6171
US DOJ Legal Documents of Interest to CTI Analysts
US DOJ Legal Documents of Interest to CTI Analysts
osint  cti  legal 
12 weeks ago
The Remarkable Robustness of the First-Offer Effect
The first-offer effect demonstrates that negotiators achieve better outcomes when making the first offer than when receiving it. The evidence, however, primarily derives from studies of Westerners without systematic power differences negotiating over one issue—contexts that may amplify the first-offer effect. Thus, the present research explored the effect across cultures, among negotiators varying in power, and in negotiations involving single and multiple issues. The first two studies showed that the first-offer effect remains remarkably robust across cultures and multi-issue negotiations. The final two studies demonstrated that low-power negotiators benefit from making the first offer across single- and multi-issue negotiations. The second and fourth studies used multi-issue negotiations with distributive, integrative, and compatible issues, allowing us to show that first offers operate through the distributive, not the integrative or compatible issues. Overall, these results reveal that moving first can benefit negotiators across many organizational and personal situations.
culture  negotiation  social  power 
july 2016
ETSI GS ISI 002 V1.1.1 (2013-04) Information Security Indicators (ISI)
ETSI GS ISI 002
V1.1.1
(2013-04)
Information Security Indicators (ISI
)
;
Event Model
A security event classification model and taxonomy
taxonomy  security  etsi  information_sharing 
july 2016
Twitter
RAT developer trying to explain that his tools has not been written for malicious purpose
BestExcuseEver  from twitter_favs
july 2016
Twitter
talking about a mail cleaning imap server
rmllsec16  rump  from twitter_favs
july 2016
Twitter
One of my favourite singers is taking over 's snapchat account
ZEITmagazin  from twitter_favs
july 2016
Home | Borderless Cyber Europe
Hear on ‘Best practices in information sharing’ – learn more at
threatintel  from twitter_favs
july 2016
Twitter
My keynote is purely awesome, inspiring and innovative, to leverage your knowledge and maximize your synergies.
from twitter_favs
july 2016
Twitter
RT : VMware told me this bug wasn't exploitable and now they're "requesting" me not to release the exploit!
from twitter_favs
july 2016
(500) https://blog.rootshell.be/?p=30310
[/dev/random] Book Review: Sécurité Informatique et Malwares
from twitter_favs
june 2016
Twitter
Mon fils a voulu une paire de pompes aux couleurs du , j'ai pas pu lui refuser... #çapromet
SSTIC  from twitter_favs
june 2016
Twitter
My next talk's outline (with details, by popular demand)
from twitter_favs
june 2016
Twitter
How to detect most malicious macros without an antivirus (part 1):
from twitter_favs
june 2016
How to detect most malicious macros without an antivirus | Decalage
How to detect most malicious macros without an antivirus (part 1):
from twitter_favs
june 2016
Twitter
When you're dead but then you remember you forgot to delete your browser history
from twitter_favs
june 2016
Twitter
Nigel Farage is like your drunk racist uncle at Christmas dinner.
from twitter_favs
june 2016
Twitter
~ 60,000 arrived in Italy so far this year. 0,012% of the European population. you can do better.
Europe  people  from twitter_favs
june 2016
Twitter
[UPDATE] Added display to the submission list including tag search capabilities:
tags  from twitter_favs
june 2016
Search results · Free Automated Malware Analysis Service - powered by VxStream Sandbox
[UPDATE] Added display to the submission list including tag search capabilities:
tags  from twitter_favs
june 2016
cuckoo-modified/misp.py at master · spender-sandbox/cuckoo-modified · GitHub
A new MISP module in Cuckoo modified to lookup or push IOCs from Cuckoo to MISP a sweet extension
from twitter_favs
june 2016
Twitter
We love democracy and hate racism in equal measure. Let us never be bystanders to hate.
from twitter_favs
june 2016
GitHub - nccgroup/TriforceLinuxSyscallFuzzer: A linux system call fuzzer using TriforceAFL
TriforceLinuxSyscallFuzzer: system call fuzzing of Linux x86_64 kernels using AFL and QEMU
from twitter_favs
june 2016
The Case for Competitive Collaboration - Core77
“The design process attracts personalities blind to habitual rejection.” —Tad Toulis (2011)
from twitter_favs
