Open in app

Sign In

Write

Sign In

Bidemi Ologunde
Bidemi Ologunde

345 Followers

Home

About

Published in Dialogue & Discourse

·Jun 9, 2020

Cause & Effect: Unintended Consequences of the George Floyd Protests in Cyberspace

Crisis escalations, private data breaches, FBI Intervention and public embarrassments — The events described below are real-life consequences of the ongoing George Floyd protests as pertaining to cyberspace. — Dark Web Chatter On Friday evening, May 29, 2020, while Jewish Jess (not her real name/nickname) was taking part in a virtual “happy hour” with some of her friends, relatives and a few work colleagues, she…

Threat Intelligence

11 min read

Cause & Effect: Unintended Consequences of the George Floyd Protests in Cyberspace
Cause & Effect: Unintended Consequences of the George Floyd Protests in Cyberspace
Threat Intelligence

11 min read


Published in Dialogue & Discourse

·May 21, 2020

Deceit, Theft & Socio-Economic Leverage in Cyberspace

How COVID-19 is shaping countries’ foreign policies (in cyberspace) — Fake Interview Emails During the 12-day period from February 2 — 13, 2020, six Iranian-American scientists received emails supposedly sent by Farnaz Fassihi, an award-winning Iranian-American journalist who previously wrote for the Wall Street Journal (WSJ) for 17 years, and now writes for the New York Times. …

Covid-19

8 min read

Deceit, Theft & Socio-Economic Leverage in Cyberspace
Deceit, Theft & Socio-Economic Leverage in Cyberspace
Covid-19

8 min read


Published in Dialogue & Discourse

·May 17, 2020

An Analysis of New & Improved Russian Cyber Operations

Regional influence & force projection capabilities — A Private Meeting On Monday, July 31, 2017, four men met for a private meeting in one of the luxurious suites at the Baltschug Kempinski Moscow hotel in Central Moscow. The Kremlin, the Kremlin Wall, its towers and their spires, the Red Square and the onion domes of St. Basil’s Cathedral were all…

Russia

8 min read

An Analysis of New & Improved Russian Cyber Operations
An Analysis of New & Improved Russian Cyber Operations
Russia

8 min read


Published in Dialogue & Discourse

·May 12, 2020

Crouching Tiger, Hidden Dragon — Analyzing The Effectiveness of Chinese Cyber-Military Operations

How to use APTs in territorial disputes — Strategic Support Force (SSF) On December 31, 2015, the Chinese government re-organized its military and created a Strategic Support Force (SSF) that was tasked with enhancing the People’s Liberation Army’s (PLA) space, cyberspace, electromagnetic spectrum, and psychological warfare capabilities. The core objective of the SSF was to facilitate and guarantee the PLA’s victory in…

China

8 min read

Crouching Tiger, Hidden Dragon — Analyzing The Effectiveness of Chinese Cyber-Military Operations
Crouching Tiger, Hidden Dragon — Analyzing The Effectiveness of Chinese Cyber-Military Operations
China

8 min read


Published in Dialogue & Discourse

·Dec 23, 2019

Russia in Africa: Debt Diplomacy & Influence Operations

Mozambique, Africa —

Russia

5 min read

Russia in Africa: Debt Diplomacy & Influence Operations
Russia in Africa: Debt Diplomacy & Influence Operations
Russia

5 min read


Published in Dialogue & Discourse

·Dec 12, 2019

US/Russia Proxy Wars: Oligarchs & Russian Mercenaries

Date: February 7, 2018 | Location: Deir al-Zour, Syria — On February 7, 2018, the U.S. military had to defend itself against pro-Syrian government forces and Russian mercenaries, while deployed to fight the Islamic State in Syria. …

Syria

6 min read

US/Russia Proxy Wars: Oligarchs & Russian Mercenaries
US/Russia Proxy Wars: Oligarchs & Russian Mercenaries
Syria

6 min read


Aug 24, 2019

The (Recent) Tribalization of Cyber Crime in Nigeria

Incomplete Facts, Echo Chambers and Value Systems — #FactsOnly On Thursday, August 22, 2019, the United States Attorney’s Office in the Central District of California unsealed a 145-page, 252-count Grand Jury Indictment, which was dated October 2018 and filed on June 27, 2019. The indictment charged 80 defendants — mostly Nigerians of Igbo extraction — with participating in a…

Cybersecurity

6 min read

The (Recent) Tribalization of Cyber Crime in Nigeria
The (Recent) Tribalization of Cyber Crime in Nigeria
Cybersecurity

6 min read

Bidemi Ologunde

Bidemi Ologunde

345 Followers

Hi. Thanks for your time.

Following
  • Margaret Lee

    Margaret Lee

  • Begum BURAK

    Begum BURAK

  • Daniel Mart

    Daniel Mart

  • ОЙЕВОЛЕ Jerry ИФЕОЛУВА

    ОЙЕВОЛЕ Jerry ИФЕОЛУВА

  • Vlad

    Vlad

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech