<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Ozan Akyol &#8211; Digital Intelligence</title>
	<atom:link href="https://www.digitalintelligence.at/author/ozan/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.digitalintelligence.at</link>
	<description>by Ozan Akyol</description>
	<lastBuildDate>Sun, 26 Apr 2026 16:15:50 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.digitalintelligence.at/wp-content/uploads/2025/11/android-chrome-512x512-1-60x60.png</url>
	<title>Ozan Akyol &#8211; Digital Intelligence</title>
	<link>https://www.digitalintelligence.at</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Austria Finally Drafts a Real Espionage Law. The Ott Trial Will Decide Whether It Matters.</title>
		<link>https://www.digitalintelligence.at/austria-finally-drafts-a-real-espionage-law-the-ott-trial-will-decide-whether-it-matters/</link>
		
		<dc:creator><![CDATA[Ozan Akyol]]></dc:creator>
		<pubDate>Sun, 26 Apr 2026 16:13:51 +0000</pubDate>
				<category><![CDATA[Europe]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.digitalintelligence.at/?p=4445</guid>

					<description><![CDATA[Austria has spent the better part of half a century letting foreign intelligence officers run operations from its capital, because the law, quite literally, does not care as long as the target is somebody else. Section 256 of the Criminal Code criminalises espionage only when it is directed against the Austrian state. So if a Russian, Chinese or Iranian officer sits in a Viennese café and tasks a contact to collect on the IAEA, surveil a dissident who fled here precisely because she thought the Republic would protect her, or lift material from an OSCE delegation, none of that is]]></description>
										<content:encoded><![CDATA[
<p>Austria has spent the better part of half a century letting foreign intelligence officers run operations from its capital, because the law, quite literally, does not care as long as the target is somebody else.</p>



<p>Section 256 of the Criminal Code criminalises espionage only when it is directed against the Austrian state. So if a Russian, Chinese or Iranian officer sits in a Viennese café and tasks a contact to collect on the IAEA, surveil a dissident who fled here precisely because she thought the Republic would protect her, or lift material from an OSCE delegation, none of that is a crime under Austrian law. The targeted state can complain. The targeted institution can withdraw cooperation. Austria itself has nothing to charge.</p>



<p>This is what produces the &#8220;spy capital&#8221; cliché. The figure people quote is 7,000 hostile officers operating in this city. It comes from the Austrian Center for Intelligence and Security Studies and is several years old. I have my doubts about that level of precision, since counting people whose entire job is not being counted is a strange exercise. But the structural fact the number gestures at is real, and any allied service will tell you the same thing about Vienna without much prompting.</p>



<p>On 9 March, the Justice Ministry circulated a draft bill that finally moves to close §256. Falter obtained the text and reported on 3 April. Bloomberg followed the same morning. The draft is now sitting with the ÖVP-NEOS coalition partners.</p>



<p>The headline change is a new §319a, criminalising espionage against international organisations headquartered in Austria, with prison terms of six months to five years. The IAEA, UNOV, the OSCE, the EU Agency for Fundamental Rights, all of them become protected. Operating against them from Austrian soil becomes a domestic offence rather than a diplomatic embarrassment that the Foreign Ministry has to manage privately.</p>



<p>That is the part everyone is writing about. The two changes underneath it are more interesting.</p>



<p>The first widens the legal concept of <em>Nachteil der Republik</em>, detriment to the Republic. Under the draft, the conduct does not have to actually harm Austria. It is enough that it is capable of endangering the country&#8217;s reputation, security or prosperity. So espionage against another EU member state, conducted from here, becomes prosecutable on the theory that hosting it could damage Austria&#8217;s relations with the partner. This shifts the offence from a results-based crime toward something closer to abstract endangerment. The Constitutional Court has historically not been comfortable with that kind of construction, and the provision will end up there sooner or later.</p>



<p>The second targets what the trade calls disposable agents. These are the low-skilled people, often very young, recruited through Telegram or Signal to do small, discrete tasks. Photograph a building. Drop a package. Walk behind a target for an afternoon. The Bulgarian cell that worked through Jan Marsalek and was convicted in London last year relied heavily on this model, including in Vienna. Under current law, prosecuting them was awkward, because their individual contribution was small and their knowledge of the wider operation was usually genuine ignorance. The draft makes participation itself the offence, including for volunteers.</p>



<p>The political pressure behind all of this is coming, very specifically, from one courtroom on Landesgerichtsstrasse.</p>



<h2 class="wp-block-heading">The Ott trial</h2>



<p>The trial of Egisto Ott opened on 22 January. Ott is a former officer of the BVT, the domestic intelligence service that was dissolved after the 2018 raid that, more than anything else, destroyed Austria&#8217;s standing inside the European intelligence community for most of the next decade. The indictment runs to 172 pages. The headline charge, which is what makes this politically explosive rather than just embarrassing, is supporting a foreign intelligence service to the detriment of Austria.</p>



<p>Prosecutors say Ott pulled large volumes of personal and operational data from national and international police databases between 2015 and 2021, kept some of it in a private Gmail account, and passed it through Marsalek, the fugitive Wirecard COO who has been in Russia since 2020. The list of alleged products is bad. Addresses of Russian dissidents living in Austria. Phone metadata of senior interior ministry staff. At one point in 2022, a laptop containing classified EU electronic security hardware that ended up with Russian intelligence.</p>



<p>The allegation that should make any journalist in this region uncomfortable is that Ott provided Marsalek with the Vienna address of Christo Grozev, the Bellingcat investigator who has spent years exposing GRU operations from Salisbury to Berlin. Marsalek arranged for the apartment to be broken into. Grozev eventually left Austria after being told the threat to him was credible. Anna Thalhammer at Profil, who has been writing on Ott and Marsalek for years, is a witness in the trial and has described being a target of disinformation and physical surveillance in this city.</p>



<p>The personal details are not the point. The point is that the same investigation that produced Ott&#8217;s arrest also surfaced what the Bulgarian cell had been doing in Vienna for months, and almost none of it was prosecutable here. That is the political fact that finally moved the bill.</p>



<h2 class="wp-block-heading">Two things missing from the conversation</h2>



<p>The first is operational capacity. Writing §319a into the Criminal Code is one parliamentary vote. Building the kind of counter-intelligence service that can actually make a §319a case against a foreign professional working under official or commercial cover in Vienna is several budget cycles, at minimum.</p>



<p>The DSN took over from the BVT in late 2021 and is still rebuilding. Sylvia Mayer started as the first female DSN director on 1 January. Allied services I have spoken to over the past two years tend to describe the DSN as analytically competent and operationally thin, and the gap between those two things is exactly where §319a cases live. I am not saying nothing will happen. I am saying that for the first two or three years after this passes, the cases that get charged will probably look like the Bulgarian one, meaning they will fall into Austria&#8217;s lap because someone else made the original arrests.</p>



<p>The second is press freedom. The widened <em>Nachteil der Republik</em> language is broad enough that I can already see a future prosecutor reaching for it against a journalist who publishes material the government finds awkward, particularly anything connected to allied state operations on Austrian soil. I want a clear source-protection carve-out in the final text. Falter&#8217;s reporting did not mention one. The Justice Ministry will presumably say existing media protections apply. In practice they do not always apply, especially when the story embarrasses a partner government.</p>



<h2 class="wp-block-heading">What this actually changes</h2>



<p>It changes what the prosecutor can charge once a case has been built. That is a real change.</p>



<p>It does not change the geographic and institutional facts that make Vienna useful in the first place. It does not change the diplomatic immunities attached to the several thousand accredited foreign personnel in this city. It does not change the political reality that the FPÖ, currently leading in the polls, has spent the better part of a decade benefiting from the absence of pressure on this question and has every interest in the new law being enforced as gently as possible if and when they are in government.</p>



<p>The Ott verdict is the test, not the law. If a jury sitting through 172 pages of evidence and ninety witnesses cannot bring itself to convict a former officer on the espionage count, the new statute will not matter, because no prosecutor will want to be the one to bring the next case. If they do convict, the Republic will have signalled, for the first time in a long time, that it is prepared to treat espionage on its territory as the serious matter it has always been.</p>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Open Source, Ignored: Why Europe Must Get Serious About Social Media Threat Monitoring Before the Next School Attack</title>
		<link>https://www.digitalintelligence.at/open-source-ignored-why-europe-must-get-serious-about-social-media-threat-monitoring-before-the-next-school-attack/</link>
		
		<dc:creator><![CDATA[Ozan Akyol]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 10:43:33 +0000</pubDate>
				<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[OSINT]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.digitalintelligence.at/?p=4434</guid>

					<description><![CDATA[On April 15, 2026, a 14-year-old student walked into Ayser Çalık Middle School in Kahramanmaraş, Turkey, carrying five firearms and seven magazines. By the time it was over, nine people were dead. One of them was a math teacher named Ayla Kara, who died trying to shield her students. The attacker, İsa Aras Mersinli, also died. He turned the gun on himself. In the hours that followed, investigators began working through his digital life. What they found was not a mystery. It was a map, drawn in plain sight, that nobody had thought to read. A Profile Picture as a]]></description>
										<content:encoded><![CDATA[
<p>On April 15, 2026, a 14-year-old student walked into Ayser Çalık Middle School in Kahramanmaraş, Turkey, carrying five firearms and seven magazines. By the time it was over, nine people were dead. One of them was a math teacher named Ayla Kara, who died trying to shield her students.</p>



<p>The attacker, İsa Aras Mersinli, also died. He turned the gun on himself.</p>



<p>In the hours that followed, investigators began working through his digital life. What they found was not a mystery. It was a map, drawn in plain sight, that nobody had thought to read.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">A Profile Picture as a Manifesto</h2>



<p>Mersinli&#8217;s WhatsApp profile picture was a photo of Elliot Rodger.</p>



<p>For those unfamiliar with the name: Rodger was a 22-year-old who, in May 2014, killed six people in Isla Vista, California before taking his own life. Before the attack, he uploaded videos explaining his motivations and left behind a 137-page document he called his manifesto. He had become, in the years since, an icon in online communities built around male grievance, rejection, and the glorification of mass violence. He is arguably the most influential figure in the so-called &#8220;incel&#8221; subculture that has since been linked to multiple attacks across North America and Europe.</p>



<p>A teenager in southern Turkey had put this man&#8217;s face as his public-facing identity. He had done it voluntarily. He had done it where anyone who knew him could see it.</p>



<p>His computer also contained a document, dated April 11, 2026, four days before the attack, describing what he was planning to do.</p>



<p>The Turkish Prosecution&#8217;s Office confirmed the attack was premeditated. There was no spontaneity here. There was a timeline, a target, and a model.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">The Telegram Layer</h2>



<p>The attack in Kahramanmaraş did not happen in isolation. The same week, another school in Şanlıurfa was targeted. And in the immediate aftermath, a Telegram group called &#8220;C31K,&#8221; with approximately 100,000 members, began circulating messages celebrating the attackers and posting specific schools, dates, and locations as the next targets.</p>



