BlogHide Resteemsodinthelibrarian (54)in informationwar • 7 years agoNuke the Hackers: In Defense of 'Traditional Responses' to Cyber WarfareNuke the Hackers: In Defense of 'Traditional Responses' to Cyber Warfare EU to Declare Cyber-Attacks "Act of War" At the end of last month, the EU drafted a diplomatic response framework to…odinthelibrarian (54)in informationwar • 7 years agoQuantified Cyber Censorship: Undergraduate Research of the CPC's Great FirewallQuantified Cyber Censorship: Undergraduate Research of the CPC's Great Firewall As you may know if you follow me on Twitter, I recently "doxed" myself on my Twitter and, by association, Steemit…odinthelibrarian (54)in informationwar • 7 years agoAbsence and Future of the BlogAbsence and Future of the Blog Hello, Library readers! I feel like I owe an explanation to some of the more frequent readers of my content, and explain a change in the way I'm going to curate…odinthelibrarian (54)in informationwar • 7 years ago[The Library Information Warfare] Sun Tzu and the Art of Critical Infrastructure Defense[The Library Information Warfare] Sun Tzu and the Art of Critical Infrastructure Defense What do Russia and Rome have in common? They both lost their empire to, among other things, a supply…odinthelibrarian (54)in informationwar • 7 years ago[The Library Information Warfare] Physical Security[The Library Information Warfare] Physical Security I was planning on doing this post long before I knew what would happen today. At the time of writing, the mood worldwide is somber. Today…odinthelibrarian (54)in politics • 7 years ago[The Library Information Warfare] Memes in Politics: How Pepe the Frog Got Trump Elected[The Library Information Warfare] Memes in Politics: How Pepe the Frog Can Win Elections Vice Cyberwar Piece "The Great Meme War" Memes in Warfare Anybody following recent politics closely…odinthelibrarian (54)in politics • 7 years ago[The Library Information Warfare] Simple Deception: Hide Your Motive[The Library Information Warfare] Simple Deception: Hide Your Motive This post seems incredibly simple. Hide your motive? Of course you should. It seems simple. The best way to ensure your…resteemedsauravrungta (77)in corporations • 7 years agoA Dystopian World Ruled By Corporate GiantsThe future that the world is headed in, is determined by many different aspects like geopolitical developments, economic developments, technological advancements, societal evolution and it is very…resteemedv4vapid (72)in security • 7 years ago2 Factor Authentication - Is It Enough?Even if you're new to the crypto-sphere, you're probably familiar with 2 Factor Authentication (2FA) offered on various platforms, including crypto-currency exchanges, used to help identify account…odinthelibrarian (54)in politics • 7 years ago[The Library: Information Warfare] Barbarians vs. Barbarians: Another Ancient Chinese Deception PloyBarbarians vs. Barbarians: Another Ancient Chinese Deception Ploy Honestly, I could write an entire series based upon Kissinger's On China. But at the moment, I'll call this post two.…odinthelibrarian (54)in politics • 7 years ago[The Library: Information Warfare] Five Baits of the Chinese EmpireThe Five Baits of the Chinese Empire China has been at the forefront of espionage and deception not for decades, but for millennia. The only nation whose origin still is unknown or not agreed…odinthelibrarian (54)in politics • 7 years agoChina on North Korea: Where Does Our "Ally" Stand?China on North Korea: Where Does Our "Ally" Stand? North Korea seems to be rivaling Russia for coverage in today's Western Main Stream Media, a 24-hour cycle of alarmist hawks battling with naive…odinthelibrarian (54)in politics • 7 years ago[The Library Information Warfare Series] Back to Basics: Check Your Sources![The Library Information Warfare Series] Back to Basics: Check Your Sources! Sometimes, it's not all about having a PhD in Propaganda. I have run into this problem many times when dealing with…resteemedstevescoins (68)in informationwar • 7 years agoAnalysis of the Situationodinthelibrarian (54)in osint • 7 years ago[The Library] Technological and Economic Ties between China and DPRK[The Library] Technological and Economic Ties between China and DPRK Private firms with government ties, illegal and shady business activities, and state-sanctioned espionage. Summary: Firms…resteemedepeakinfo (43)in politics • 7 years agoHow Putin Could Strike BackVladimir Putin was just dealt a severe blow by new sanctions from the US. The question is now, how will he strike back? Putin’s hope of a deal with President Trump now appears impossible. The…resteemedvisio (51)in cryptocurrency • 7 years agoBe a Voice in the Movement to Decentralize How We Share ContentIt's Our Time to Decentralize the World No matter where you stand, on the content creation side or as a spectator of content, its clearly getting to a stage we need better options in how we…odinthelibrarian (54)in news • 7 years agoThe Arrest of MalwareTech (Marcus Hutchins)The Arrest of MalwareTech (Marcus Hutchins) [EDIT] Donations For MalwareTech's Legal Fees Can Be Made HERE. I've been putting off this post for a while, for various reasons. Immediately after…odinthelibrarian (54)in dev • 7 years ago[The Library Dev Blog] Flat Text Files...[The Library Dev Blog] Flat Text Files... Have the newest update to Nodez up on my GitHub! Introduction to Nodez Analysis Software Spoiler alert: it's basically nothing. Most of the work…resteemedpressfortruth (74)in life • 7 years agoYouTube Censorship, AI Machines And The Cable Company MonopolyIt was a good run while it lasted but net neutrality is now officially a thing of the past as more and more restrictions are being implemented on what content viewers may or may not have access to…