Brandon’s Substack

Brandon’s Substack

Share this post

Brandon’s Substack
Brandon’s Substack
Cybersecurity 201: Hybrid Warfare, Competitor, Adversary Cyber+Neuro Degradation of Enemy

Cybersecurity 201: Hybrid Warfare, Competitor, Adversary Cyber+Neuro Degradation of Enemy

How to covertly gather intelligence on an adversary or competitor without leaving a trace? Cyber Intelligence Preparation of the Environment CIPoE

Dec 23, 2023
∙ Paid
1

Share this post

Brandon’s Substack
Brandon’s Substack
Cybersecurity 201: Hybrid Warfare, Competitor, Adversary Cyber+Neuro Degradation of Enemy
4
1
Share

In order to gather intelligence on a competitor or adversary, activities in cyberspace are conducted and automated through use of adversarial AI in combination with a human operator. These include social media mappings, unsecured email and device mappings as well as voice over internet protocols VOIP. Once the network is mapped, the continual monitoring with hooks is called an Advanced Persistent Threat APT.

Keep reading with a 7-day free trial

Subscribe to Brandon’s Substack to keep reading this post and get 7 days of free access to the full post archives.

Already a paid subscriber? Sign in
© 2025 Brandon Iglesias
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share