<p>Turkish authorities identified 591 social media accounts spreading what they described as disinformation and provocation. Cybercrime units opened investigations. The group had previously been connected to two separate murder cases in Turkey.</p>



<p>This is a pattern that European security analysts should be paying very close attention to.</p>



<p>What we are seeing is not just copycat violence driven by media coverage. It is something more structured: online communities that actively cultivate the mythology of mass attackers, offer belonging to isolated and radicalized young people, and then, after an attack, use it as recruitment material and operational inspiration for the next one. The digital infrastructure of this ecosystem runs primarily through encrypted messaging platforms, gaming communities, and fringe imageboards, most of which operate with minimal oversight.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">The Incel Pipeline and Its European Reach</h2>



<p>The incel phenomenon is not a Turkish story. It is not an American one either. Since Rodger&#8217;s 2014 attack, the ideological framework he helped define has been cited in mass casualty events in Canada, the United Kingdom, Germany, and Finland. In 2018, a van attack in Toronto killed ten people. In 2021, a man in Plymouth, England killed five. In both cases, investigators found significant engagement with incel forums and, in particular, with content venerating Elliot Rodger specifically.</p>



<p>What connects Kahramanmaraş to Plymouth to Toronto is not geography. It is an online ecosystem that operates without borders and targets young men who feel, for whatever reason, invisible and powerless.</p>



<p>In Mersinli&#8217;s case, the behavioral indicators were present. Teachers described him as withdrawn and increasingly isolated. He was reportedly spending large amounts of time online. His social media profile displayed an open tribute to a foreign mass killer. His computer contained a pre-attack document. None of this triggered a formal intervention.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">What Monitoring Actually Means</h2>



<p>There is a legitimate debate in Europe about the limits of social media surveillance, and it is a debate worth having. The GDPR framework, fundamental rights law, and democratic principles all impose real constraints on how states can monitor private communications. Those constraints exist for good reason.</p>



<p>But what happened in Kahramanmaraş was not a question of encrypted messages or private channels. Mersinli&#8217;s profile picture was visible to anyone who had his contact. His behavioral isolation was observable to teachers and classmates. The warning signs were not hidden. They were unread.</p>



<p>This is where the conversation about monitoring needs to be more precise. The choice is not between mass surveillance and willful blindness. There is a middle space that involves:</p>



<p><strong>Training educators and school counselors</strong> to recognize the specific behavioral and digital markers associated with radicalization toward mass violence. A student who idolizes a foreign school shooter is not simply &#8220;troubled.&#8221; That is a specific and documented warning sign with its own established literature.</p>



<p><strong>Building structured reporting pathways</strong> between schools and threat assessment teams. Several European countries, including Germany and the Netherlands, have developed multi-agency behavioral threat assessment programs modeled on the US Secret Service&#8217;s work in this area. These programs work when they are actually resourced and integrated into school environments.</p>



<p><strong>Monitoring open-source digital signals</strong> without requiring access to private communications. What Mersinli displayed on his profile was open-source. A school or a social worker or a platform flagging system could theoretically have caught it. The question is whether any of those systems were in place or whether anyone was looking.</p>



<p><strong>Engaging platform providers on incel content specifically.</strong> The Telegram group that celebrated the Kahramanmaraş attack had 100,000 members and had already been linked to two previous murders. That it continued to operate until this moment is a failure of platform governance, not an intelligence gap.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">The Copycat Problem Is Structural</h2>



<p>One of the more uncomfortable findings in mass violence research is that extensive media coverage of attackers, particularly sympathetic or fascinated coverage that focuses on the attacker&#8217;s psychology and background, demonstrably increases the probability of subsequent attacks. The so-called &#8220;contagion effect&#8221; has been documented in peer-reviewed research for decades.</p>



<p>Online communities have essentially weaponized this effect. They do not just report on attacks. They archive them, analyze them, build personas around the perpetrators, and actively market them as role models to young men who are already vulnerable. Elliot Rodger has been dead for twelve years. He has, in that time, inspired more violence than he carried out himself.</p>



<p>Mersinli did not invent his frame of reference. Someone, or more likely some community, handed it to him. That community is still operating. It has 100,000 members in a single Telegram group in Turkey alone.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">What Europe Should Be Doing Differently</h2>



<p>The EU&#8217;s Digital Services Act, fully in force since 2024, creates obligations for very large online platforms to assess and mitigate systemic risks, including risks to public security. Mass violence glorification communities of 100,000 members on major messaging platforms are, by any reasonable reading, a systemic risk. Whether the DSA&#8217;s enforcement mechanisms are being applied to this specific category of content with any seriousness is an open question.</p>



<p>At the national level, the more practical gap is in threat assessment capacity at the local level. National intelligence services are not positioned to monitor every isolated teenager in every European school. But schools, social services, and local police can be. They need better tools, better training, and better coordination structures to do it.</p>



<p>The UK&#8217;s Channel program, Germany&#8217;s VERA-2 radicalization assessment tool, and the Netherlands&#8217; integrated approach to neighborhood-level threat assessment all represent the kind of infrastructure that can catch individuals before they cross a threshold. The precondition is that people in daily contact with at-risk youth know what they are looking for.</p>



<p>A boy who puts Elliot Rodger on his profile picture is telling you something. The question is whether anyone in his environment had been taught to hear it.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">A Note on What This Is Not</h2>



<p>This is not a case where better surveillance technology would have made the difference. It is not a case for reading teenagers&#8217; private messages or expanding state access to encrypted communications. The signals that Mersinli sent were not encrypted. They were in plain view on a platform billions of people use every day.</p>



<p>What failed was human awareness, institutional training, and platform responsibility. Those are solvable problems, and solving them does not require trading privacy for security. It requires investment, coordination, and a clearer-eyed understanding of how radicalization toward mass violence actually works in 2026.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>AI Broke the Criminal Profile. Now What?</title>
		<link>https://www.digitalintelligence.at/ai-broke-the-criminal-profile-now-what/</link>
					<comments>https://www.digitalintelligence.at/ai-broke-the-criminal-profile-now-what/#respond</comments>
		
		<dc:creator><![CDATA[Ozan Akyol]]></dc:creator>
		<pubDate>Thu, 26 Mar 2026 21:36:48 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Intelligence]]></category>
		<guid isPermaLink="false">https://www.digitalintelligence.at/?p=4428</guid>

					<description><![CDATA[How artificial intelligence is rewriting the rules of criminal behavior, and why the profiler&#8217;s playbook needs a fundamental reset. Criminal profiling has always rested on one core assumption: criminals are creatures of habit. They leave behavioral signatures. They escalate predictably. Their psychology leaks through their methods. For decades, this held up well enough. The FBI&#8217;s Behavioral Analysis Unit built an entire discipline around reading crime scenes like psychological fingerprints, classifying offenders as organized or disorganized, mapping modus operandi against personality types, and predicting the next move based on the last one. Then AI entered the equation. Not as a tool]]></description>
										<content:encoded><![CDATA[
<p>How artificial intelligence is rewriting the rules of criminal behavior, and why the profiler&#8217;s playbook needs a fundamental reset.</p>



<p>Criminal profiling has always rested on one core assumption: criminals are creatures of habit. They leave behavioral signatures. They escalate predictably. Their psychology leaks through their methods. For decades, this held up well enough. The FBI&#8217;s Behavioral Analysis Unit built an entire discipline around reading crime scenes like psychological fingerprints, classifying offenders as organized or disorganized, mapping modus operandi against personality types, and predicting the next move based on the last one.</p>



<p>Then AI entered the equation. Not as a tool for investigators, but as a tool for criminals. And it didn&#8217;t just make crime easier. It fundamentally altered who commits crime, how they behave while doing it, and what traces they leave behind. That shift is quietly dismantling the foundations of classical profiling.</p>



<h2 class="wp-block-heading">The Old Rules</h2>



<p>Traditional profiling works on a set of behavioral axioms. Behavior reflects personality. Crime scenes tell stories about the offender&#8217;s psychology. Signature behaviors, those acts unnecessary for completing the crime but driven by deep psychological needs, remain consistent across offenses. Modus operandi evolves as the offender learns, but the core emotional drivers stay stable.</p>



<p>These principles gave investigators a framework: analyze the scene, read the behavior, build a psychological sketch, narrow the suspect pool. It was never perfect. FBI internal data suggested profiling contributed to solving roughly 17% of cases where it was applied. Academic reviews have been even less generous. But as a supplementary tool alongside forensic evidence and traditional detective work, it had value.</p>



<p>The problem is that every one of these axioms assumes the offender is acting from their own psychology, with their own skills, under their own operational limitations. AI has removed those constraints.</p>



<h2 class="wp-block-heading">The New Criminal Doesn&#8217;t Fit the Old Mold</h2>



<p>Consider what AI has done to the barrier of entry for sophisticated crime. Voice cloning now requires 20 to 30 seconds of audio. Convincing deepfake video can be produced in under an hour using freely available tools. Dark LLMs and jailbreak-as-a-service platforms generate phishing campaigns, social engineering scripts, and even malware with minimal technical knowledge required from the operator.</p>



<p>This is the first major break from classical profiling logic. The old model assumed a correlation between crime sophistication and offender capability. An organized crime scene implied an intelligent, socially competent, methodical individual. A well-crafted social engineering attack suggested experience, psychological insight, and confidence. AI has severed that link entirely. A teenager with a laptop can now execute attacks that would have previously required a team of experienced operatives.</p>



<p>The Trend Micro research team documented this shift in their 2025 criminal AI report: the underground ecosystem has moved from experimentation to industrialization. Criminals no longer build their own tools. They rent them. The barrier has collapsed, the tooling has professionalized, and the attack surface has expanded across every domain. Telegram channels now recruit &#8220;AI video actors&#8221; and &#8220;deepfake presenters&#8221; as a service category.</p>



<p>What does this mean for profiling? It means the behavioral signature, the profiler&#8217;s primary analytical unit, is increasingly a product of the tool rather than the person behind it. When a deepfake CEO orders a wire transfer on a video call, the behavioral cues that investigators would normally analyze (speech patterns, confidence level, emotional state, decision-making style) belong to the AI model, not the attacker. The criminal becomes invisible behind the synthetic layer.</p>



<h2 class="wp-block-heading">AI Doesn&#8217;t Just Enable Crime. It Redirects It.</h2>



<p>Here is the less obvious but more consequential effect. AI isn&#8217;t simply making existing criminal patterns more efficient. It is creating entirely new behavioral categories that classical profiling has no framework to address.</p>



<p>Take synthetic identity fraud. Criminals now build complete fake identities using a mix of real and fabricated data, pass automated KYC checks with AI-generated documents, and operate accounts that leave behind a perfectly normal behavioral footprint. There is no psychological signature to read because the &#8220;person&#8221; never existed. The behavior was designed by algorithm to look average.</p>



