<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Sharp End]]></title><description><![CDATA[Adversarial thinking. From the front line.]]></description><link>https://sharpend.saiz.com</link><image><url>https://substackcdn.com/image/fetch/$s_!C0Zw!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fec35fd29-5620-466b-af09-86660a60e019_572x572.png</url><title>The Sharp End</title><link>https://sharpend.saiz.com</link></image><generator>Substack</generator><lastBuildDate>Sat, 02 May 2026 03:22:12 GMT</lastBuildDate><atom:link href="https://sharpend.saiz.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Jerome Saiz]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[jeromesaiz@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[jeromesaiz@substack.com]]></itunes:email><itunes:name><![CDATA[Jerome Saiz]]></itunes:name></itunes:owner><itunes:author><![CDATA[Jerome Saiz]]></itunes:author><googleplay:owner><![CDATA[jeromesaiz@substack.com]]></googleplay:owner><googleplay:email><![CDATA[jeromesaiz@substack.com]]></googleplay:email><googleplay:author><![CDATA[Jerome Saiz]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Cyber crisis exercises: doing things in the right order]]></title><description><![CDATA[&#8230;or why you need to learn to walk before you try to climb]]></description><link>https://sharpend.saiz.com/p/cyber-crisis-exercises-doing-things</link><guid isPermaLink="false">https://sharpend.saiz.com/p/cyber-crisis-exercises-doing-things</guid><dc:creator><![CDATA[Jerome Saiz]]></dc:creator><pubDate>Sat, 14 Mar 2026 15:35:20 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!0v4w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6f80c5-7f06-4223-910b-fbe9dc0c3ca7_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!0v4w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6f80c5-7f06-4223-910b-fbe9dc0c3ca7_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!0v4w!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6f80c5-7f06-4223-910b-fbe9dc0c3ca7_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!0v4w!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6f80c5-7f06-4223-910b-fbe9dc0c3ca7_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!0v4w!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6f80c5-7f06-4223-910b-fbe9dc0c3ca7_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!0v4w!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6f80c5-7f06-4223-910b-fbe9dc0c3ca7_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!0v4w!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6f80c5-7f06-4223-910b-fbe9dc0c3ca7_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1b6f80c5-7f06-4223-910b-fbe9dc0c3ca7_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2362384,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://sharpend.saiz.com/i/190938126?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6f80c5-7f06-4223-910b-fbe9dc0c3ca7_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!0v4w!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6f80c5-7f06-4223-910b-fbe9dc0c3ca7_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!0v4w!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6f80c5-7f06-4223-910b-fbe9dc0c3ca7_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!0v4w!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6f80c5-7f06-4223-910b-fbe9dc0c3ca7_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!0v4w!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1b6f80c5-7f06-4223-910b-fbe9dc0c3ca7_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>At this point, nobody seriously argues that cyber crisis training is optional.</p><p>There is, of course, one very effective alternative: going through the real thing. I would not recommend it. Across the 50+ major crises I have handled in my career, the lesson has always been the same: a real cyber crisis is a very efficient teacher, but a painfully expensive one. You learn a great deal, at a cost most organisations would rather not pay.</p><p>So yes, organisations need to exercise. But they should not all exercise in the same way, and certainly not at the same level from day one.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://sharpend.saiz.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Sharp End! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>One of the recurring mistakes in this field is to think of a cyber crisis exercise as a single format: a big event, a dramatic scenario, a room full of people reacting under pressure. In reality, there is a progression. The right format depends on the organisation&#8217;s maturity, on what it is actually trying to test, and on how much strain it is willing to put on the machine.</p><p>Done properly, an exercise programme becomes more demanding over time. It also becomes more useful.</p><h2>Before any exercise, there has to be a framework</h2><p>This sounds obvious, but it is often skipped: before testing how an organisation handles a cyber crisis, you need a procedure worth testing.</p><p>If the crisis process does not exist, or exists only in fragments, the exercise will not reveal much beyond the fact that the organisation is unprepared. That is not always a useless finding, but it is an expensive and frustrating way to arrive at it. People usually come out of that kind of session feeling they have been judged against rules that were never clearly set in the first place.</p><p>That reaction is understandable. An exercise is not supposed to be a trap.</p><p>There is another issue here. Cyber crises are close enough to &#8220;traditional&#8221; crisis management to create false confidence, but different enough to make direct transposition risky. Existing (non-cyber) crisis governance, risk structures, escalation routines, and executive habits remain very useful. But they still need to be reviewed through a cyber lens before exercise design begins.</p><h2>Level 0: the activation test</h2><p>This is not the most glamorous format, but it is one of the most useful.</p><p>An activation test is simple in principle: you trigger the crisis mechanism in a controlled way and observe whether the right people mobilise, whether the alerting chain works, whether escalation is smooth, and whether the practical setup holds together.</p><p>There is barely a scenario. That is not the point. The test stops once the organisation is operational and in a position to manage whatever event is thrown to it.</p><p>What it tells you is whether the foundations are sound. Can the key people be reached quickly and anytime? Do they know what is expected of them? Is the crisis room ready, physically or virtually? Does the process start cleanly, or does it begin in confusion? I have seen activation tests reveal that the CEO's emergency number had not been updated in three years.</p><p>Because it is light and quick to run, this is often the format that deserves to be repeated most often. It does not answer every question, but it answers an important one: can the organisation even get on its feet when something serious begins.</p><h2>Level 1: the tabletop</h2><p>This is the format most people know, and for good reason. A tabletop is light, fast, and easy to organise, at least compared to what comes next!</p><p>A group of participants (usually the people who would form the decision-making crisis cell) is brought together and presented with an evolving scenario. They discuss what they would do, how they would prioritise, what decisions they would take, and what difficulties they face due to the degraded conditions.</p><p>It is less realistic than what comes later, but that is not necessarily a weakness. A tabletop is often the best place to start because it acts as an excellent brainstorm session.</p><p>Used well, it is an excellent format for awareness, alignment, and collective reflection. It does not fully validate the crisis plan. It will not tell you much about logistics, and it only partly tests the more complex mechanisms of crisis management. But it does something else that matters a great deal: it helps people understand one another.</p><p>In a good tabletop, legal starts to see what operations is struggling with. IT realises how quickly uncertainty becomes a communications problem. Executives get a better feel for the friction between caution, speed, and incomplete information. That shared understanding is often more valuable than people expect.</p><p>To be frank, this is also the format many clients ask for most often today. They are right to do so. Even without the more formal validation benefits, the discussion itself is already a win. In some organisations, that benefit alone makes the exercise worthwhile.</p><h2>Level 2: the live exercise</h2><p>This is usually what people have in mind when they hear the term <em>crisis exercise</em>.</p><p>The participants start at their desks, in the middle of an apparently normal working day. Then the first inputs arrive: emails, calls, messages, requests, alerts. Everything is clearly marked as part of an exercise, but the experience is designed to create enough realism and enough pressure to force real coordination.</p><p>This is where the exercise starts to come alive. You can introduce media pressure through mock news flashes, outside scrutiny through simulated regulator contact, commercial pressure through simulated customers and partners, and physical-world consequences through fabricated but plausible impacts. A well-run live exercise can feel surprisingly close to the rhythm of a genuine event.</p><p>Participants are expected to act, not just discuss. They alert, escalate, communicate, activate crisis structures, move to the relevant rooms or calls, respond to external pressure, and keep advancing through the ambiguity as the situation evolves.</p><p>From this point on, the organisation is no longer merely talking about crisis response. It is beginning to test whether it can actually execute it.</p><p>That is why preparation matters. A live exercise only has real value if the participants have a process they can rely on &#8212; something reviewed, adapted, and properly communicated beforehand. Otherwise the organisation ends up improvising its own structure under exercise conditions, which is usually noisy but not especially enlightening (I once saw a single 57-persons Stack channel used for crisis coordination during an exercise. Needless to say, it did not work well...)</p><p>This format also demands more support around the players: a facilitation team, a dedicated control room, working comms, and enough observers to capture what happened accurately. There is no proper debrief and improvement plan without a good set of observers.</p><p>The main limitation is technical. In most live exercises, actions on the real information system are avoided, or kept strictly read-only.</p><p>Which is why the final step exists.</p><h2>Level 3: the simulation</h2><p>This is where things become epic.</p><p>A simulation takes the organisational mechanics of a live exercise and adds the element that changes the nature of the whole event: a replica of the information system in an isolated environment.</p><p>Once that exists, the exercise stops being only organisational. It becomes technical as well. Participants are no longer reacting solely to scripted reporting or facilitation prompts. They are dealing with technical activity unfolding in a controlled environment, and they must connect that activity to business decisions in real time.</p><p>This can include an actual Red Team operating against the replica, forcing defenders to detect, investigate, contain, and recommend responses while the rest of the organisation deals with degraded services, uncertain impacts, and business consequences.</p><p>That coordination is the real value of the format. Cyber crises are difficult not only because the technical problem is hard, but because the technical and organisational timelines rarely move at the same pace. The simulation is one of the few ways to work on that tension seriously.</p><p>It is also the closest thing to a real cyber crisis that an organisation can experience without suffering one. Not identical, of course. You never fully reproduce the stress, the fog, or the emotional charge of a real incident (and believe me, these are absolutely <em>major</em> factors). But you get much closer.</p><p>Unsurprisingly, this is also the most demanding format in every sense: time, preparation, internal involvement, and of course budget. Some simulations run for several days and involve very large numbers of participants. They can be extremely valuable. They are just not where most organisations should begin.</p><h2>On surprise exercises</h2><p>At some point, the same question usually comes up: should the exercise be announced?</p><p>The instinct behind the surprise exercise is easy to understand. Real crises do not arrive politely. So why announce the rehearsal?</p><p>Because in practice, surprise does not always mean realism.</p><p>An unannounced exercise can fail for very mundane reasons: the wrong day, the wrong people absent, not enough bandwidth, not enough willingness to engage, not enough room to distinguish simulation from distraction. When that happens, the result is often disappointing, and occasionally counterproductive.</p><p>That does not mean surprise exercises are pointless. They can be very useful in mature organisations, especially when the goal is narrow: testing alternates in key roles, for example, or seeing how mobilisation works under less comfortable conditions. But they tend to work best when the organisation already knows how to handle the more structured formats.</p><p>In that case, it is wiser to relax the surprise factor slightly and make sure strong senior backing has been secured first. Pro tip: CEOs are often game for this kind of idea and love pulling it to their C suite during holiday season...</p><p>There is, however, a line that should usually not be crossed: the disguised exercise, where the event is not only unannounced but not even identified as an exercise. In most cases, that is a bad idea.</p><p>A clean separation between the exercise world and the real world is one of the basic rules of proper crisis exercise design. Once that boundary starts to blur, you create the possibility of escalation outside the intended perimeter. All it takes is one participant taking the situation too literally and triggering real-world action with customers, authorities, partners, or the media.</p><p>At that point, you may find yourself managing an actual crisis caused by the exercise itself.</p><p>There are more creative ways to work once an organisation is truly mature. That is true in cyber crisis management as it is anywhere else. But most organisations still have plenty to gain from simply building their exercise programme in the right sequence, with clear goals and no unnecessary theatrics.</p><p>Start where you are. Build the sequence. Save the theatrics for when you can afford them.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://sharpend.saiz.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Consider subscribing to the Sharp End if you enjoy my work!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Military OPSEC: Coincidence or Deliberate Signal? ]]></title><description><![CDATA[And How to Apply the Same Thinking in Your Organization...]]></description><link>https://sharpend.saiz.com/p/military-opsec-coincidence-or-deliberate</link><guid isPermaLink="false">https://sharpend.saiz.com/p/military-opsec-coincidence-or-deliberate</guid><dc:creator><![CDATA[Jerome Saiz]]></dc:creator><pubDate>Mon, 16 Feb 2026 17:06:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!vbz1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb46795-eb21-4aed-8b85-c31617befb04_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vbz1!