When your grade school teacher told you that you could be anyone you wanted, she meant on the internet where no one knows you’re a dog. You can pretend to be anyone and this is where the Sockpuppet comes in. A...
Much of the extremist propaganda put out by trans-national terror groups like Al-Qaeda and Daesh tout a narrative calling on Muslims to rise up everywhere and join the global jihad. This message is in stark contrast to the narrative put out...
We have all heard how effective ISIS is on social media. Recruiting, funding and planning all take place online, sometimes 140 characters at a time. The use of techniques like “Tiny-URL” allowing them to write longer messages through a link...
So you’re going after sensitive information. I’m not going to ask why and I’ll assume it is for a noble purpose. You already probably know a thing or two about elicitation since we covered collection methods my last post. Your first step in...
I was recently sent on a field trip. If you have read my last blog post, you know that I was enrolled in Randy Marcoz’s Intelligent Communication course. Part of that course is learning how to elicit information from a...
I’m the new guy over here at JS2, beginning my summer as a social media intern. Everyone here is sharp as a tack and I feel like I’m trying to cut a steak with a crayon. To make me a better asset...