<p>Or consider AI-powered behavioral mimicry. Trend Micro and Group-IB both documented cases where AI studied institutional behavior patterns (transaction timing, approval workflows, communication styles) and then replicated them precisely to avoid triggering fraud detection. The criminal isn&#8217;t acting like themselves anymore. They are acting like the system expects a legitimate user to act. This is the opposite of what profiling relies on: instead of behavior revealing identity, behavior is engineered to conceal it.</p>



<p>The 2025 AI Incident Database recorded 346 AI-related incidents in a single year. Of those, 179 involved deepfake impersonation. The targets ranged from CEOs to private individuals. In one case, a British widow lost half a million pounds in a romance scam powered by deepfake video of a celebrity. A Florida couple lost $45,000 to a fabricated Elon Musk giveaway. These are not sophisticated adversaries with complex psychological profiles. These are operators running playbooks, sometimes literally purchased as step-by-step tutorials from underground forums.</p>



<h2 class="wp-block-heading">The Profiling Crisis</h2>



<p>Classical profiling depends on three things that AI is systematically eroding:</p>



<p><strong>Behavioral consistency.</strong> AI allows criminals to switch personas, communication styles, and operational methods between attacks with zero psychological cost. There is no escalation pattern to track because each attack can be calibrated independently by the tool.</p>



<p><strong>Skill-behavior correlation.</strong> The assumption that crime complexity reflects offender sophistication is broken. AI democratizes capability. The profile of &#8220;who could do this&#8221; expands from a narrow suspect pool to essentially anyone with internet access and basic prompt engineering skills.</p>



<p><strong>Psychological leakage.</strong> Crime scenes and communications used to leak the offender&#8217;s personality involuntarily. When AI generates the phishing email, conducts the video call, or crafts the social engineering script, the psychological content belongs to the model&#8217;s training data, not the operator&#8217;s mind.</p>



<p>This doesn&#8217;t mean profiling is dead. But it means the discipline needs to shift its unit of analysis. Instead of asking &#8220;what kind of person did this,&#8221; investigators increasingly need to ask &#8220;what kind of toolchain produced this behavior.&#8221; The profiling target is migrating from psychology to infrastructure.</p>



<h2 class="wp-block-heading">Where Profiling Still Works, and Where It Can&#8217;t</h2>



<p>Profiling retains value in crimes that remain fundamentally physical and personal: serial violent offenses, sexual crimes, stalking, arson. These still carry strong behavioral signatures because the offender&#8217;s psychological needs drive the act directly, not through a technological intermediary.</p>



<p>But for the fastest-growing categories of crime (fraud, identity theft, business email compromise, financial manipulation, extortion through synthetic media), classical profiling is increasingly irrelevant. The offender&#8217;s psychology matters less than their toolkit. Their behavioral patterns are shaped more by the AI model they are using than by their own personality.</p>



<p>The intelligence community and law enforcement agencies that recognize this shift will adapt. Those that keep trying to build psychological profiles of operators who are essentially invisible behind AI-generated behavior will waste time and resources chasing ghosts.</p>



<p>The profiler&#8217;s question used to be: <em>Who is this person?</em></p>



<p>Now it needs to be: <em>What system is this person hiding behind, and where does that system leak?</em></p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.digitalintelligence.at/ai-broke-the-criminal-profile-now-what/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The First Cyber War: How Digital Intelligence Shaped Operation Epic Fury</title>
		<link>https://www.digitalintelligence.at/the-first-cyber-war-how-digital-intelligence-shaped-operation-epic-fury/</link>
					<comments>https://www.digitalintelligence.at/the-first-cyber-war-how-digital-intelligence-shaped-operation-epic-fury/#respond</comments>
		
		<dc:creator><![CDATA[Ozan Akyol]]></dc:creator>
		<pubDate>Mon, 16 Mar 2026 02:30:49 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Worldwide]]></category>
		<category><![CDATA[hybrid threats]]></category>
		<category><![CDATA[intelligence analysis]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://www.digitalintelligence.at/?p=4422</guid>

					<description><![CDATA[I&#8217;ve been covering cyber threats for years now, and I&#8217;ve sat through countless conference panels where retired generals talk about &#8220;the coming cyber war.&#8221; Always in the future tense. Always hypothetical. That era is over. On February 28, the US and Israel hit Iran. But the shooting started in cyberspace. Hours before any jet crossed Iranian airspace, US Cyber Command had already gutted Tehran&#8217;s communications and sensor networks. General Dan Caine confirmed it publicly: space and cyber operations came first, leaving Iran unable to &#8220;see, coordinate, or respond effectively.&#8221; Think about what that means. By the time the bombs dropped,]]></description>
										<content:encoded><![CDATA[
<p></p>



<p>I&#8217;ve been covering cyber threats for years now, and I&#8217;ve sat through countless conference panels where retired generals talk about &#8220;the coming cyber war.&#8221; Always in the future tense. Always hypothetical. That era is over.</p>



<p>On February 28, the US and Israel hit Iran. But the shooting started in cyberspace. Hours before any jet crossed Iranian airspace, US Cyber Command had already gutted Tehran&#8217;s communications and sensor networks. General Dan Caine confirmed it publicly: space and cyber operations came first, leaving Iran unable to &#8220;see, coordinate, or respond effectively.&#8221; Think about what that means. By the time the bombs dropped, the Iranian military was already operating blind.</p>



<p>And it only got stranger from there.</p>



<h2 class="wp-block-heading">Tehran&#8217;s traffic cameras killed the Supreme Leader</h2>



<p>This is the part that reads like fiction but isn&#8217;t. Israeli intelligence had been inside Tehran&#8217;s traffic camera network for what appears to be months, possibly longer. Not just watching. Feeding the footage into a machine alongside CIA human intelligence, signals intercepts, satellite imagery, communications metadata. The Financial Times was first to report the scope of it. One Israeli source called the whole setup an AI-powered &#8220;target production machine.&#8221; You pour data in, you get a 14-digit grid coordinate out.</p>



<p>They built what they called a &#8220;life pattern&#8221; for Khamenei. His routes. His schedules. Which aides traveled with him. When his security detail was thinnest. The Jerusalem Post reported that Israeli analysts mapped these patterns over an extended period, cross-referencing traffic camera data with other intelligence streams.</p>



<p>Then the CIA confirmed Khamenei would attend a senior military meeting on the morning of the 28th. The entire operation timeline shifted around that single piece of intelligence. The result: Khamenei dead, along with the IRGC commander, the defense minister, the chief of staff, the head of the National Defense Council. More than a dozen top officials, gone before lunch.</p>



<p>I keep coming back to what RUSI wrote about this. They pointed out something that gets lost in the spectacle: cyber&#8217;s biggest contribution here wasn&#8217;t disruption. It was reconnaissance. Years of quiet network access, pre-positioned in Iranian infrastructure, activated at the decisive moment. That&#8217;s not a hack. That&#8217;s a long-term intelligence operation that happened to run through fiber optic cables instead of dead drops.</p>



<h2 class="wp-block-heading">Israel doesn&#8217;t want to depend on Silicon Valley for its kill chain</h2>



<p>Here&#8217;s something that should concern anyone in the AI policy space. Haaretz reporter Omer Benjakob told NPR that Israel is building its own military AI systems specifically because it can&#8217;t afford to rely on American commercial platforms. His quote was memorable: &#8220;One day someone will discover we also use Claude, and then there&#8217;ll be a protest in San Francisco, and then they&#8217;ll take Claude away from us.&#8221;</p>



<p>He said this on the record.</p>



<p>The Anthropic dispute with the Trump administration over military use of Claude is well documented at this point. But the strategic implications go deeper than one company&#8217;s ethical stance. If your precision targeting pipeline depends on a model whose provider can revoke access based on a policy change or public pressure campaign, you have a serious sovereignty problem. Israel clearly sees it that way. Others will too.</p>



<p>None of this means AI targeting is ready for primetime, though. The March 8 strike on the Shajareh Tayyebeh school in Minab killed 165 people. 110 of them were schoolgirls. The building used to be a military base. Whether AI targeting systems worked off stale data is still under investigation, but a UCL computer scientist put the core issue bluntly: &#8220;This stuff is only two or three years old.&#8221;</p>



<p>Speed and precision are not the same thing. This war is proving that every day.</p>



<h2 class="wp-block-heading">60 hacktivist groups, one internet blackout, and a paradox</h2>



<p>Iran&#8217;s internet dropped to somewhere between 1% and 4% connectivity on February 28. That&#8217;s barely functional. You&#8217;d think that would cripple the regime&#8217;s cyber response. And for the state-run APT groups operating inside Iran, it probably did, at least initially.</p>



<p>But that&#8217;s not how Iran&#8217;s cyber infrastructure actually works. Tehran has spent years building out proxy networks. Hacktivist groups, some loosely affiliated, some directly run by MOIS or the IRGC, operating from outside Iran&#8217;s borders. When the internet went dark domestically, these external nodes lit up.</p>



<p>Unit 42 counted around 60 groups active in the first week alone. Handala Hack, which has documented ties to the Ministry of Intelligence, ran wiper and exfiltration campaigns against Israeli defense targets. On March 12, they hit Stryker, one of the largest medical technology companies in the US. MuddyWater, an IRGC-linked group, turned out to have pre-planted backdoors in Israeli-adjacent defense and financial networks. They didn&#8217;t need to break in after the war started. They were already inside.</p>



<p>March 2 was when things escalated beyond the Middle East. Pro-Russian hacktivist group NoName057(16) formally joined the Iranian coalition. Since then, the combined front has been hitting targets in Cyprus, Romania, across the Gulf states. Government websites, airports, telecom providers. The Russia-Iran cyber axis is no longer theoretical. It&#8217;s operational.</p>



<p>Now, the OT and SCADA claims. Groups have been posting screenshots alleging access to Israeli water systems, Jordanian grain storage controls, various industrial systems. John Hultquist at Google Threat Intelligence has been saying for years that Iran exaggerates its cyber successes for psychological effect, and he&#8217;s right. A lot of these claims don&#8217;t hold up under scrutiny.</p>



<p>But I&#8217;d be careful about dismissing all of it. CyberAv3ngers compromised real US water systems in 2023 using nothing more sophisticated than default passwords on Unitronics PLCs. The capability is proven. What we don&#8217;t know is how much coordination these proxy groups can maintain while their state sponsors are dealing with an actual shooting war.</p>



<h2 class="wp-block-heading">The information battlefield is now indistinguishable from the physical one</h2>



<p>Before the first airstrike, Israel had already compromised BadeSaba, a popular Iranian prayer app with over five million users. They pushed messages to regime supporters urging military defection. They hijacked state news websites to publish anti-regime content. Later, they sent AI-equipped drone swarms over Tehran to hit Basij militia checkpoints.</p>



