Listen

Description

In this episode, as Russian adversarial activities are on the news again, we talk about our Information Operations toolkit. We explain how it was created, a useful example and how to use its worksheet and cards to inspire and create realistic information environments. As for what caught our eye, we discuss traits of modern ransom attacks, crime scripts and some Elon Musk’s singularities.

Give us your feedback: podcast@conducttr.com

Check us out: https://www.conducttr.com

LINKS

https://www.microsoft.com/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations

https://fortune.com/2022/01/14/hackers-ukraine-government-websites-messages/

https://www.currentaffairs.org/2022/02/unfortunately-we-are-not-living-in-a-simulation

https://www.protocol.com/elon-musk-flight-tracker

https://link.springer.com/article/10.1007/s12117-021-09428-9

https://www.safeseas.net/using-crime-script-analysis-to-better-understand-piracy-manifestations/

https://www.conducttr.com/information-operations-design-tools

https://teatrodelsoho.com/evento/company/

https://streamlit.io/