-
Exploitation of Network Centric Warfare Domains in Kenyan Politics – Reprint
(By Mwangi wa Ngugi, 2008 – Classic Reprint) AbstractThe study of Network Centric Warfare and Network Centric Operations enables the understanding of how warfare missions are accomplished, organised, and interrelated. This study has revealed the outcomes of the exploitation of Network Centric Warfare and Network Centric Operations attributes. These attributes are Information, Physical, Cognitive and… Continue reading
-
‘Mulika Mwizi’ Phones: The Admissibility Challenge for 2G Evidence in Courts.
Nokia 2700 Classic Image from mobiledokan.com Introduction In recent years, criminals have increasingly resorted to outdated devices and technologies to evade detection. 2G handsets, in particular, serve as effective anti-forensics tools due to their minimal features, which limit digital footprints compared to modern smartphones. This trend of reusing old technology to remain “invisible” is further… Continue reading
-
Sample-Template for Information Security and Risk Management Awareness Training Program for your Organization
Introduction Information technology applications have become indispensable part of business and our daily lives. With the growing need of information technology enabled applications, attackers are finding more frailties to exploit in these applications and information technology devices such as web servers, network devices, smart phones, tablets and computers. New security threats are being mounted with… Continue reading
-
From the archives: Phishing 06′
Executive summary Phishing is one of the major threats to information security, organization and personal security. Financial institutions are the most targeted organizations as they contain banking information. This report has defined the term phishing as an act of social engineering and fraudulently obtaining personal information. This report succinctly explains the phishing process, intent of… Continue reading
-
Opinion: The Admissibility of Digital Evidence from Older, Active Handsets
Introduction For a number of reasons, there is a concern about the evidence produced in the court of law regarding digital forensics. One problematic issue is the admissibility of digitally investigated cases in the court. This is because the evidence produced must be obtained using methods (procedures and standards) that have scientifically proven to be… Continue reading
-
Network Centric and Information Superiority
Introduction This exercise has considered the following academic papers These papers are considered because of the authors’ different approach in the discussion of Network Centric and Information Security. For example Ang Yang Stipulates the theory of NCW, the techniques and human plus computer programs (tools) that assist the general public to gain and comprehend NCW.… Continue reading
-
An Overview of Integrity of Personal Digital Assistant Forensic Tools
Abstract Digital forensic tools are face with the limitation of both the devices supported and the integrity of the image acquired. This is largely constituted by lack of scientifically proven quality measures. Indeed image acquired on the ubiquitous devices appears different from the expected results. In some scenarios it not acquired at all. Thereby admissibility… Continue reading
-
Forensics Case Study using Autopsy Version: 2.0.8 (2007)
Background Once data access is allowed to employees then restricting it is a big problem, this is because disgruntled employee can sniff it away at will. Information and data are wangled using removable storage devices for example USB keys, cdrom, external hand drives, and sending data via emails. Alternatively information and data can be finagled… Continue reading
-
From the Archives: Open Source Vs Closed Operating Systems
1. Introduction In this section three operating systems, Linux, Apple Mac OS X and Windows are succinctly discussed. 1.1 Linux Operating System Linux was first developed by Linus Torvalds however as an open source operating system other programmers and operating system developers have vastly contributed to development of system modules and drivers that enhance the… Continue reading
-
Information Warfare and Deception: Alleged Mossad Tactics in Facilitating U.S. Military Action Against Libya (1986)
By Mwangi wa Ngugi (Revised, 2026) Abstract Information warfare involves controlling the information domain through manipulation, deception, and espionage to shape perceptions and outcomes. This paper examines allegations that Israel’s Mossad employed a sophisticated disinformation operation planting a “Trojan” communications relay device in Tripoli to fabricate evidence of Libyan-sponsored terrorism. This purportedly influenced U.S. perceptions,… Continue reading
About Me
Peter Mwangi Ngugi – Bsc.Computer Science, Master Computer Security, CEH,MCITP,ACE
Specialization in Computer Security, Digital Forensics and Physical Security. Expert in a wide variety of
Computer Security, Digital Forensics, and Physical Security equipment and tools, both in the corporate industry and academia. Motivated to
provide tight security solutions and forensic investigations during these perilous times of cybercrime, fraudsters, unethical intruders, and
terrorism.
Recent Posts
- Exploitation of Network Centric Warfare Domains in Kenyan Politics – Reprint
- ‘Mulika Mwizi’ Phones: The Admissibility Challenge for 2G Evidence in Courts.
- Sample-Template for Information Security and Risk Management Awareness Training Program for your Organization
- From the archives: Phishing 06′
- Opinion: The Admissibility of Digital Evidence from Older, Active Handsets
Newsletter
google.com, pub-9127196933927426,DIRECT,f08c47fec0942fa0