<p>Iran&#8217;s been playing the same game in reverse for years. Dozens of Israeli nationals recruited through Telegram, paid to commit low-level sabotage: starting fires, spraying antigovernment graffiti, sowing social discord. A Clemson University researcher called Israel&#8217;s approach &#8220;psychological operations integrated with military operations in one clean campaign with a single goal: toppling the Iranian regime.&#8221;</p>



<p>Both sides have turned every digital platform into a weapon. Messaging apps, news sites, social media, traffic infrastructure. There&#8217;s no longer a meaningful line between &#8220;cyber operation&#8221; and &#8220;influence operation.&#8221; It&#8217;s all one battlefield.</p>



<h2 class="wp-block-heading">CISA is running on fumes at the worst possible time</h2>



<p>I can&#8217;t write about this conflict&#8217;s cyber dimension without mentioning what&#8217;s happening at CISA. The agency has lost roughly a third of its staff. The temporary director got reassigned to another corner of DHS right as the war kicked off. FBI and NSA have put out joint warnings about Iranian targeting of US defense contractors and financial firms. Jamie Dimon at JPMorgan went on CNBC and said banks are bracing for a wave of cyber and terrorist attacks.</p>



<p>So at the exact moment when motivated, state-aligned Iranian cyber actors are looking for American targets, the primary agency that&#8217;s supposed to coordinate civilian cyber defense is hollowed out. That should worry people far more than it seems to.</p>



<h2 class="wp-block-heading">European organizations need to pay attention</h2>



<p>The NCSC in the UK puts Iran in the same threat tier as Russia and North Korea. That was true before February 28. It&#8217;s more true now, because the Russian hacktivist groups that joined the Iranian coalition have broadened the targeting aperture into Europe.</p>



<p>Organizations in Austria and the DACH region might feel geographically removed from this conflict. They&#8217;re not. If your supply chain touches Israeli technology, if your cloud provider hosts workloads for companies in targeted sectors, if you run Israeli-manufactured OT equipment, you&#8217;re in scope. CyberAv3ngers targeted Unitronics PLCs in 2023 specifically because they were Israeli-made. That logic doesn&#8217;t stop at borders.</p>



<p>Trellix published research showing that Iranian threat groups have expanded from targeting a handful of countries to more than twenty since the conflict started. Western Europe is on that list. The tactics are familiar: spear-phishing, unpatched edge devices, ransomware that looks criminal but serves state interests, data leaks timed for maximum embarrassment.</p>



<h2 class="wp-block-heading">This doesn&#8217;t end when the bombing stops</h2>



<p>Iranian APT groups like APT42, APT34 and MuddyWater have a well-documented habit of running campaigns for years after the initial trigger. The proxy networks are activated. Russia and Iran have found operational common ground in cyberspace. The infrastructure built for this conflict will be repurposed, not dismantled.</p>



<p>Two decades of defense policy debates about whether cyber is a &#8220;real&#8221; domain of warfare just got their answer. In this conflict, cyber was the opening move, the intelligence backbone, the targeting enabler, the psychological weapon, and the retaliatory instrument of choice for a regime that lost its conventional military options in a matter of hours.</p>



<p>We&#8217;re not waiting for the first cyber war anymore. We&#8217;re in it.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>
]]></content:encoded>
					
					<wfw:commentRss>https://www.digitalintelligence.at/the-first-cyber-war-how-digital-intelligence-shaped-operation-epic-fury/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Blind Spot in European Cybersecurity: Why SMEs Are Losing the Attack Surface Battle</title>
		<link>https://www.digitalintelligence.at/the-blind-spot-in-european-cybersecurity-why-smes-are-losing-the-attack-surface-battle/</link>
		
		<dc:creator><![CDATA[Ozan Akyol]]></dc:creator>
		<pubDate>Fri, 27 Feb 2026 16:09:49 +0000</pubDate>
				<category><![CDATA[Europe]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[hybrid threats]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://www.digitalintelligence.at/?p=4409</guid>

					<description><![CDATA[Most European small and mid-sized enterprises believe they are too small to be targeted. The data tells a different story. According to ENISA&#8217;s 2025 Threat Landscape Report, over 60% of cyberattacks in the EU now target organisations with fewer than 250 employees. The reason is simple: attackers follow the path of least resistance, and SMEs consistently present the weakest perimeter. Having spent over a decade in intelligence and security operations, from securing diplomatic missions for the German Federal Foreign Office to advising law enforcement on digital threats, I have observed a consistent pattern. Organisations do not fail because they lack]]></description>
										<content:encoded><![CDATA[
<p>Most European small and mid-sized enterprises believe they are too small to be targeted. The data tells a different story. According to ENISA&#8217;s 2025 Threat Landscape Report, over 60% of cyberattacks in the EU now target organisations with fewer than 250 employees. The reason is simple: attackers follow the path of least resistance, and SMEs consistently present the weakest perimeter.</p>



<p>Having spent over a decade in intelligence and security operations, from securing diplomatic missions for the German Federal Foreign Office to advising law enforcement on digital threats, I have observed a consistent pattern. Organisations do not fail because they lack firewalls or antivirus software. They fail because they do not know what they are exposing to the internet in the first place.</p>



<h2 class="wp-block-heading">The Problem No One Talks About</h2>



<p>Every organisation has an attack surface. It includes every domain, subdomain, IP address, open port, exposed API, cloud instance, and forgotten staging server connected to the internet. For a company with even a modest digital footprint, this can amount to hundreds of potential entry points.</p>



<p>The challenge is visibility. Most SMEs have no systematic way to inventory their external-facing assets. A marketing team spins up a subdomain for a campaign and never takes it down. A developer leaves a test environment exposed with default credentials. An old mail server runs an unpatched version of Exchange. Each of these is an open door.</p>



<p>Large enterprises address this through dedicated security operations centres and expensive enterprise tools. But for a company with 50 or 100 employees, these solutions are neither accessible nor affordable. This gap between awareness and capability is where most breaches begin.</p>



<h2 class="wp-block-heading">Attack Surface Management: From Military Doctrine to Cyber Defence</h2>



<p>The concept of attack surface management (ASM) has its roots in military intelligence. Before any operation, you map the terrain. You identify vulnerabilities in your own position before the adversary does. The same principle applies to cybersecurity.</p>



<p>Modern ASM platforms automate the process of discovering, cataloguing, and continuously monitoring an organisation&#8217;s external-facing digital assets. They scan for exposed services, misconfigurations, known vulnerabilities, leaked credentials on the dark web, and other indicators of risk.</p>



<p>What makes ASM fundamentally different from traditional vulnerability scanning is scope and continuity. A vulnerability scan checks known assets at a point in time. ASM discovers unknown assets and monitors them continuously. It answers the question most security teams cannot: <em>What do we not know about our own exposure?</em></p>



<h2 class="wp-block-heading">The European Dimension</h2>



<p>For European organisations, the stakes are compounded by regulation. The NIS2 Directive, which came into full effect across EU member states, imposes strict cybersecurity requirements on a far broader range of companies than its predecessor. Entities classified as &#8220;essential&#8221; or &#8220;important&#8221; must implement risk-based security measures, conduct regular assessments, and report incidents within tight timeframes.</p>



<p>GDPR adds another layer. A breach resulting from an unmonitored attack surface does not just cause operational damage. It triggers mandatory notification requirements and potential fines of up to 4% of global annual turnover.</p>



<p>Despite these pressures, most European SMEs still rely on periodic penetration tests, conducted once or twice a year, as their primary security assessment. In a threat landscape where new vulnerabilities are disclosed daily and attack infrastructure is automated, annual testing is the equivalent of checking your locks once a year in a neighbourhood where break-ins happen every week.</p>



<h2 class="wp-block-heading">Continuous Monitoring as the New Baseline</h2>



<p>The shift from periodic assessment to continuous monitoring is not optional. It is a necessity. Attackers use automated reconnaissance tools that scan the entire IPv4 address space in minutes. If an organisation exposes a vulnerable service, it can be discovered and exploited within hours, sometimes within minutes.</p>



<p>This is the operational reality that led me to develop <a href="https://securityscanner.ai?utm_source=digitalintelligence&amp;utm_medium=blog&amp;utm_campaign=asm_article" target="_blank" rel="noopener">SecurityScanner.ai</a>, an attack surface management platform designed specifically for the European market. The platform provides continuous external monitoring, automated vulnerability detection, dark web credential monitoring, and AI-driven risk assessment. It is built from the ground up with GDPR-compliant infrastructure and priced for organisations that do not have six-figure security budgets.</p>



<p>The philosophy behind it is straightforward. Every organisation, regardless of size, deserves the same level of visibility into its attack surface that was previously only available to large enterprises and government agencies.</p>



<h2 class="wp-block-heading">What a Proper ASM Workflow Looks Like</h2>



<p>For organisations beginning to take attack surface management seriously, the process follows a clear logic.</p>



<p><strong>Discovery</strong> is the first phase. You cannot protect what you do not know exists. This means automated enumeration of all domains, subdomains, IP ranges, cloud assets, and third-party services associated with your organisation. The results are often surprising. Most companies discover 30 to 40 percent more external assets than they were aware of.</p>



<p><strong>Assessment</strong> follows discovery. Each discovered asset is evaluated for known vulnerabilities, misconfigurations, exposed sensitive data, outdated software, and weak encryption. This is where automated scanning intersects with threat intelligence, correlating discovered exposures against actively exploited vulnerabilities in the wild.</p>



<p><strong>Monitoring</strong> makes the process continuous. New assets, new vulnerabilities, and new threats emerge constantly. A platform like <a href="https://securityscanner.ai?utm_source=digitalintelligence&amp;utm_medium=blog&amp;utm_campaign=asm_article" target="_blank" rel="noopener">SecurityScanner.ai</a> runs these checks on an ongoing basis, alerting security teams to changes in their attack surface before adversaries can exploit them.</p>



<p><strong>Dark web intelligence</strong> adds a critical layer that traditional scanning misses entirely. Stolen credentials, leaked databases, and mentions of your organisation on underground forums represent threats that exist outside your network perimeter but directly impact your security posture. Integrating dark web monitoring into the ASM workflow provides early warning of compromised accounts and data breaches.</p>



<h2 class="wp-block-heading">The Intelligence Perspective</h2>



<p>From an intelligence standpoint, attack surface management is fundamentally an exercise in counter-reconnaissance. You are attempting to see yourself the way an adversary sees you, and to close gaps before they are exploited.</p>



<p>This is not theoretical. In my advisory work with law enforcement and government institutions, I have seen repeatedly how even well-resourced organisations are compromised through forgotten assets. A subdomain pointing to a decommissioned server. An exposed admin panel with weak authentication. A cloud storage bucket with public read access. These are not sophisticated attacks. They are failures of visibility.</p>



