Untitled Essay, 1946 Intelligence Overload These Days

Total Page:16

File Type:pdf, Size:1020Kb

Untitled Essay, 1946 Intelligence Overload These Days CONTENTS OVERVIEW ................................................................. vi INTRODUCTION: The Name of the Game: Let’s Define Our Terms ........... vii CHAPTER 1 HOW TO DECEIVE: Principles & Process 1.1 Deception as Applied Psychology....................................... 1 1.2 The Basic Principle: Naturalness........................................ 6 1.3 The Structure of Deception ............................................ 7 1.4 The Process of Deception............................................ 13 CHAPTER 2 INTERFACE: Deceiver versus Detective 2.1 Weaving the Web .................................................. 16 2.2 Unraveling the Web................................................. 17 CHAPTER 3 HOW TO DETECT: 10 General Principles 3.1 Cognitive Biases that Inhibit Detection .................................. 20 3.2 Overcoming Information Overload...................................... 20 3.3 The Analysts: Minimalists versus Compleatists ........................... 22 3.4 The Analyst’s Advantage............................................. 23 3.5 Categories ........................................................ 24 3.6 Know Your Enemy: Empathy & Inference................................ 32 3.7 Channels ......................................................... 34 3.8 Senses & Sensors.................................................. 35 3.9 Cultural Factors.................................................... 39 3.10 Asymmetries: Technological & Cognitive ................................ 40 CHAPTER 4 HOW TO DETECT: 20 Specific Methods 4.1 Finding Patterns of Congruity & Incongruity .............................. 43 4.2 The Plus or Minus Rule.............................................. 47 4.3 The Congruity/Incongruity Rule and the Analyst’s Advantage ................. 49 4.4 Jones’ Law of Multiple Sensors ........................................ 51 4.5 Whaley’s Law of Cognitive Triangulation ................................. 54 4.6 Resolving the Rashomon and the He Said/She Said Dilemmas ............... 56 4.7 What We Must Seek & Detect: Reversing the 5 Ws and 9 Categories ......... 57 4.8 Locard’s Exchange Principle .......................................... 58 4.9 Connecting Dots or Crossword Puzzling? ................................ 59 4.10 Mirror Imaging or M.O.? .............................................. 63 4.11The HUMINT Factor: Networking Small Worlds........................... 65 4.12 Gatekeepers and the Degrading of Information ............................ 70 4.13 Grading Source Reliability and Information Accuracy ....................... 72 4.14Setting Priorities.................................................... 73 4.15 Shannon’s Information Theory: Signals & Redundancy plus Noise ............ 75 Contents iii 4.16 Occam’s Razor versus Crabtree’s Bludgeon .............................. 76 4.17Data Banks........................................................ 78 4.18Indirect Thinking & the Third Option..................................... 80 4.19 The Intuitive Trigger: Busby’s Ombudsman ............................... 84 4.20Analysis of Competing Hypotheses (ACH)................................ 90 CHAPTER 5 VERIFICATION & FALSIFICATION 5.1 Passive & Active Analyses ............................................ 91 5.2 Tripwires & Telltales ................................................. 92 5.3 Traps............................................................. 93 5.4 Lures............................................................. 95 5.5 Provocations....................................................... 97 CHAPTER 6 BEYOND DETECTION & VERIFICATION 6.1 Before Detection: Anticipation & Other Proactive Measures .................. 98 6.2 After Detection: Triple Cross........................................... 99 CONCLUSIONS ........................................................... 101 Contents iv CONTENTS OF THE APPENDICES ......................................... 103 APPENDIX 1 TRIGGERS FOR DISCUSSION: 20 Sets of Maxims .......................... 104 APPENDIX 2 TOOLKIT: 10 Checklists & Rules of Thumb A2.1 A Typology of Perception (Whaley).................................... 114 A2.2 Bell-Whaley Deception Matrix (Summary)............................... 115 A2.3 The Nine Categories of Perception & Misperception (Whaley) ............... 116 A2.4 The Five W’s (Kipling & Lasswell)..................................... 116 A2.5 Three Lists of Cognitive Biases that Inhibit Detection Jervis......................................................... 117 Heuer ........................................................ 119 Bias Checklist.................................................. 121 A2.6 How to Induce Target Self-Deception (Whaley) .......................... 123 A2.7 List of Psychological Responses to Incongruities (Brewer & Chinn) ........... 124 A2.8 Deception Analysis Triggers (Tiernan & FDDC) .......................... 124 A2.9 Deception Analysis Cognitive Framework (Tiernan & FDDC) ................ 125 A2.10 Checklist for Lies and Liars (Ekman) ................................... 126 APPENDIX 3 BASIC READINGS IN COUNTERDECEPTION A3.1 R. V. Jones, “The Theory of Practical Joking” ........................... 