Kubilay Onur Gungor Cyber Struggle Interdisciplinary Cyber Security, Human-Centric Skills, Intelligence Studies, War Studies, Terrorism Studies, Psychological Warfare
🇺🇸 English 🇹🇷 Türkçe

On Resilience to Uncertainity, Psychological Endurance and The Ranger Program

“I recall being four years old in a village. The village was small -a simple grocery store and not even a barber. Everyone knew each other. My mother and father were the teachers at the small school in the late ‘80s. With no toys around, I had no choice but to learn how to spend time alone. At least, that was the case for me. But I don’t remember struggling with it. I don’t recall ever wanting toys. Whatever I needed, I conjured up with my imagination.

Changing the Meaning of Processes and Challenges

In what situations and on which topics are we told that we are good? Or on which topics is it expressed that we are weak? Why are we good at the subjects we’re told we’re good at? Is it an innate gift? Or did we put in a lot of effort to become good at it? Are we bad because we tried before and failed? Or because we’ve never tried? Or is it because we’ve tried repeatedly and failed each time?

Serial Killers, 7 Phases and Cyber World

In 1988, psychologist John Norris proposed, based on 500 interviews, that serial killers pass through seven psychological phases. As the kinetic (physical) world and the cyber world increasingly entwine like ivy, many activities shift into cyberspace. This makes it harder to detect early phases of potential criminal inclination.

Vulnhub - Billy Madison 1.0

So I came across Billy Madison 1.0, a recently published vulnerable system. As I had really enjoyed this author’s previous Tommy Boy 1.0, I decided to have at it. Boy was it fun, but I did run across a few hurdles along the way due to my thinking.

Cyber Struggle Experts and Ideal Performance States

Cybersecurity is mostly seen as a purely technical field. However, beyond technical competence it involves many more parameters. Many of these new parameters arise from considering cybersecurity within the framework of “cyber combat.” Because when you think of it as a process with an open-ended nature, with a past, a present, and a future, it’s clear that it must be evaluated from a perspective different from merely “security” or “war.”

The Adventure of Mr. SOC III

In the previous installment, we saw the message Ann had sent to her secret lover Mr. X. In that message they were planning to escape to the Mexican coast with a large amount of cash. On the other hand, the most recently uncovered information was something of a disappointment for our hero MMr. SOC.

The Adventure of Mr. SOC II

In our previous post, we examined the secret data exchange between Ann Dercover and the suspect friend. During that investigation, Ann managed to disappear. But even before vanishing, records of her most recent network activities had been kept.

The Adventure of Mr. SOC I

Our story actually begins with a woman named Ann Dercover, who is accused of industrial espionage on behalf of a rival firm. There are suspicions that Ann possesses certain confidential information within her company and that she has leaked this information externally.