<p>The lesson is clear. Cybersecurity is not primarily a technology problem. It is an intelligence problem. And like all intelligence problems, it begins with knowing your own terrain.</p>



<h2 class="wp-block-heading">Conclusion</h2>



<p>The European cybersecurity landscape is at an inflection point. Regulatory pressure is increasing. Attack automation is accelerating. And the gap between enterprise-grade security and SME capability remains dangerously wide.</p>



<p>Attack surface management is not a luxury. It is the foundation upon which all other security measures depend. Without continuous visibility into your external exposure, every other investment in cybersecurity is built on incomplete information.</p>



<p>For organisations ready to take this step, the tools now exist to make it practical and affordable. The question is no longer whether you can afford to implement continuous attack surface monitoring. It is whether you can afford not to.</p>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>WiFi Signals Can See You: How CSI Sensing Works</title>
		<link>https://www.digitalintelligence.at/wifi-signals-can-see-you-how-csi-sensing-works/</link>
					<comments>https://www.digitalintelligence.at/wifi-signals-can-see-you-how-csi-sensing-works/#respond</comments>
		
		<dc:creator><![CDATA[Ozan Akyol]]></dc:creator>
		<pubDate>Tue, 06 Jan 2026 17:48:03 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Intelligence]]></category>
		<guid isPermaLink="false">https://www.digitalintelligence.at/?p=4401</guid>

					<description><![CDATA[Your WiFi router does more than connect you to the internet. The radio waves it sends are bouncing off everything in your room, including you. And those reflections contain a surprising amount of information. This is called CSI sensing, and it is quietly becoming a big deal in security, smart homes, and healthcare. What is CSI? CSI stands for Channel State Information. When WiFi signals travel from your router to your phone, they dont go in a straight line. They bounce off walls, furniture, and people. This is called multipath propagation. Modern WiFi (802.11n and newer) divides its channel into]]></description>
										<content:encoded><![CDATA[
<p></p>



<p>Your WiFi router does more than connect you to the internet. The radio waves it sends are bouncing off everything in your room, including you. And those reflections contain a surprising amount of information.</p>



<p>This is called CSI sensing, and it is quietly becoming a big deal in security, smart homes, and healthcare.</p>



<h2 class="wp-block-heading">What is CSI?</h2>



<p>CSI stands for Channel State Information. When WiFi signals travel from your router to your phone, they dont go in a straight line. They bounce off walls, furniture, and people. This is called multipath propagation.</p>



<p>Modern WiFi (802.11n and newer) divides its channel into many subcarriers. For each one, the system measures amplitude (signal strength) and phase (timing). This data is CSI.</p>



<p>Here is why this matters: when a person moves through a room, they disturb these signal paths. The human body contains a lot of water, which affects radio waves significantly. This disturbance shows up in CSI data as measurable changes.</p>



<p>So if you can read CSI data and analyze it properly, you can detect human presence and movement without any cameras or sensors on the person.</p>



<h2 class="wp-block-heading">How it actually works</h2>



<p>Think about throwing a stone in a pond. The ripples spread out and reflect off the edges. If someone walks through the water, the ripple pattern changes in a predictable way.</p>



<p>WiFi signals work similarly. There are regions between transmitter and receiver called Fresnel zones where signals interfere with each other. When you walk through these zones, you cause phase shifts that can be detected.</p>



<p>The processing pipeline looks like this:</p>



<p>First you collect raw CSI data from WiFi hardware. Then you clean it up, remove noise, fix phase errors. After that you extract features like variance, frequency components, correlation patterns. Finally you feed this into a classifier, could be SVM, could be a neural network like LSTM or CNN.</p>



<p>Recent papers from 2024 and 2025 report accuracy rates above 99% for activity recognition on standard datasets. Real world performance is lower, but still impressive.</p>



<h2 class="wp-block-heading">What can you do with this?</h2>



<p><strong>Detecting people</strong></p>



<p>The most basic application. Is someone in the room or not? This works even through walls, which is something cameras cannot do. You dont need line of sight.</p>



<p><strong>Activity recognition</strong></p>



<p>With good training data, you can distinguish walking from sitting from falling. This is useful for elderly care. If grandma falls and doesnt get up, the system can alert someone. No wearable device needed.</p>



<p><strong>Vital signs</strong></p>



<p>This one surprised me when I first learned about it. When you breathe, your chest moves a few millimeters. This tiny movement creates detectable changes in CSI. Researchers have demonstrated breathing rate detection and even heart rate estimation in controlled conditions.</p>



<p><strong>Intrusion detection</strong></p>



<p>This is where it gets interesting from a security perspective. Traditional motion sensors have problems. They have blind spots. They can be fooled if you move slowly enough. They need to be installed and maintained.</p>



<p>CSI based intrusion detection uses your existing WiFi infrastructure. It can detect slow, careful movement that would fool a PIR sensor. It works through walls. The intruder cannot see where the sensors are because there are no sensors, just your router.</p>



<p>Systems like Wi-Alarm have shown reliable detection of various intrusion patterns in research settings.</p>



<p><strong>Counting people</strong></p>



<p>You can estimate how many people are in a room. Useful for building management, energy savings, or compliance with occupancy limits.</p>



<h1 class="wp-block-heading">How to Get Started &#8211; Technical Implementation</h1>



<p>The cheapest way to experiment with CSI sensing is an ESP32 microcontroller. Espressif provides an official esp-csi toolkit on GitHub. You flash the firmware, connect the ESP32 to your WiFi network, and it starts outputting raw CSI data over serial. The data includes amplitude and phase for each subcarrier, typically 52 values per packet at 100-200 packets per second. From there you pipe it into Python for processing. Basic presence detection works by calculating variance across subcarriers. When someone moves, variance spikes. When the room is empty, it stays flat. You can get this working in an afternoon.</p>



<p>For better results you need better hardware. Raspberry Pi 4 with Nexmon firmware gives you access to CSI from the Broadcom WiFi chip. More subcarriers, cleaner phase data, higher sample rates. The setup is more involved, you need to patch the firmware and compile kernel modules, but there is good documentation. Intel 5300 NIC is the classic research platform with the most published code to reference, but requires an older laptop with mini PCIe slot. Once you have data flowing, the processing pipeline is standard: denoise with a low-pass filter or PCA, extract features like variance, entropy, dominant frequency from FFT, then train a classifier. Start with SVM for binary presence detection before moving to LSTM or CNN for activity recognition. Scikit-learn and PyTorch both work fine. The main challenge is not the code, it is collecting good training data for your specific environment.</p>



<h2 class="wp-block-heading">Law enforcement and intelligence use</h2>



<p>This is not just academic research. Government agencies are already using this technology operationally.</p>



<p>The US Department of Homeland Security has been developing through-wall sensing systems for years. Their latest project, DePLife (Detect Presence of Life), was developed with MIT Lincoln Lab. In 2024, six law enforcement agencies across California, Texas and South Carolina conducted field assessments of the technology. The system uses radar on WiFi frequencies to detect human presence through walls, showing results on a mobile app.</p>



<p>Israeli company Camero-Tech makes the Xaver series, which is already deployed by military and police units worldwide. Their XLR80 model can detect people through concrete walls from over 100 meters away. It shows real-time position, movement direction, and can even detect breathing of stationary targets.</p>



<p>MaXentric sells the Detex Pro to US law enforcement for around 6000 dollars. It is compact enough to lean against a wall and streams results to a smartphone. Police have used similar devices in hostage situations and warrant services.</p>



<p>The Range-R is another device in active use by US police departments. It can detect movement and breathing through standard building materials.</p>



<p>What makes WiFi CSI interesting is that you do not need specialized military hardware. The same physics works with commercial routers and cheap microcontrollers. The difference is range and reliability, but the basic capability is accessible to anyone.</p>



<h2 class="wp-block-heading">The security angle</h2>



<p>I work in cybersecurity, so I see two sides here.</p>



<p>On one hand, CSI sensing is a powerful tool. You can monitor spaces without visible cameras, which some people prefer for privacy. It works in darkness. It is hard to detect or jam. It uses infrastructure you already have.</p>



<p>On the other hand, the same capabilities create risks. If an attacker has access to your WiFi network, they could potentially monitor your activities. Research has shown CSI can be used to infer keystrokes, identify individuals by their gait, and build activity profiles.</p>



<p>This is not theoretical. The technology exists in commercial products and government hands. Whether it becomes a widespread threat depends on how aware people are and how we design systems going forward.</p>



<h2 class="wp-block-heading">Getting started practically</h2>



<p>If you want to experiment with this, you have options at different price points.</p>



<p>The cheapest is ESP32, around 5 euros. Espressif provides official CSI tools and it is relatively easy to get started. The data quality is moderate but enough for presence detection.</p>



<p>Raspberry Pi with Nexmon firmware is maybe 50 euros total. Better CSI quality, more flexibility, but requires more setup.</p>



<p>Intel 5300 NIC is the classic research platform. Good data quality, lots of existing code and papers to reference. You need a compatible laptop though.</p>



<p>For software, check out the ESP-CSI repository from Espressif, or the Linux CSI Tool for Intel hardware.</p>



<p>A good first project is simple presence detection. Binary classification, room empty versus occupied. Once that works, you can try activity classification or multi-room setups.</p>



<h2 class="wp-block-heading">Limitations</h2>



<p>I should be honest about the challenges.</p>



<p>Environment sensitivity is the big one. A model trained in your living room probably wont work in your office without retraining. Even moving furniture can break things. This is an active research area but not solved.</p>



<p>Hardware support varies. Not every WiFi chipset exposes CSI data. Consumer routers usually dont. You need specific hardware or firmware modifications.</p>



<p>Multi-person scenarios are hard. When two people are moving, separating their contributions to the signal is complicated.</p>



<p>Real-time processing needs decent hardware. If you want to run neural networks on CSI data continuously, you need computing power.</p>



<h2 class="wp-block-heading">Where this is going</h2>



<p>WiFi 7 is coming with wider channels, which means more subcarriers and finer resolution. Some enterprise vendors like Huawei already ship access points with built-in CSI sensing for smart building applications.</p>



<p>I expect we will see more commercial products in the next few years. The question is whether security and privacy considerations keep pace with the capabilities.</p>



<h2 class="wp-block-heading">Final thoughts</h2>



<p>The WiFi signals in your home carry more information than most people realize. This technology is real, it is improving, and it has both positive and concerning applications.</p>



<p>For security professionals, it is worth understanding. For everyone else, it is worth being aware that walls dont provide as much privacy as you might think.</p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.digitalintelligence.at/wifi-signals-can-see-you-how-csi-sensing-works/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI is the Ultimate Distraction for National Security</title>
		<link>https://www.digitalintelligence.at/ai-is-the-ultimate-distraction-for-national-security/</link>
					<comments>https://www.digitalintelligence.at/ai-is-the-ultimate-distraction-for-national-security/#respond</comments>
		
