Celsus Advisory Group

This IO doesn’t look like anything to me

Current public analysis of information operations focuses on “hack and leak” operations and ‘inauthentic’ behavior on social media. This level of analysis ignores the pernicious strategic information operations that run across longer time spans. Case in point: We came across one of Dan Nowak’s 2013 keynotes where he touched on IceFog, a Chinese APT. Amongst …

This IO doesn’t look like anything to meRead More »

Press Here For OPSEC

A few years ago, a keynote speaker from the Navy shared some wisdom at the RSA conference. He mentioned that their engineers design ships with the assumption that water can leak past the hull. And sure, that seems obvious, right? It’s better to maintain a low level of trust and plan ahead for failure. If only everyone …

Press Here For OPSECRead More »

Scroll to Top