Affiliation:
1. Independent Researcher, Germany
Abstract
New attacks and methods seen today indicate an emerging trend and dependency on reverse-engineered technology that was used in the past by espionage and intelligence agencies and their tactics as well as use of modern technology to obtain information and data that is turned into usable intelligence. One of the many disturbing consequences of this is that we are faced with attackers that are versed in stealth, deception, planting false information, and increased training in newer attack technologies that classical tools can no longer reliably find. In addition, advanced attack and deception skills now use OSINT (open source intelligence) data collection tactics that have moved entire attack chains into the espionage and surveillance realm.
Reference42 articles.
1. What is Cyber Warfare?
2. Balaouras, S., & Rose, A. (2012). Navigate The Future of The Security Organization. Forester Research. Retrieved January 28, 2014, from https://www.coresecurity.com/system/files/attachments/2013/07/navigate_future_of_security_organization.pdf
3. Employing Cost Effective Internet-Based Networking Technologies to Manage B2B Relationship
4. Bazzell, M. (2018a). Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information (6th ed.). Bazzell/Amazon Fulfillment.