		<dc:creator><![CDATA[Ozan Akyol]]></dc:creator>
		<pubDate>Wed, 03 Dec 2025 06:19:21 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Worldwide]]></category>
		<guid isPermaLink="false">https://www.digitalintelligence.at/?p=4392</guid>

					<description><![CDATA[Signal Poisoning: Why AI is the Ultimate Distraction for National SecurityThe Haystack Has Changed We used to say that intelligence work was like looking for a needle in a haystack. It was difficult, sure, but at least we knew that if we found something sharp and metallic, it was probably the needle. Those days are over. Today, AI isn&#8217;t just hiding the needle; it’s dumping thousands of &#8220;fake needles&#8221; into the pile every second. They look real, they shine like metal, and they even feel sharp. But they are decoys. The modern analyst’s nightmare isn&#8217;t a lack of information it’s]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading">Signal Poisoning: Why AI is the Ultimate Distraction for National Security<br>The Haystack Has Changed</h1>



<p>We used to say that intelligence work was like looking for a needle in a haystack. It was difficult, sure, but at least we knew that if we found something sharp and metallic, it was probably the needle.</p>



<p>Those days are over.</p>



<p>Today, AI isn&#8217;t just hiding the needle; it’s dumping thousands of &#8220;fake needles&#8221; into the pile every second. They look real, they shine like metal, and they even feel sharp. But they are decoys. The modern analyst’s nightmare isn&#8217;t a lack of information it’s Information Overload on an industrial scale. We aren&#8217;t just looking for the truth anymore; we are trying to survive a flood of convincing lies.</p>



<p>The Weapon of Exhaustion</p>



<p>We often think of cyber warfare as hackers breaking down firewalls or stealing secrets. But the new threat is subtler and perhaps more dangerous. It’s what we call a &#8220;Bureaucratic DDoS.&#8221;</p>



<p>Think of it as a weapon of exhaustion. Adversaries are using generative AI to create a &#8220;Cognitive Flood&#8221; millions of synthetic reports, deepfake videos, and bot managed panic. The goal isn&#8217;t to destroy our data; it’s to force us to waste our limited resources verifying it. It’s a &#8220;deceleration weapon&#8221; designed to clog the gears of intelligence agencies with perfectly formatted junk.</p>



<p>Chasing Ghosts in the Gray Zone</p>



<p>This isn&#8217;t just a digital problem; it has physical consequences. We are seeing the rise of &#8220;Physical DDoS&#8221; attacks.</p>



<p>Imagine a crisis scenario: An AI bot farm floods emergency channels with reports of a massive fire or an armed conflict in a specific neighborhood. The reports look genuine. Photos generated by AI start circulating. Police and first responders rush to the scene, sirens wailing. But when they arrive, the streets are empty.</p>



<p>While our security forces are busy chasing these digital ghosts, the real threat actors are operating unchecked elsewhere. This is the Gray Zone where digital deception translates into real world blindness.</p>



<p>The Cost of Verification</p>



<p>In this noise, the &#8220;Weak Signals&#8221; the subtle, quiet indicators of a real terrorist plot or a foreign intelligence operations are completely drowned out.</p>



<p>There is a concept called &#8220;Open Source Intoxication.&#8221; It means we are getting drunk on bad data. Every hour an analyst spends analyzing a high quality deepfake is an hour stolen from investigating a real threat. The &#8220;Verification Tax&#8221; we are paying is becoming too high to sustain.</p>



<p>Fighting Fire with Fire</p>



<p>So, how do we fix this? We have to admit that the human eye is no longer enough. We can’t &#8220;eyeball&#8221; our way out of this.</p>



<p>We need a &#8220;Zero Trust&#8221; approach to open source data. Unless a piece of information from the web (OSINT) can be cross referenced with human assets (HUMINT) or technical signals, it should be treated as noise.</p>



<p>More importantly, we need to adopt an &#8220;AI vs. AI&#8221; doctrine. If the attack comes at machine speed, the defense cannot move at human speed. We need our own algorithms to filter the noise, spot the synthetic patterns, and clear the haystack, so human analysts can get back to doing what they do best: finding the real needle.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.digitalintelligence.at/ai-is-the-ultimate-distraction-for-national-security/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Notes from a Cyber Intelligence Insider: How Digital Disinformation Really Works</title>
		<link>https://www.digitalintelligence.at/notes-from-a-cyber-intelligence-insider-how-digital-disinformation-really-works/</link>
		
		<dc:creator><![CDATA[Ozan Akyol]]></dc:creator>
		<pubDate>Sat, 22 Nov 2025 12:41:03 +0000</pubDate>
				<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Worldwide]]></category>
		<guid isPermaLink="false">https://www.digitalintelligence.at/?p=4105</guid>

					<description><![CDATA[The Greatest Danger is Hacked Perceptions

For years, I have monitored cyber threats for governments and international institutions. From securing diplomatic missions across 12 countries for the German Federal Foreign Office (Auswärtiges Amt) to tracking the digital footprints of terror financing for the Ministry of Interior in Türkiye, I have always encountered the same reality: The greatest danger I witnessed was not hacked devices, leaked databases, or cracked passwords. The greatest danger was hacked perceptions.

Today, when we say “Cyber Security,” we still picture hooded hackers and scrolling green code. But as a cyber intelligence professional who has operated in the field, I can tell you this: To collapse a state or an institution, you no longer need to attack their servers. You only need to target their reputation and the trust that holds their society together. From border security to election manipulation, I have operated wherever data is weaponized. And with this experience, I can tell you: Digital Disinformation is the nuclear weapon of the 21st century.


⚠️ WARNING: HIGH SECURITY CLEARANCE REQUIRED

Access to this intelligence report is restricted to personnel with Operational (Monthly) or Strategic (Yearly) clearance.

⛔ Standard Clearance (Free) does NOT grant access to this content. Please verify your clearance level before upgrading.]]></description>
										<content:encoded><![CDATA[
<p></p>



<h1 class="wp-block-heading">The Greatest Danger is Hacked Perceptions</h1>



<p>For years, I have monitored cyber threats for governments and international institutions. From securing diplomatic missions across 12 countries for the German Federal Foreign Office (Auswärtiges Amt) to tracking the digital footprints of terror financing for the Ministry of Interior in Türkiye, I have always encountered the same reality: The greatest danger I witnessed was not hacked devices, leaked databases, or cracked passwords. <strong>The greatest danger was hacked perceptions.</strong></p>



<p>Today, when we say “Cyber Security,” we still picture hooded hackers and scrolling green code. But as a cyber intelligence professional who has operated in the field, I can tell you this: To collapse a state or an institution, you no longer need to attack their servers. You only need to target their reputation and the trust that holds their society together. From border security to election manipulation, I have operated wherever data is weaponized. And with this experience, I can tell you: <strong>Digital Disinformation is the nuclear weapon of the 21st century.</strong></p>



<h1 class="wp-block-heading">We Are in an Invisible War</h1>



<p>Understanding Digital Disinformation</p>



<p>Wars used to be fought along physical borders. Now, they are fought on the screen of your smartphone, inside that “innocent” tweet you read with your morning coffee. I have personally analyzed how bot networks are coordinated during election periods, how terror organizations manipulate algorithms to spread propaganda, and how “Deepfake” content is designed to disrupt financial markets.</p>



<h1 class="wp-block-heading">1. Who Pushes the Button? (The Geopolitics of Likes)</h1>



<p>The biggest misconception is that disinformation is chaotic. It is not. It is a calculated investment with a specific ROI (Return on Investment). The &#8220;button&#8221; is almost always pushed by states and state-sponsored groups. But the motivation isn’t just to cause trouble; it is strictly transactional. In my experience, I have seen that foreign powers invest heavily in influencing elections based on their future interests.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>The Actors and Ethical Complexity :</strong></p>



<p><strong>Two or three major companies, primarily based in Israel and India, operate at the center of this industry, focusing on election interference and disinformation prevention.</strong> <strong>I can attest that the products performing the best in this field are often of Israeli origin.</strong> <strong>Importantly, the necessity of producing counter-information to prevent disinformation inherently gives these software capabilities the potential for intentional or unintentional disinformation.</strong> <strong>This demonstrates the complex dual-use ethical framework of the industry.</strong></p>
</blockquote>



<h1 class="wp-block-heading">2. The Death of the &#8220;Egg Account&#8221; (The Incubation Era)</h1>



<p>If you are still trying to spot a bot by looking at its creation date or lack of a profile picture, you are fighting a modern war with a stone axe. Those days are over. Today, millions of accounts are created daily across the globe, but they don’t tweet immediately. They are put into <strong>“Incubation”</strong>. These sleeper accounts are kept dormant for months or years. When the time comes, they are sold to the highest bidder. Because they have a history, they bypass traditional security filters. The only reliable detection method left is analyzing the <strong>Synthetic Text Ratio</strong>. We are no longer looking for a “fake photo”; we are looking for the linguistic fingerprint of an LLM (Large Language Model) in their posts.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>Field Evidence: Instant Data Correlation:</strong></p>



<p><strong>To quantify the access speed of these tools, we conducted a test: We created a new social media account using a freshly acquired, unlisted phone number (a &#8216;zero&#8217; line from the state) and defined political views/interests. We searched this number in an undisclosed disinformation tool on the same day. The result was instantaneous: the tool successfully returned the profile.</strong> <strong>This demonstrates an incredible data ingestion speed, suggesting zero-latency correlation or direct data access, proving that high-value information is immediately accessible.</strong></p>



<p><strong>Operational Depth: Data Enrichment and Sociological Targeting :</strong></p>



<p><strong>Open-market social media analysis tools are useless in elections for this reason.</strong> <strong>Effective disinformation requires data enrichment. These software capabilities must be fed by external data sources, such as previously compromised Turkish Republic personal information databases.</strong> <strong>By adding layers like the user&#8217;s phone number, address, age, and gender, highly potent disinformation applications can be created.</strong> <strong>This process allows for the acquisition of the target audience&#8217;s sociological profile; for example, if the area of residence is economically depressed, disinformation focused on financial matters is the most effective tactic.</strong></p>
</blockquote>



<h1 class="wp-block-heading">3. The Timeline of a Lie: Simultaneous Saturation</h1>



<p>How does a lie wash over a nation in minutes? The process I have observed in the field is a masterclass in coordination. It is not a ripple; it is a tsunami. The attack happens simultaneously across three layers:</p>



<ul class="wp-block-list">
<li><strong>The Swarm:</strong> Thousands of small, incubated accounts initiate the spark.</li>



<li><strong>The Merchants:</strong> “Blue Check” verified accounts, which have been bought and repurposed, validate the lie to trick the algorithms.</li>



<li><strong>The Amplifiers:</strong> If necessary, mainstream media channels are engaged through paid advertisements or compromised journalists.</li>
</ul>



<p>The key here is location diversity. The attack is launched from different geographical locations at the exact same second to trick the platform’s “organic trend” algorithms.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>The Mechanism of Validation :</strong></p>



