Celsus Advisory Group

INFOSEC

This IO doesn’t look like anything to me

Current public analysis of information operations focuses on “hack and leak” operations and ‘inauthentic’ behavior on social media. This level of analysis ignores the pernicious strategic information operations that run across longer time spans. Case in point: We came across one of Dan Nowak’s 2013 keynotes where he touched on IceFog, a Chinese APT. Amongst …

This IO doesn’t look like anything to meRead More »

Scroll to Top