Axiom

ICIT Brief – China’s Espionage Dynasty: Economic Death by a Thousand Cuts

The criminal culture of theft that has been injected into virtually every line of China’s 13th Five-Year Plan is unprecedented. From state sponsored smash and grab hacking and techno-pilfering, to corporate espionage and targeted theft of IP, never before in recorded history has IP transfer occurred at such a rapid velocity. In this report, entitled .. read more

ICIT Report: Know Your Enemies 2.0 – The Encyclopedia of the Most Prominent Hacktivists, Nation State and Mercenary Hackers

The Institute for Critical Infrastructure Technology has exponentially increased our profiling of Nations State, Mercenary, Hail Mary, Hacktivist and Cyber Criminal Gangs. We offer profiling advisory to Legislative Representatives and Committees, Federal Agencies, U.S. Military as well as European Union and Nato Alliance members. Contact us for more information.  

On February 8th, 2016, posted in: Uncategorized by Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

ICIT Brief: Know Your Enemies – A Primer on Advanced Persistent Threat Groups

The Institute for Critical Infrastructure Technology has exponentially increased our profiling of Nations State, Mercenary, Hail Mary, Hacktivist and Cyber Criminal Gangs. We offer profiling advisory to Legislative Representatives and Committees, Federal Agencies, U.S. Military as well as European Union and Nato Alliance members. Contact us for more information.  

On November 2nd, 2015, posted in: Uncategorized by Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,