Cybersecurity 201: Hybrid Warfare, Competitor, Adversary Cyber+Neuro Degradation of Enemy
How to covertly gather intelligence on an adversary or competitor without leaving a trace? Cyber Intelligence Preparation of the Environment CIPoE
In order to gather intelligence on a competitor or adversary, activities in cyberspace are conducted and automated through use of adversarial AI in combination with a human operator. These include social media mappings, unsecured email and device mappings as well as voice over internet protocols VOIP. Once the network is mapped, the continual monitoring with hooks is called an Advanced Persistent Threat APT.
Keep reading with a 7-day free trial
Subscribe to Brandon’s Substack to keep reading this post and get 7 days of free access to the full post archives.