📯

Intelligence

TagsEspionagecybersecurityinformation gatheringsecurity
Created
Updated

Requisites

Resources

Inside Network Perimeter Security (2nd Edition). Northcutt, Zeltser, Winter and Ritchey. 2005.

Introduction

What is Intelligence?

Security theats, policies, and mechanisms

Design issues

Crptography

Safety vs Security

Physical security

Geopolitics and microchips

https://www.youtube.com/watch?v=k_zz3239DA0&ab_channel=JohnnyHarris

Why does Intelligence matter to you?

Research

Secure channels

Ecosystem

Standards, jobs, industry, roles, …

Hacker One

Red teams

bug bounty hunter

Hacking, hackers, crackers, ….

Conferences

DefCon

BugCon

Rootedcon

Jobs

Intelligence Analysts

Culture

https://www.youtube.com/watch?v=przDcQe6n5o&ab_channel=Google

Story

FAQ

Worked examples

Chapter Name

https://kroki.io/#try

Prove

Notes

Worked examples

  1. Mathematics or Code. Automatic Verification such as Testing or Lean Proven?
  1. Languages in Anki.

FAQ

Further resources

Next steps

Intelligence assessment

Intelligence assessment, Intelligence or Intel (information gathering)

Espionage

Edward Snowden

Strategic intelligence

Military intelligence

Business intelligence

Police intelligence

References

Institutions

National Intelligence Centre in Mexico

Literature

Lerner, K. Lee and Brenda Wilmoth Lerner, eds. Encyclopedia of Espionage, Intelligence and Security (2003)

La seguridad nacional de México, una visión integradora

https://web.archive.org/web/20070612182250/https://www.cia.gov/library/intelligence-literature/index.html

https://www.youtube.com/watch?v=tUjBpvxupq8&ab_channel=ADNOpinión

Research

Journal of Information and Intelligence

Cyberwarfare

Operation Aurora

Mass media

Libres, L. V. n. h. (2018, April 13). LAS NOTICIAS SON PROPAGANDA - ABRE LOS OJOS. Youtube. Retrieved from https://www.youtube.com/watch?v=naleYSK-5y8&t=15s&ab_channel=LaVerdadnosharálibres

Social engineering

OSINT

USB Protection

https://github.com/USBGuard/usbguard

https://github.com/google/ukip

Law

Entropy

Hash functions

Encryption

Symmetric cryptography

Asymmetric cryptography

PGP and GPG

gpg -c file
gpg --decrypt file.asc

gpg --search-key DF0925CFEC52C98E4CEB826ADB57E52EDEE4E4D2

echo "Hello World! This is important. My real name is [email protected]" | gpg --encrypt --sign --armor -r DF0925CFEC52C98E4CEB826ADB57E52EDEE4E4D
gpg --armor --export DF0925CFEC52C98E4CEB826ADB57E52EDEE4E4D2
# Prints the GPG key ID, in ASCII armor format

Web of trust

Social proof

(Admin), X. G. (2022). A Practical Guide to GPG Part 1: Generate Your Public/Private Key Pair. LinuxBabe. Retrieved from https://www.linuxbabe.com/security/a-practical-guide-to-gpg-part-1-generate-your-keypair

Ellingwood, J. (2017). How To Use GPG to Encrypt and Sign Messages. DigitalOcean. Retrieved from https://www.digitalocean.com/community/tutorials/how-to-use-gpg-to-encrypt-and-sign-messages

Security and Cryptography. (2022, October 27). Retrieved from https://missing.csail.mit.edu/2020/security

GPG Keys Cheatsheet. (2022, November 02). Retrieved from https://rtcamp.com/tutorials/linux/gpg-keys

Spam?

Spam protection for public GPG keys? (2022, November 02). Retrieved from https://security.stackexchange.com/questions/119271/spam-protection-for-public-gpg-keys

Email

Plain text

Proton Email

Signal, Keybase

Full disk encryption

cryptsetup + LUKS on Linux, BitLocker on Windows, or FileVault on macOS.

Cracking tools

https://github.com/Ciphey/Ciphey

SSL, HTTPS, …

Yubikeys

Password manager

Authentication

Two-factor authentication

Backups

https://wiki.nikiv.dev/backups/

Useful idiot

Matrix (social app)

https://matrix.org/

5 eyes alliance

Federation

Tor

Zero-knowledge architecture

Zero-trust

Zero-knowledge proof

https://www.youtube.com/watch?v=HUs1bH85X9I&ab_channel=Computerphile

https://www.youtube.com/watch?v=cI5lkif-V1c&ab_channel=ALEXonScience

https://www.youtube.com/watch?v=yn6CPQ9RioA&ab_channel=IBMTechnology

AAA framework

IETF protocol for AAA

Kerberos

Open Radius

OAuth

SAML

Multi-tenant

SASL2 https://www.gnu.org/software/gsasl/

Secure channels

Authentication

Message integrity and confidentiality

Kerberos

Access control

General issues in access control

Firewals

Secure mobile code

Denials of service

Secure naming

Security management

Key management

Secure group management

Authorization management

Authority

Authorization

Accounting

FAQ

tor vs vpn

One, T. H. (2020, February 08). Tor vs VPN | Which one should you use for privacy, anonymity and security. Youtube. Retrieved from https://www.youtube.com/watch?v=6ohvf03NiIA&ab_channel=TheHatedOne

Cyber Intelligence

IMSI Catchers

Virus and Malware

"Malicious Software" de Eric L. Freudenthal,

"The Art of Computer Virus Research and Defense" by Peter Szor,

"Computer Viruses and Malware" by Markus Jakobsson and Zulfikar Ramzan

Computer Viruses and Malware by Jonh Aycock

https://github.com/mav8557/virus

TODO

CTF

USB Keystroke Injection Protection

Enlace Hacktivista. (2022, September 19). Retrieved from https://enlacehacktivista.org/index.php?title=Enlace_Hacktivista

OWASP

https://www.youtube.com/watch?v=ZrXhoT_tXFE&ab_channel=%24DebugSec%24

Rafael Bucio â  â µ on Twitter. (2022, October 01). Retrieved from https://twitter.com/Bucio/status/1575987501457494016

Children education

Welcome to Mara Turing Official Website for UK. (2021, March 07). Retrieved from https://maraturing.us

Mara Turing: El despertar de los hackers (The Awakening of the Hackers)

Physical security and cybersecurity – are they so different?

Security and Cryptography. (2022, October 27). Retrieved from https://missing.csail.mit.edu/2020/security

The Hated One - YouTube. (2022, October 30). Youtube. Retrieved from https://www.youtube.com/c/TheHatedOne/videos

Folker, R. (2016, August 22). Intelligence Research & Collection. Youtube. Retrieved from https://www.youtube.com/watch?v=onfCJiw6iEI&ab_channel=RobertFolker