Sources and Methods to the Madness
The term “sources and methods” brings passionate, sometimes pained reactions within the information security community. On the one hand, there are those engaged in traditional intelligence operations for whom “sources and methods” are vital resources, to be maintained and preserved at almost any cost to ensure continuous collection. Contrary to this, those engaged in operations and active, day-to-day defense, find “sources and methods” to be immaterial if they prevent or inhibit sharing information that could Read more









