The Art of Deception: Exploring the Parallels Between Cyber Espionage and Intelligence Social Engineering

As the digital landscape continues to evolve, witnessing an alarming surge in cyber-attacks, social engineering plays a pivotal role in various malicious activities. This includes phishing, smishing, spear phishing attacks, ransomware attacks, and identity theft. Interestingly, the techniques employed in these cyber exploits bear a striking resemblance to the methods used by intelligence agencies to…

Read More

Leave It to The Professionals

A persons hand on dice with the word un qualified kept on a wooden desk

Having a mechanic who’s good at math doesn’t make them a certified professional accountant. You wouldn’t want them doing your financial planning, because they don’t have the education, training, or qualifications for the job. So, what does this have to do with the world of Intelligence? Intelligence professionals are highly skilled, highly trained and have…

Read More

Buried Secrets: Tunnelling in Intelligence Gathering and Terrorist Activity

A picture taken with a fisheye lens on January 18, 2018

Introduction: Since the recent Hamas attacks on Israel in October 2023, numerous media articles have dissected the intricate network of tunnels beneath Gaza and how Hamas leveraged them for attacks and hostage-taking in Israeli settlements near tunnel access points. But this isn’t a new concept. In this article, we’ll explore the historical use of tunnels…

Read More