june 2016
Twitter
“The design process attracts personalities blind to habitual rejection.” —Tad Toulis (2011)
from twitter_favs
june 2016
Twitter
This is a really excellent presentation on APT28. XTUNNEL reminds me of PortTunnel, which some other actors used.
from twitter_favs
june 2016
Untitled (https://people.torproject.org/~gk/misc/Selfrando-Tor-Browser.pdf)
The selfrando mitigation work in is really nice. Rare and focused effort mitigating a specific threat.
from twitter_favs
june 2016
WiGLE: Wireless Network Mapping
Un collègue me parle de ça pas mal du tout pour de l'
OSINT  from twitter_favs
june 2016
Twitter
This will surprise no one who had to deal w/ the CA mafia. Strong reminder of why deserves our support
from twitter_favs
june 2016
Twitter
Don't disagree, but I think it also shows how important it is to have well funded OSS tools. 2 much taken 4 granted
from twitter_favs
june 2016
Untitled (http://summerschool-croatia.cs.ru.nl/2016/slides/JoanDaemen_June%206.pdf)
For those interested in learning symmetric cipher design, Joan Daemen's lecture last week is a great start:
from twitter_favs
june 2016
misp-taxonomies/machinetag.json at master · MISP/misp-taxonomies · GitHub
A new MISP taxonomy for the FIRST Information Exchange Policy (IEP) framework cc
from twitter_favs
june 2016
Twitter
The complexity of the modern software supply chain
from twitter_favs
june 2016
UN Guidance for Effective Mediation | UN Peacemaker
Good idea from - make an guidebook similar to UN Guidance for Effective Mediation:
R2P  R2PSeoul  from twitter_favs
june 2016
Twitter
[UPDATE] Login to d/l MISP XML reports that can be imported into a instance:
from twitter_favs
june 2016
Free Automated Malware Analysis Service - powered by VxStream Sandbox
[UPDATE] Login to d/l MISP XML reports that can be imported into a instance:
from twitter_favs
june 2016
Pass the Hash
How to Mitigate Mimikatz WDigest Cleartext Credential Theft: - The whole PtH threat:
from twitter_favs
june 2016
How to Mitigate Mimikatz WDigest Cleartext Credential Theft
How to Mitigate Mimikatz WDigest Cleartext Credential Theft: - The whole PtH threat:
from twitter_favs
june 2016
Twitter
Excuse me! Do you have a moment to talk about our lord and saviour Edgar Allen Poe?
from twitter_favs
june 2016
Hackathon 2016 · MISP/MISP Wiki · GitHub
RT : Don't forget to join the local and remote hackathon 2016 (4th August 2016) tasks can be added
from twitter_favs
june 2016
« earlier      
#infosec academic activism algorithm algorithms analysis api archive archiving art article audio belgium biology bittorrent blog book books browser business c classification code collaboration community company computer_science conference copyright copyright_delirium copyrights crypto cryptography cs_lang:c cs_lang:cpp cs_lang:javascript cs_lang:perl cs_lang:python cs_lang:ruby culture data database datamining dataset datastore debugging del.icio.us design development distributed distributed_computing diy dns documentation ebook ebooks editor education electro electronic_music embedded europe fa:archive flickr folksonomy forensic forensic_analysis framework free free_information free_society free_software freedom freesoftware fun funny geo git goodiff google graph graphics hack hacking hacklu hardware hash hashing history honeypot html http ietf indexing information_representation information_retrieval information_security infosec infovis innovation internet ipv4 ipv6 java javascript kernel lang:fr language latex law legal libraries library license:bsd-like license:gpl license:gpl3 license:mit linux malware mapreduce math media mediawiki metadata mobile monitoring music network network_analysis network_security networking networks opensource p2p paper papers patent patent_delirium pcap pdf pentest performance perl photo photography photos politics presentation privacy productivity programming protocol publishing python radio rdf redis reference research reverse_engineering reversing rss ruby scalability science scm search searchengine security security_assessment semantic semanticweb server shell social society software ssh startup statistics streaming tag tagging tags tcp tcp/ip technology testing tex text tools typography unix via:chl via:doegox video visualization vty web web2.0 web_services webdev wiki wikipedia win32 windows work writing xml xmpp

Copy this bookmark:



description:


tags: