authors: Nick Thompson
  • Source: Wired
  • Issue: April 10, 2009
  • Outline
  • DOC
  • URL
  •  

Fiber Optics

 

SCADA Security and Critical Infrastructure
  • Authors: Joe St. Sauver
  • Source: Eugene, Oregon Infragard Meeting
  • Issue: December 7, 2004
  • PPT
  • URL
  •  

Fiber Optics

 

Securing Fiber Optic Communications Against Optical Tapping Methods
  • Authors: Markus G. Kuhn
  • Source: Oyster Optics, Inc.
  • Issue: May 12-15, 2002
  • Outline
  • PDF
  • TXT
  • URL
  •  

 

Spain arrests 'prolific' hackers
  • Authors:  
  • Source: BBC
  • Issue: May 17, 2008
  • Outline
  • TXT
  • URL
  •  

 

SSLStrip Hacking Tool Released
  •  

 

Terrorist Capabilities for Cyberattack: Overview and Policy Issues
  • Authors: John Rollins and Clay Wilson
  • Source: Congressional Research Service
  • Issue: January 22, 2007
  • Outline
  • PDF
  • TXT
  • URL
  •  

Cell Phones

 

Use of Cell Phones for Active Monitoring in HUMINT Operations
  •  

 

Use of Proxy Servers in Gathering Open Source Intelligence, The
  •  

 

Using Memory Errors to Attack a Virtual Machine
  • Authors:Sudhakar Govindavahala, Andrew W. Appel
  • Source: Memo
  • Issue: undated
  • Outline
  • PDF
  •  

 

VICE - Catch the Hookers! Plus New Rootkit Techniques
  • Authors: Jamie Butler
  • Source: Defcon 12
  • PDF
  • URL
  • ZIP
  •  

 

Vulnerabilities of Submarine Cables
  • Authors: Rand Corporation
  • Source: Cryptome
  • Issue: 2001
  • Outline
  • DOC
  • PDF
  • URL
  •  

Fiber Optics

 

Vulnerability of Fiber Optic Infrastructure to Intrusion
  • Authors: Opterna
  • Source: Opterna
  • Issue: Undated
  • Outline
  • DOC
  • PDF
  • URL
  •  

 

Weaknesses in Satellite Television Protection Schemes
  • Authors: A
  • Source: Defcon 12
  • Outline
  • PPT
  • URL
  • ZIP
  •  

WEP

WEP Cracking, the FBI Way
  •