Index 1. Introduction 2. Practical Gamma Spectroscopy for Security Researchers 3. SIGMA Network 4. Conclusions Disclaimer To avoid any misunderstandings, I want to clarify that all the information in this post is based on open-source intelligence, publicly available documents, and reverse engineering. I have not attempted to compromise or replicate any potential attacks on internet-facing SIGMA systems. Instead, I conducted a simple, non-invasive reconnaissance phase, which involved accessing public websites, reviewing their source code, and examining generic endpoints to gather general information, such as system versions. A month before publishing this post, I gave a heads-up about it to those who needed to be informed, just in case. Introduction This is the first part of a series on the cyber-physical analysis of weapons of mass destruction detection systems, focusing on technologies like CBRN networks and nuclear safeguards. These posts will cover...
The war that began with Russia's full-scale invasion of Ukraine has led to a series of unprecedented nuclear-related situations. During the first 48 hours, Chernobyl—a symbol of the deep-seated fear of nuclear disaster, especially within Europe—was taken by Russian troops. This was accompanied by reports of radiation spikes, various plots involving dirty bombs and nuclear materials, and Russian soldiers allegedly killed by acute radiation syndrome. In the end, all of it was proven to be as fictitious as the reported radiation levels. We should view these mutual accusations between Ukraine and Russia as part of the information war, which likely didn’t come as a complete surprise to those in the know. For instance, in an insightful piece Politico published documenting the 'first-ever oral history of how top U.S. and Western officials saw the warning signs of a European land war,' John Kirby stated the following: Without time to recover from the shock caused by the events ...