01.07.2020 Views

Cyber Defense eMagazine July 2020 Edition

Cyber Defense eMagazine July Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine July Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

dangerous playing those games in the adulthood, so what’s so needed is to understand the motives of<br />

the persons doing so for a reason once the motive is defined the crime would stop.<br />

Why Does Identity Matter?<br />

It’s not only about the terrorist and criminal organizations to hide their identity – so many defense<br />

professionals would choose to carefully manage their identity as the way of security and privacy<br />

measures getting applied on their tasks. In other words, it’s not smart at all going around and sharing all<br />

you know with everyone as that could be the huge threat to someone’s life and business. So, the wellknown<br />

Deep Web solutions are designed by the defense communities, but at the moment they are<br />

available to anyone for more or less obvious reasons. The identity matters in any case and once the<br />

people are convinced that some account is trusted they can try to share a lot of findings with such a<br />

profile. The modern history would teach us how life can be hard and why it’s important to take some<br />

measures of protection.<br />

The Deep Web systems could get used by the media staffs in order to bring the story to the audience.<br />

Practically, anyone sitting on the comp and writing to the journalist could get approved as the information<br />

source to some media group for a reason he can offer the content frequently. So, that’s how the public<br />

opinion could get created and managed and in our belief – that’s so dangerous weapon that can<br />

compromise the media professionalism. No ethical media house would trust to anyone and before<br />

anything is published there should be the several levels of the confirmation. In other words, anyone<br />

looking for the exclusives on the Tor should know that he is possibly working for the other side of the law.<br />

The Need to Hide Who You Are<br />

Sometimes the intelligence sources reporting to some defense agency would need to hide their identity<br />

for the security needs. The agent on the other side of the communications would deal with the clear<br />

picture in a term who is talking to him. Also, the security organizations can confirm a lot of that, so it’s<br />

quite clear they would be highly confident about the sources of the information. Being the source of the<br />

findings to anyone creditable is so heavy and time consuming task and it needs the reliability, accuracy<br />

and skill in order to get approved for such a service. Apparently, the defense staff would hide who he is<br />

as well because it’s not necessary to know any sort of the personal details of that guy as the task is to<br />

provide so helpful findings to the agency. How such an effort would get further directed it’s not up to the<br />

informant – it’s only up to that defense team.<br />

The Anonymity Information Exchange Systems<br />

The most known privacy infrastructure worldwide is the Tor anonymity system that would cope with the<br />

millions of users every single day. From time to time that service would get shut down, but it’s more about<br />

such network’s configuration rules. Essentially, the Tor service can offer the good privacy and it’s mainly<br />

reliable to its users. It would cope with the multi-level encryption, so it’s quite trickery to anyone to<br />

challenge its security capacities. Let’s say the Tor is the quite trusted system that would attract so many<br />

professionals from many areas of interest. Apparently, it would cope with its dark side being one of the<br />

biggest Darknet service providers in the world. It would get the real oasis to the criminals, terrorists and<br />

hackers as it would offer a lot of benefits to the users seeking to remain safe.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>July</strong> <strong>2020</strong> <strong>Edition</strong> 98<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!