<ul class="wp-block-list">
<li><strong>Seeding:</strong> The lie is planted in “news sites” that appear reliable but are actually front operations.</li>



<li><strong>The Echo Chamber:</strong> Bot networks and “useful idiots” (an intelligence term for those who unwittingly spread propaganda) are activated.</li>



<li><strong>Legitimation:</strong> The topic becomes a Trend Topic (TT), and mainstream media validates the lie with headlines like “Claims circulating on social media…”</li>
</ul>
</blockquote>



<h1 class="wp-block-heading">4. The Future: We Need “Police AI”</h1>



<p>The sheer volume of AI-generated disinformation has surpassed human capacity to moderate. We cannot fight machines with humans anymore. The future of digital security relies on <strong>“Police AIs.”</strong> We need advanced AI systems designed solely to audit the outputs of other LLMs. These systems must verify information with 100% accuracy against trusted data ledgers.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>Establishing AI Provenance :</strong></p>



<p>Given the proliferation of AI models in the market, <strong>it is paramount to establish the origin of any AI-generated content (text, image, etc.).</strong> <strong>For this to be operational, every AI model must be mandated to possess a unique, invisible metadata &#8216;fingerprint&#8217; or identifier.</strong> <strong>While some large AI providers are already implementing such systems, all new AI models entering the public market must be obligated to report this unique identifier to public institutions and regulatory bodies.</strong> <strong>This standardization is necessary to ensure analysis and attribution can be performed swiftly and accurately by intelligence organizations.</strong></p>
</blockquote>



<p>In 2025 and beyond, the only thing that can stop a rogue AI manipulating a population is a stronger, ethically coded AI policing the digital borders.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h1 class="wp-block-heading">INTELLIGENCE REPORT</h1>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="683" src="https://www.digitalintelligence.at/wp-content/uploads/2025/11/YBBt9pcOQXSXeGE5NSHXOg-1024x683.jpeg" alt="YBBt9pcOQXSXeGE5NSHXOg" class="wp-image-4246" title="YBBt9pcOQXSXeGE5NSHXOg" srcset="https://www.digitalintelligence.at/wp-content/uploads/2025/11/YBBt9pcOQXSXeGE5NSHXOg-1024x683.jpeg 1024w, https://www.digitalintelligence.at/wp-content/uploads/2025/11/YBBt9pcOQXSXeGE5NSHXOg-300x200.jpeg 300w, https://www.digitalintelligence.at/wp-content/uploads/2025/11/YBBt9pcOQXSXeGE5NSHXOg-768x512.jpeg 768w, https://www.digitalintelligence.at/wp-content/uploads/2025/11/YBBt9pcOQXSXeGE5NSHXOg-60x40.jpeg 60w, https://www.digitalintelligence.at/wp-content/uploads/2025/11/YBBt9pcOQXSXeGE5NSHXOg-720x480.jpeg 720w, https://www.digitalintelligence.at/wp-content/uploads/2025/11/YBBt9pcOQXSXeGE5NSHXOg.jpeg 1248w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<h1 class="wp-block-heading">TECHNICAL ANATOMY OF MODERN DISINFORMATION</h1>



<h1 class="wp-block-heading">Infrastructure, Data Enrichment, and Attribution Protocols (2025)</h1>



<p><strong>Classification:</strong> PUBLIC (Redacted for General Release) <strong>Author:</strong> Ozan Akyol | Digital Intelligence <strong>Sector:</strong> Cyber Warfare &amp; Strategic Intelligence <strong>Date:</strong> November 2025</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h1 class="wp-block-heading">EXECUTIVE SUMMARY</h1>



<p>Unlike traditional cyberattacks that prioritize stealth and anonymity, modern disinformation operations prioritize <strong>&#8220;Localization&#8221;</strong> and <strong>&#8220;Persistence.&#8221;</strong> This report outlines the technical architecture of state-sponsored and private-sector influence campaigns observed in the field.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h1 class="wp-block-heading">1. INFRASTRUCTURE &amp; NETWORK ARCHITECTURE</h1>



<p>The primary objective of the network layer is not to hide the traffic, but to make it appear indistinguishable from organic local activity.</p>



<ul class="wp-block-list">
<li><strong>4G/5G SIM Farms (The Localization Layer):</strong> Botnets no longer rely solely on datacenter IPs, which are easily flagged. Instead, operators utilize industrial-scale <strong>4G/5G SIM Farms</strong>.
<ul class="wp-block-list">
<li><em>Operational Logic:</em> The goal is to ensure traffic originates from a legitimate mobile carrier (e.g., a specific cell tower in Berlin or Istanbul). This bypasses &#8220;Datacenter IP&#8221; filters and mimics genuine user behavior.</li>
</ul>
</li>



<li><strong>Weaponized IoT Devices:</strong> Compromised IoT devices (smart cameras, home routers) are utilized to achieve <strong>&#8220;Geo-Distribution.&#8221;</strong> By routing traffic through residential devices, the operation signals to platform algorithms that a topic is being discussed organically across the entire country, rather than a single server farm.</li>



<li><strong>Bulletproof Hosting Strategy:</strong> For the &#8220;Seeding&#8221; phase (hosting fake news sites), operators prefer <strong>Bulletproof Hosting</strong> providers located in jurisdictions with high resistance to international takedown requests, specifically <strong>USA, China, and Myanmar</strong>. The priority here is physical control and resilience against legal intervention.</li>
</ul>



<h1 class="wp-block-heading">2. C2 ARCHITECTURE &amp; SOFTWARE STACK</h1>



<p>The Command and Control (C2) infrastructure is designed for <strong>Portability</strong> and <strong>Speed</strong>, not aesthetics.</p>



<ul class="wp-block-list">
<li><strong>Tech Stack:</strong> 80% of observed operations utilize a <strong>Python-based</strong> architecture. <strong>Django</strong> is the standard for User Interface (UI) development.
<ul class="wp-block-list">
<li><em>Why Python?</em> It allows for rapid prototyping (Hot-fixes), extensive library support for data manipulation, and easy <strong>Dockerization</strong>. If a server is burned, the entire C2 infrastructure can be migrated to a new jurisdiction in minutes.</li>
</ul>
</li>



<li><strong>Minimalist Design:</strong> These tools do not have polished UIs. They feature raw dashboards focused on inputting targets and monitoring volume/sentiment.</li>
</ul>



<h1 class="wp-block-heading">3. DATA ENRICHMENT &amp; TARGETING (The Kill Chain)</h1>



<p>The most lethal aspect of modern disinformation is the fusion of social media data with leaked state databases.</p>



<ul class="wp-block-list">
<li><strong>Database Management:</strong> Operators use SQL-based structures (PostgreSQL/MySQL) to handle massive datasets. Python libraries (Pandas/SQLAlchemy) are employed to ingest &#8220;Dump Data&#8221; (leaked ID numbers, addresses, GSM numbers) and convert them into operational targeting lists.</li>



<li><strong>The Confidence Algorithm:</strong> Systems use a <strong>&#8220;Confidence Score&#8221;</strong> to match a social media profile with a real-world identity:
<ul class="wp-block-list">
<li><em>Match (Name + Surname + Phone):</em> <strong>70% Confidence</strong></li>



<li><em>Match (Name + Surname + Phone + Address):</em> <strong>90% Confidence</strong></li>



<li><em>Tactical Application:</em> This score dictates the attack vector. High-confidence targets in economically depressed areas are targeted with financial disinformation; others may be targeted with political or social polarization content.</li>
</ul>
</li>
</ul>



<h1 class="wp-block-heading">4. DETECTION &amp; FORENSICS</h1>



<p>Identifying these networks requires moving beyond simple content analysis to behavioral and visual forensics.</p>



<ul class="wp-block-list">
<li><strong>Temporal Analysis:</strong> We analyze the timestamps of activity.
<ul class="wp-block-list">
<li><em>Indicator:</em> Does the account tweet every day at exactly 13:30? Is there a human-like randomization (jitter) in the intervals, or is it perfectly linear?</li>
</ul>
</li>



<li><strong>Visual Forensics (GAN Detection):</strong> Profile pictures are scanned for artifacts typical of <em>ThisPersonDoesNotExist</em> (GAN-generated) faces, such as asymmetric pupils, background distortion, or ear irregularities.</li>



<li><strong>Network Visualization (Maltego):</strong> While public institutions often use proprietary reporting tools, <strong>Maltego</strong> remains the industry standard for deep analysis. It is used to map the relationship clusters—visualizing who follows whom, who retweets whom, and funding sources.</li>
</ul>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>Figure 1.1:</strong> <em>Visualization of a coordinated botnet cluster targeting specific keywords. Node relationships indicate simultaneous Retweet/Quote actions, revealing the inorganic structure of the network. (Generated via Maltego).</em></p>
</blockquote>



<h1 class="wp-block-heading">5. ATTRIBUTION (Following the Trail)</h1>



<p>In the cyber domain, IP addresses can lie, but money cannot.</p>



<ul class="wp-block-list">
<li><strong>&#8220;Follow The Money&#8221;:</strong> Disinformation is expensive. It requires servers, thousands of SIM cards, software development, and ads.</li>



<li><strong>Attribution Methodology:</strong> Technical artifacts (e.g., comments in Russian/Chinese code) are often <strong>False Flags</strong> left intentionally to mislead. The most reliable attribution method is <strong>Cui Bono</strong> (Who Benefits?). Following the financial trail of server payments and spend similar to terror financing investigations often leads to the true perpetrator.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<p><strong>End of Report</strong> <em>Access restricted to Operational and Strategic tier members.</em></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Milipol Paris 2025 Analysis</title>
		<link>https://www.digitalintelligence.at/milipol-paris-2025-analysis/</link>
		
		<dc:creator><![CDATA[Ozan Akyol]]></dc:creator>
		<pubDate>Wed, 19 Nov 2025 10:59:16 +0000</pubDate>
				<category><![CDATA[Europe]]></category>
		<category><![CDATA[Analysis]]></category>
		<category><![CDATA[Worldwide]]></category>
		<category><![CDATA[counter-terrorism]]></category>
		<category><![CDATA[defence technology]]></category>
		<category><![CDATA[homeland security]]></category>
		<category><![CDATA[Milipol 2025]]></category>
		<category><![CDATA[security industry]]></category>
		<guid isPermaLink="false">https://www.digitalintelligence.at/?p=4100</guid>

					<description><![CDATA[Field Notes from Milipol Paris 2025: A Smaller Exhibition, Lower Expectations, and a Noticeable Lack of Innovation Milipol Paris 2025 presented a markedly different atmosphere compared to previous years. The exhibition area was significantly smaller, and the overall pace of the event reflected this downsizing. Walking through the halls at a steady speed, it became clear that the entire fair could be completed in roughly 2.5 to 3 hours, leaving many visitors with the impression that this year&#8217;s edition offered considerably less material, fewer innovations, and a more muted energy. A Noticeable Downsizing: Compact Layout, Limited Movement The most immediate]]></description>
										<content:encoded><![CDATA[
<h1 class="wp-block-heading"><strong>Field Notes from Milipol Paris 2025: A Smaller Exhibition, Lower Expectations, and a Noticeable Lack of Innovation</strong></h1>



<p>Milipol Paris 2025 presented a markedly different atmosphere compared to previous years. The exhibition area was significantly smaller, and the overall pace of the event reflected this downsizing. Walking through the halls at a steady speed, it became clear that the entire fair could be completed in roughly <strong>2.5 to 3 hours</strong>, leaving many visitors with the impression that this year&#8217;s edition offered considerably less material, fewer innovations, and a more muted energy.</p>



<h1 class="wp-block-heading"><strong>A Noticeable Downsizing: Compact Layout, Limited Movement</strong></h1>



<p>The most immediate observation was the <strong>reduced physical scale</strong> of the event. Booths were positioned more closely than in past years, and the density of exhibitors despite the large names felt objectively lower. This compressed setup resulted in a faster circulation flow, but it also contributed to a sense that Milipol 2025 lacked the depth, diversity, and exploratory appeal that previously defined the fair.</p>



<h1 class="wp-block-heading"><strong>Country-Based Clustering: An Arrangement That Created Distance Instead of Engagement</strong></h1>



<p>One of the structural choices that shaped the atmosphere this year was the decision to cluster companies <strong>strictly by country</strong>. While the intention was likely to create national showcases, in practice it led to a somewhat <strong>fragmented and less inviting environment</strong>. Instead of fostering cross-sectional interaction among companies, the country pavilions unintentionally created psychological boundaries between groups.</p>



<p>Many exhibitors noted that this arrangement gave the fair a rigid, compartmentalized feel reducing spontaneous engagement and limiting the natural flow of visitors across sectors.</p>



<h1 class="wp-block-heading"><strong>A Clear Sign of Cost-Cutting: The Decline of Traditional Giveaways</strong></h1>



<p>In earlier years, Milipol was known for its abundance of branded military caps, tactical accessories, patches, and various promotional items. This year, however, the overwhelming majority of booths offered <strong>nothing beyond a simple pen</strong>.<br>This shift is not trivial; it reflects a broader trend across the industry:</p>



<ul class="wp-block-list">
<li>Firms are <strong>reducing marketing expenditures</strong>,</li>



<li>Trade show ROI is being questioned more openly,</li>



<li>Promotional spending is no longer seen as essential for visibility.</li>
</ul>



<p>The minimalistic approach to giveaways mirrors the general tone of the event: <strong>lean budgets, cautious strategies, and a wait-and-see posture across the sector.</strong></p>



<h1 class="wp-block-heading"><strong>Innovation Gap: Few (If Any) New Products on Display</strong></h1>



<p>Perhaps the most striking aspect of Milipol 2025 was the <strong>absence of genuine novelty</strong>. Across both hardware and software domains, companies showcased products that were largely familiar iterations or re-presentations of existing solutions rather than newly launched concepts.</p>



<p>Notably:</p>



<ul class="wp-block-list">
<li>No groundbreaking surveillance systems,</li>



<li>No next-generation counter-drone innovations,</li>



<li>No major OSINT/SOCINT software advancements,</li>



<li>No significant new tactical hardware platforms.</li>
</ul>



<p>The fair felt more like a continuation of previous editions rather than a forward-looking showcase. Many exhibitors appeared to be present only to “maintain visibility,” not to demonstrate new technology.</p>



<h1 class="wp-block-heading"><strong>Conversation with Exhibitors: “We’re Here Out of Obligation, Not Expectation”</strong></h1>



<p>During discussions with <strong>three to four companies</strong>, a recurring theme emerged: <strong>minimal expectations</strong>.<br>Multiple representatives openly admitted:</p>



<ul class="wp-block-list">
<li>“We’re not expecting much from this year’s Milipol.”</li>



<li>“We came out of obligation rather than opportunity.”</li>



<li>“Budgets are tight; this is more about presence than results.”</li>
</ul>



<p>This sentiment was surprisingly consistent and highlights an important shift in the security and defence exhibition ecosystem. The industry appears to be navigating a transitional phase marked by budget constraints, uncertain market directions, and a reduction in high-impact product launches.</p>



<h1 class="wp-block-heading"><strong>Overall Impression: A Transitional Year for the Security Industry</strong></h1>



<p>Milipol Paris 2025 can best be described as a <strong>quiet, transitional year</strong>. While the fair still gathered key players from across the defence, intelligence, and security sectors, the overall energy was restrained. With smaller booths, limited product innovation, cost-cutting signals, and lower expectations among exhibitors, the event reflected broader conditions in the European security landscape marked by strategic caution and reduced investment appetite.</p>



<p>Whether this signals a temporary slowdown or a longer-term recalibration remains to be seen. What is certain, however, is that Milipol Paris 2025 provided a clear snapshot of an industry taking measured steps rather than bold leaps.</p>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Encryption Vulnerability in Satellite Communications: An Open Door for Cyber Espionage</title>
		<link>https://www.digitalintelligence.at/encryption-vulnerability-in-satellite-communications-an-open-door-for-cyber-espionage/</link>
		
		<dc:creator><![CDATA[Ozan Akyol]]></dc:creator>
		<pubDate>Thu, 13 Nov 2025 19:42:24 +0000</pubDate>
				<category><![CDATA[Europe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[critical infrastructure]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[encryption vulnerability]]></category>
		<category><![CDATA[GEO satellites]]></category>
		<category><![CDATA[satellite communications]]></category>
		<category><![CDATA[SIGINT]]></category>
		<category><![CDATA[threat intelligence]]></category>
		<guid isPermaLink="false">https://www.digitalintelligence.at/?p=3932</guid>

					<description><![CDATA[A newly published academic study reveals that nearly half of all communication satellites in geostationary orbit transmit civilian and military data without any encryption. This finding highlights a critical weakness not only in communication technologies but also in the context of modern cyber-intelligence operations. With the rapid evolution of SDR (Software Defined Radio) technologies, these unencrypted signals can now be intercepted and decoded with low-cost receiver hardware. Technical Findings and Observations The analysis was conducted by collecting signals across the C-band and Ku-band frequency ranges used by 39 geostationary satellites. Researchers developed entropy-based classification algorithms to identify carriers transmitting unencrypted]]></description>
										<content:encoded><![CDATA[
<p></p>



<p>A newly published academic study reveals that nearly half of all communication satellites in geostationary orbit transmit civilian and military data <em>without any encryption</em>. This finding highlights a critical weakness not only in communication technologies but also in the context of modern cyber-intelligence operations. With the rapid evolution of SDR (Software Defined Radio) technologies, these unencrypted signals can now be intercepted and decoded with low-cost receiver hardware.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h1 class="wp-block-heading"><strong>Technical Findings and Observations</strong></h1>



<p>The analysis was conducted by collecting signals across the C-band and Ku-band frequency ranges used by 39 geostationary satellites. Researchers developed entropy-based classification algorithms to identify carriers transmitting unencrypted data. Carriers with lower spectral density typically contained VoIP sessions, SIP signaling, DNS traffic, and text-based command packets.</p>



<p>For data processing, open-source satellite telemetry solutions such as the OpenSatelliteProject were used. After demodulating QPSK and 8PSK signals at the physical layer, MPEG-TS streams or raw IP packets were extracted for higher-layer protocol analysis. The investigation successfully recovered the following categories of content:</p>



<ul class="wp-block-list">
<li><strong>Mobile carrier traffic:</strong> SMS message text, SIP session details (INVITE, 200 OK, BYE), IMSI/IMEI associations.</li>



<li><strong>In-flight internet protocols:</strong> DHCP, DNS, HTTP GET/POST requests, captive portal logs.</li>



<li><strong>Corporate internal network data:</strong> VLAN-tagged broadcast packets, WINS queries, LDAP and SMB traffic.</li>



<li><strong>Military/police communication:</strong> Plaintext coordinates and operational messages transmitted through internal IP-trunked radio systems.</li>



<li><strong>SCADA and energy control systems:</strong> DNP3, Modbus-TCP and SNMP traffic exposing status variables and command-response sequences.</li>
</ul>



<p>Much of this data contains sensitive personal, corporate, and state-level information, making it highly exploitable.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h1 class="wp-block-heading"><strong>Structural Causes Behind the Vulnerability</strong></h1>



<p>The question of why such critical data is transmitted without encryption is rooted in legacy design assumptions and system architecture choices. Most satellite service providers delegate encryption to customers at the application layer. In other cases, constraints such as limited processing capabilities and latency concerns have resulted in the omission of real-time link-layer encryption.</p>



<p>Even when encryption is technically supported, it is often disabled due to configuration mistakes, cost-driven decisions, or operational convenience. Older terminals—such as early-2000s VSAT modems—frequently lack cryptographic support altogether, or the feature was never deployed. This leads to large-scale broadcast transmission of plaintext signals across the footprint.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h1 class="wp-block-heading"><strong>Intelligence and Security Impact</strong></h1>



<p>This is not merely a data security flaw; it creates a strategic surveillance advantage. State-sponsored threat actors can passively monitor these signals in real time, gaining insights such as:</p>



<ul class="wp-block-list">
<li>Passive tracking of operational military movements</li>



<li>Mapping weaknesses in critical infrastructure (e.g., SCADA failure and load data)</li>



<li>Observing financial institution communication patterns</li>



<li>Correlating mobile network user behavior</li>



<li>Analyzing pre-VPN corporate traffic to identify attack vectors</li>
</ul>



<p>Such information is valuable not only for technical exploitation but also for diplomatic, political, military, and economic intelligence.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h1 class="wp-block-heading"><strong>Cyber-Intelligence Perspective</strong></h1>



<p>The assumption that “no one is listening” to satellite downlinks is no longer valid. Sky-borne data traffic is vulnerable to actors ranging from low-profile intruders to advanced persistent threats (APTs). Encryption is no longer optional—it is the <em>minimum security baseline</em>. In modern threat environments, securing both the network and the broadcast frequency layer is essential. For critical infrastructure, defense systems, and financial services, satellite communication should be treated like an open Wi-Fi network: if it is unencrypted, it is being monitored.</p>



<p>Institutional security strategies must assume that satellite-transmitted data is insecure by default and adopt a <em>multi-layer encryption model</em> from the physical layer upward.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h1 class="wp-block-heading"><strong>Conclusion</strong></h1>



<p>This vulnerability in satellite communication is not simply a technical problem; it is the result of a neglected security culture. In the coming years, more governments and private organizations will inevitably have to prioritize this issue—updating existing systems, securing transmission layers, and adopting a “security-by-default” approach in new communication infrastructures.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