127 A3.2 R. V. Jones, “The Principles of Security” and the “The Principles of Deception” . 143 A3.3 R. V. Jones, “Unmasking Deception” .................................. 144 A3.4 R. J. Heuer, “Analysis of Competing Hypotheses (ACH) ................... 147 APPENDIX 4 TIMELINE: 137 Landmark Concepts & Methods in Deception & Detection ..... 163 APPENDIX 5 RECOMMENDED READINGS (50) .......................................... 176 Contents v OVERVIEW This Textbook of political and military counterdeception is unique. It’s unlike any of your many familiar intelligence textbooks or field manuals. Those were designed to teach the intelligence analyst to perform certain set procedures — rather like a highly skilled accountant or manager — counting weapons and personnel, tracking their movements, and predicting their behavior. In sharp contrast, this Textbook has been designed to help the analyst faced with deception to also begin to think more like a detective solving a mystery. Specifically, it will help you think your way into the mind of a deceptive opponent. This Textbook gives a convenient overview of counterdeception, which is defined here as the detection of deception — and, by extension, the possible triple-cross of the deceiver. It is practical, having been designed as: ! a teaching tool for persons concerned with counterdeception, either as practitioners or potential victims; and ! an analytical instrument for counterdeception operations, specifically as a check-list to assure that all likely possibilities have been considered (“all bases covered”) in the detection or analysis of deception operations. The essence of this Textbook is its interdisciplinary foundation. It draws its evidence and conclusions from research on over a hundred different disciplines, all of which seek to detect the ruses of hostile deceivers. These “detectives” ranged from military and political intelligence intelligence analysts, through police detectives, forensic scientists, and business fraud examiners, to confidence artists and magicians who deal with deception as a professional necessity. Each of these disciplines has evolved through years of experience, of trial and error, various theories about and procedures for detecting deception. A few of these principles and methods (particularly those of forensic & physical scientists, cognitive psychologists, and magicians) are rather highly developed and consistently effective. Those of intelligence analysts are only modestly and often inconsistently effective. And those of most others are seldom little better than chance guesses. This text filters out most of the chaff to present only the more useful principles, solid evidence, and tested conclusions. Unlike most handbooks, primers, or introductory textbooks, this volume avoids the haughty airs of the traditional anonymous “Mr. Know-All” or some faceless committee. This Textbook will give the evidence and draw conclusions as this author sees them. All have been thoroughly field-tested in one or more disciplines and proven generally successful. They’ve been ruthlessly condensed from a ponderous manuscript representing nearly two decades of research on detection in general and specifically on detecting deception. That manuscript is stuffed with documented evidence, detailed analyses, lengthy arguments and counter-arguments, and raw opinions. Its weaknesses as well as its considerable strengths are there for anyone with enough time and background to weigh and judge. But the audience for this Textbook are the students in one or more intense and time-compressed introductory courses on the detection of deception. Thus, drastic cuts were necessary. However, to give the instructors of these courses maximum flexibility, somewhat more information than was strictly necessary has been appended to the main text. Examples: The Triggers for Discussion gives 20 sets of quotations that challenge the student. The Toolkit of basic checklists and rules of thumb includes a few supplementary as well as some alternative tools for the instructors to choose among. The Basic Readings section give 4 short texts, each focused on a specific topic that instructors may chose to use as the basis for classroom discussion or as a shopping list for term papers. And the Recommended Readings of 50 key books and articles has been lightly annotated to
Recommended publications
  • The Reich Wreckers: an Analysis of the 306Th Bomb Group During World War II 5B
    AU/ACSC/514-15/1998-04 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY THE REICH WRECKERS: AN ANALYSIS OF THE 306TH BOMB GROUP DURING WORLD WAR II by Charles J. Westgate III, Major, USAF A Research Report Submitted to the Faculty In Partial Fulfillment of the Graduation Requirements Advisor: Dr. Richard R. Muller Maxwell Air Force Base, Alabama April 1998 REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188 Public reporting burder for this collection of information is estibated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burder to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 2. REPORT TYPE 3. DATES COVERED (FROM - TO) 01-04-1998 Thesis xx-xx-1998 to xx-xx-1998 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER The Reich Wreckers: An Analysis of the 306th Bomb Group During World War II 5b. GRANT NUMBER Unclassified 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d.
