The hottest Sabotage Substack posts right now

And their main takeaways
Category
Top World Politics Topics
Natto Thoughts 99 implied HN points 15 Sep 23
  1. Recent disruptions in Poland's train system raise concerns about the vulnerability of critical infrastructures.
  2. There is suspicion of amateurish sabotage involving the activation of emergency brakes on trains in Poland, highlighting system vulnerabilities.
  3. The incidents on Polish railroads underscore the importance of digital system transitions to enhance security and prevent potential threats.
OSINT & Analysis by Oliver Alexander 122 implied HN points 12 Mar 23
  1. The Minerva Julie, a Greek tanker, had suspicious movements near Nord Stream sites, raising questions about possible ties to Russian oil.
  2. There were signs of submarine activity near the Nord Stream pipeline, with naval vessels like USS Kearsarge and German ships conducting operations.
  3. The possibility that vessels like the Minerva Julie were used unknowingly to mask a submarine's involvement in the pipeline sabotage adds complexity to the situation.
OSINT & Analysis by Oliver Alexander 66 implied HN points 12 Mar 23
  1. The U.S. has likely inspected all Nord Stream sabotage sites with its destroyers, even though they defer to European investigations publicly.
  2. Evidence suggests that U.S. destroyers conducted first-hand investigations at the Nord Stream locations in Denmark and Sweden.
  3. There may not have been official announcements, but direct investigations by U.S. Navy destroyers likely took place near the suspected Nord Stream sabotage sites.
OSINT & Analysis by Oliver Alexander 5 HN points 25 Mar 23
  1. OSINT data helps confirm presence of Russian naval vessels near Nord Stream sabotage site
  2. Timeline of events surrounding Russian ships and US Navy vessels in Baltic Sea
  3. Unusual activities of Russian vessels and other naval forces raise questions about Nord Stream sabotage
Cody's Version 2 HN points 23 Feb 23
  1. Cyber attacks during war may not be publicly known due to covert operations and deniability.
  2. Cyber activities are often part of broader strategic objectives, making it challenging to attribute isolated incidents.
  3. Targeted institutions have no incentive to advertise successful cyber compromises during war.
Get a weekly roundup of the best Substack posts, by hacker news affinity: