Celsus Advisory Group

NATSEC

This IO doesn’t look like anything to me

Current public analysis of information operations focuses on “hack and leak” operations and ‘inauthentic’ behavior on social media. This level of analysis ignores the pernicious strategic information operations that run across longer time spans. Case in point: We came across one of Dan Nowak’s 2013 keynotes where he touched on IceFog, a Chinese APT. Amongst …

This IO doesn’t look like anything to me Read More »

Scroll to Top