    [Show full text]
  • Preempting Emergence: the Biological
    PRE-EMPTING EMERGENCE – THE BIOLOGICAL TURN IN THE WAR ON TERROR Melinda Cooper 2 In 2004, three years after the sporadic and still unresolved anthrax attacks that followed September 11, the Bush administration became the first in US history to implement a national defence strategy against biological threats. In the same year, US Congress also approved the largest ever funding project for biodefence research, to be carried out over the following decade. The legislation, going under the name of Project Bioshield, authorized $5.6 billion for the purchase and stockpiling of vaccines and drugs against bioterrorist threats, granted the government new authority to initiate research programs and special dispensation to override drug regulations in the face of a national emergency. At the same time, a more secretive initiative was underway to establish four research centres for the testing of biological weapons defences. The US, it seems, was preparing itself for an attack of epidemic proportions. But what exactly was the US arming itself against? In his public addresses on the topic, George Bush seemed unsure whether the deadliest threat would be more likely to emanate from a deliberate bioterrorist attack or from any one of the resurgent or drug-resistant infectious diseases that now regularly afflict urban hospitals. Official documents declared that infectious disease outbreak and bioterrorism should be treated as identical threats, in the absence of any sure means of distinguishing the two. The confusion was further reflected in the allocation of resources. Much of the new funding for biodefence went to institutions that had previously been engaged in public health and infectious disease research, while the ailing biotech start-ups of the genomics era were encouraged to reinvest their energies in the new arena of military applications.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • BC, De Los Estados Con Mayor Mortandad De Establecimientos Formales E Informales: INEGI Págs
    AMLO: 6 estados Nueva alcaldesa pone estate quieto a Marina; concentran el 50% abre carpeta de de homicidios; investigación Pág. 3 entre ellos B.C. Página 9 http://MonitorEconomico.org Año VIII No. 2492 Martes 23 de marzo de 2021 BC, de los estados con mayor mortandad de establecimientos formales e informales: INEGI Págs. 4 y 5 Con 19 muertos diarios En plena crisis gobierno Hank Rhon se registra Escobedo da bienvenida de Tijuana prepara como candidato a la Semana Santa en B.C. aumento de impuesto a la gubernatura predial Pág. 2 Pág. 3 Pág. 9 /Economía MartesViernes 23 de marzo 1 de Abril de 20212011 Con 19 muertos diarios Escobedo da bienvenida a la Semana Santa en B.C. Por Luis Levar - Spring Brake. nianos a pesar de que se han mode- rado los avances. Apenas la semana pasada “la Secre- taría de Salud de Baja California pidió Con 363 muertos hasta el día señala- a la población no relajar las medidas do, el promedio de defunciones por de protección personal, porque el día se mantiene alto con 19 y apenas COVID -19 se mantiene activo, lo por debajo de las 22 que se registra- anterior una vez que se percibió ron en el mismo lapso de febrero. el pasado fin de semana una alta movilidad en bares, además la tasa A esto se debe agregar una campa- de reproducción efectiva del virus ña de vacunación lenta y desorgani- sigue en aumento”, según comuni- zada en la que a casi cuatro meses cado y ahora el mismo Alonso Pérez de que se anunció el inicio apenas fue parte del circo que anunció el se ha vacunado al 1.9 por ciento del “operativo”.
    [Show full text]
  • Jasper Maskelyne Was a Thames
    JASPER MASKELYNE THE MAGICIAN WHO FOILED HITLER’S ARMY Admiral Graf Spee at Spithead, 1937. he Second World War plummeted the world into chaos, so it’s really no surprise that tales shoelaces embedded with wire strong and sharp at Lake Mariout were switched on. From 8,000 T of paranormal activity, supernatural events, and enough to saw through bars; packs of playing feet above in the dark, the Luftwaffe were unable unsolved mysteries continue to surface from a time of cards containing maps of the surrounding areas; to tell the difference, and proceeded to attack the : such trauma. Rumoured to be staunch believers in the board games with local currency; cricket bats fake harbour. To give the illusion that they were occult, Hitler and the Nazi party have since been tied concealing weapons in the handle and blades engaged in battle, ground troops feigned fighting to stories of otherworldly pursuits. You’d be correct to shaped in a way that allowed them to be used as back with fake shells. Meanwhile, a team used think that the influence behind Indiana Jones and The Last shovels. It has also been reported that a map was truck-loads of papier-mache bricks and painted Crusade isn’t purely fiction. While they didn’t confront hidden inside a gramophone record, concealed bomb craters to create the illusion of a devastat- a whip-wielding archaeologist, the Nazis did spend so carefully that it’s unlikely the prisoners ever ed harbour at the real Alexandria in anticipation time searching for religious artefacts, including the would have found it if it hadn’t accidentally been of reconnaissance aircraft the following morning.
    [Show full text]
  • The Significance of Anime As a Novel Animation Form, Referencing Selected Works by Hayao Miyazaki, Satoshi Kon and Mamoru Oshii
    The significance of anime as a novel animation form, referencing selected works by Hayao Miyazaki, Satoshi Kon and Mamoru Oshii Ywain Tomos submitted for the degree of Doctor of Philosophy Aberystwyth University Department of Theatre, Film and Television Studies, September 2013 DECLARATION This work has not previously been accepted in substance for any degree and is not being concurrently submitted in candidature for any degree. Signed………………………………………………………(candidate) Date …………………………………………………. STATEMENT 1 This dissertation is the result of my own independent work/investigation, except where otherwise stated. Other sources are acknowledged explicit references. A bibliography is appended. Signed………………………………………………………(candidate) Date …………………………………………………. STATEMENT 2 I hereby give consent for my dissertation, if accepted, to be available for photocopying and for inter-library loan, and for the title and summary to be made available to outside organisations. Signed………………………………………………………(candidate) Date …………………………………………………. 2 Acknowledgements I would to take this opportunity to sincerely thank my supervisors, Elin Haf Gruffydd Jones and Dr Dafydd Sills-Jones for all their help and support during this research study. Thanks are also due to my colleagues in the Department of Theatre, Film and Television Studies, Aberystwyth University for their friendship during my time at Aberystwyth. I would also like to thank Prof Josephine Berndt and Dr Sheuo Gan, Kyoto Seiko University, Kyoto for their valuable insights during my visit in 2011. In addition, I would like to express my thanks to the Coleg Cenedlaethol for the scholarship and the opportunity to develop research skills in the Welsh language. Finally I would like to thank my wife Tomoko for her support, patience and tolerance over the last four years – diolch o’r galon Tomoko, ありがとう 智子.
    [Show full text]
  • F a L L W I N T E R 2 0
    NEW BOOKS FALL WINTER 2020 TABLE OF CONTENTS Welcome New Publishers ..............................................................................................2 Featured Titles ...................................................................................................................3 Biography/History/True Crime......................................................................................5 Science and Social Sciences ......................................................................................30 Fiction/Poetry/Graphic Novels ...................................................................................41 Religion and Inspiration ..............................................................................................64 Games/Gifts/Seasonal .................................................................................................72 Crafts and Hobbies .......................................................................................................81 Performing Arts and The Arts ............................................................................... 102 Cooking .......................................................................................................................... 117 Children’s ....................................................................................................................... 125 Health/Self-Help/Parenting ..................................................................................... 137 Sports and Recreation .........................................................................................
    [Show full text]
  • The Association for Diplomatic Studies and Training Foreign Affairs Oral History Project
    The Association for Diplomatic Studies and Training Foreign Affairs Oral History Project PETER KOVACH Interviewed by: Charles Stuart Kennedy Initial Interview Date: April 18, 2012 Copyright 2015 ADST Q: Today is the 18th of April, 2012. Do you know ‘Twas the 18th of April in ‘75’? KOVACH: Hardly a man is now alive that remembers that famous day and year. I grew up in Lexington, Massachusetts. Q: We are talking about the ride of Paul Revere. KOVACH: I am a son of Massachusetts but the first born child of either side of my family born in the United States; and a son of Massachusetts. Q: Today again is 18 April, 2012. This is an interview with Peter Kovach. This is being done on behalf of the Association for Diplomatic Studies and I am Charles Stuart Kennedy. You go by Peter? KOVACH: Peter is fine. Q: Let s start at the beginning. When and where were you born? KOVACH: I was born in Worcester, Massachusetts three days after World War II ended, August the 18th, 1945. Q: Let s talk about on your father s side first. What do you know about the Kovaches? KOVACH: The Kovaches are a typically mixed Hapsburg family; some from Slovakia, some from Hungary, some from Austria, some from Northern Germany and probably some from what is now western Romania. Predominantly Jewish in background though not practice with some Catholic intermarriage and Muslim conversion. Q: Let s take grandfather on the Kovach side. Where did he come from? KOVACH: He was born I think in 1873 or so.
