Resources, articles, thoughts, datasets, papers on (cyber)(threat) intelligence tradecraft
- Known your Foe Series
- Intelligence Tradecraft and Technology 2015
- Write or it Didn't happen
- DNS Best Practices, Network Protections, and Attack Identification
- Guildlines for Drawing Causal Loop Diagrams
- The "thinking" in systems thinking - how to make it easier to master
- Spies, Lies, and Weapons: What Went Wrong
- Baloney Detection Part I Part II
- Guidelines for examining evidence
- Biasis in evaluation of evidence
- Link Analysis
- How Link Analysis Works for SEO
- Top 5 Intelligence Analyst Methods
- Potential of Social Network Analysis in Intelligence
- Association Analysis
- Traffic Analysis for Network Security: Two Approaches for Going Beyond Network Flow Data
- Rule of Three: Thinking Visually in Threes
- Visual Thinking and Pattern Recognition
- Visual Thinking Questions
- Dark Data EXtraction
- Finding Target-relevant Domain Fronts
- Domain Fronting
- Link Analysis
- Language of Youth Subculture
- Tactics 101
- Verifying Data Breaches
- HIPB Verifying Data Breaches
- Vetting Leaks
- Hackonomics: Regime Shifts in the Black Economy
- Cyber Threat Actors: Hackonomics
- Cyber Criminal Ecosystems in the Deep Web
- Argument Mapping Basics
- How language really works
- The Logical Fallacies
- Logical Fallacies
- Skeptics Field Guide
- Traps of Formal Logic
- A course in Logic
- Informal Logic
- Toulman Method
- Techniques for Argument Restatement
- Detecting Targeted Malicious Email
- Application of Spiral Analysis to ABI
- Parking Sensors: Analyzing Parked Domains
- Structured Analytic Techniques for Improving Intelligence Analysis
- Targeted Threat Index
- Formalizing Event Time Bounding in Digital Investigations
- Types of Crime Analysis
- Office Exploit Generators
- Cyber Intelligence Tradecraft Project
- Practical Thinking: Innovation in Battle Command Instruction
- Methods and Tools for Automated Data Collection and Collation of Open Source Information
- Six Steps in Intelligence Cycle
- Criminal Intelligence for Analysts
- Application of Network Analysis to Criminal Intelligence
- Successful law enforcement using analytic methods
- Psychology of Intelligence Analysis
- Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys
- Practical Waterholing through DNS
- Practical Graph Mining with R