This IO doesn’t look like anything to me
Current public analysis of information operations focuses on “hack and leak” operations and ‘inauthentic’ behavior on social media. This level of analysis ignores the pernicious strategic information operations that run across longer time spans. Case in point: We came across one of Dan Nowak’s 2013 keynotes where he touched on IceFog, a Chinese APT. Amongst …
You must be logged in to post a comment.