    [Show full text]
  • Forsíða Ritgerða
    Hugvísindasvið The Thematic and Stylistic Differences found in Walt Disney and Ozamu Tezuka A Comparative Study of Snow White and Astro Boy Ritgerð til BA í Japönsku Máli og Menningu Jón Rafn Oddsson September 2013 1 Háskóli Íslands Hugvísindasvið Japanskt Mál og Menning The Thematic and Stylistic Differences found in Walt Disney and Ozamu Tezuka A Comparative Study of Snow White and Astro Boy Ritgerð til BA / MA-prófs í Japönsku Máli og Menningu Jón Rafn Oddsson Kt.: 041089-2619 Leiðbeinandi: Gunnella Þorgeirsdóttir September 2013 2 Abstract This thesis will be a comparative study on animators Walt Disney and Osamu Tezuka with a focus on Snow White and the Seven Dwarfs (1937) and Astro Boy (1963) respectively. The focus will be on the difference in story themes and style as well as analyzing the different ideologies those two held in regards to animation. This will be achieved through examining and analyzing not only the history of both men but also the early history of animation in Japan and USA respectively. Finally, a comparison of those two works will be done in order to show how the cultural differences affected the creation of those products. 3 Chapter Outline 1. Introduction ____________________________________________5 1.1 Introduction ___________________________________________________5 1.2 Thesis Outline _________________________________________________5 2. Definitions and perception_________________________________6 3. History of Anime in Japan_________________________________8 3.1 Early Years____________________________________________________8
    [Show full text]
  • Vampire Storytellers Handbook (3Rd Edition)
    Vampire Storytellers Handbook 1 Vampire Storytellers Handbook By Bruce Baugh, Anne Sullivan Braidwood, Deird’re Brooks, Geoffrey Grabowski, Clayton Oliver and Sven Skoog Table of Contents Introduction............................................................................................................................................................................................4 The Most Important Part... ............................................................................................................................................................6 ...And the Most Important Rule .....................................................................................................................................................6 How to Use This Book...................................................................................................................................................................7 The Game as it is Played..............................................................................................................................................................7 Cool, Not Kewl ..............................................................................................................................................................................9 Violence is Prevalent but Desperate...........................................................................................................................................10 Vampire Music ............................................................................................................................................................................10
    [Show full text]
  • The Ethics of Intelligence Collection Ross W. Bellaby
    What’s the Harm? The Ethics of Intelligence Collection Ross W. Bellaby Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University June 13th, 2011 DECLARATION This work has not previously been accepted in substance for any degree and is not being concurrently submitted in candidature for any degree. Signed ...................................................................... (Ross W. Bellaby) Date ........................................................................ STATEMENT 1 This thesis is the result of my own investigations, except where otherwise stated. Where *correction services have been used, the extent and nature of the correction is clearly marked in a footnote(s). Other sources are acknowledged by footnotes giving explicit references. A bibliography is appended. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ [*this refers to the extent to which the text has been corrected by others] STATEMENT 2 I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter- library loan, and for the title and summary to be made available to outside organisations. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ I hereby give consent for my thesis, if accepted, to be available for photocopying
    [Show full text]
  • Cyber Counterintelligence - Deception, Distortion, Dishonesty
    #RSAC SESSION ID: CYBER COUNTERINTELLIGENCE - DECEPTION, DISTORTION, DISHONESTY Jeff Bardin Dr. Khatuna Mshvidobadze Chief Intelligence Officer Principal Treadstone 71 Cyberlight Global Associates @Treadstone71LLC [email protected] 5 2 Agenda Taxonomy Types of Denial Deception Dimensions of D&D Tactics Deception Chain (see your handout) and Deception Planning D&D Russian Historical Information Criminals & Kids Notable Events Georgia US Election Background Warfare Dis-information / France – Information Complexity of Formation of cyber Troll Factories Major Players TV5Monde Warfare on Social Outsourcing troops Media Forming public Interagency Socio-Cultural Conclusions - opinion Rivalries Differences Recommendations 3 Denial and Deception - Lifecycle Types of Denial and Deception Resource Diversion Uncertainty Intelligence Proactivity Depletion • Direct an • Waste an • Cause the • Monitor and • Use adversary’s adversary’s adversary to analyze deception attention time and doubt the adversary techniques to from real energy on veracity of a behavior detect assets toward obtaining and discovered during previously bogus ones. analyzing vulnerability intrusion unknown false or stolen attempts to attacks that information. information. inform future other defense defensive efforts. tools may miss. 4 Deception Planning Consideration of all critical components of the operation. Deny, deceive, create propaganda RSA Conference - Bardin and Mshvidobadze Western Dogs Dogs Lie Like Dotards - We will hack their sites and bring them down 5 Dimensions
    [Show full text]