Wilderness of Shlemiels


Posted on in Presentations

We need to find ways to passively and actively neutralize adversarial operations. This needs to be considered a primary option. We need to identify, disrupt, neutralize, penetrate and exploit adversaries. We need to utilize denial and deception activities. We need to manipulate and control messaging. We need to maintain information superiority against our adversaries.

Participants
Jeff Bardin

Participant

Chief Intel Officer, Treadstone 71

Hackers & Threats

cyber warfare & cyber weapons cyberterrorism government spying hackers & threats


Topic

Subtopic


Share With Your Community