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb46795-eb21-4aed-8b85-c31617befb04_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vbz1!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb46795-eb21-4aed-8b85-c31617befb04_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!vbz1!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb46795-eb21-4aed-8b85-c31617befb04_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!vbz1!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb46795-eb21-4aed-8b85-c31617befb04_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!vbz1!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb46795-eb21-4aed-8b85-c31617befb04_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vbz1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb46795-eb21-4aed-8b85-c31617befb04_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/9cb46795-eb21-4aed-8b85-c31617befb04_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2131401,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://sharpend.saiz.com/i/188158181?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb46795-eb21-4aed-8b85-c31617befb04_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vbz1!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb46795-eb21-4aed-8b85-c31617befb04_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!vbz1!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb46795-eb21-4aed-8b85-c31617befb04_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!vbz1!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb46795-eb21-4aed-8b85-c31617befb04_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!vbz1!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F9cb46795-eb21-4aed-8b85-c31617befb04_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Three years ago, I was taking part in a major French military exercise as a civilian contractor. Among the many participating nations was a contingent of U.S. service members.</p><p>One day at lunch, while waiting in line, I overheard a group of young soldiers speaking English. The shoulder patch made their U.S. affiliation unmistakable. Having lived and studied in the United States, I&#8217;ve always enjoyed interacting with Americans. So, naturally, I greeted them and asked where they were from to start a casual conversation.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://sharpend.saiz.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Before reading further, please consider subscribing for free to receive new posts and support my work!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>The response was immediate, guarded and unambiguous: they clearly had been briefed about the risk of foreign elicitation attempts and would not disclose anything. The fact that I was one of the few people dressed in civilian clothing amid a sea of uniforms probably didn&#8217;t help my case either.</p><p>Recognizing what had just happened, I didn&#8217;t press the matter and went back to my smartphone. The exchange seemed trivial at the time, and I quickly forgot about it.</p><h2>Until that evening&#8230;</h2><p>Back at my hotel, I noticed that my LinkedIn profile had been viewed by an intelligence analyst from a U.S. National Guard unit.</p><p>I was genuinely stunned. If this wasn&#8217;t coincidence&#8212;and it absolutely could have been&#8212;it would imply several things:</p><ul><li><p>The soldiers had been properly briefed on elicitation risks (entirely expected).</p></li><li><p>They were able to identify me in real time (perhaps via a discreet photo later while I was having lunch).</p></li><li><p>The information was reported and processed within just a few hours.</p></li><li><p>The analyst&#8217;s deliberate visit to my LinkedIn profile from his own public account may have been a subtle message. The classic &#8220;we see you.&#8221;</p></li></ul><p><strong>If that interpretation is correct, it&#8217;s impressive.</strong></p><p>Of course, Occam&#8217;s razor strongly suggests a far simpler explanation: random chance. Ian Fleming captured this ambiguity well: <em>&#8220;Once is happenstance. Twice is coincidence. Three times is enemy action.&#8221;</em> So, realistically, there was probably nothing extraordinary about it.</p><div><hr></div><h2>What Does This Mean for Organizations?</h2><p>Regardless of the true explanation, the episode led me to reflect on a more practical question:</p><p>How could a comparable level of awareness and responsiveness be implemented within corporate environments, particularly during the reconnaissance phase described in the MITRE ATT&amp;CK framework: a phase that is notoriously difficult to detect and counter?</p><p>This is not about encouraging employees to photograph every stranger who asks questions about their role. That would raise obvious legal and privacy concerns. But still, it does raise legitimate questions:</p><ul><li><p>Do exposed or sensitive roles within your organization receive specific awareness training on social engineering and elicitation tactics?</p></li><li><p>Is there a low-friction mechanism for reporting unusual interactions or behaviors?</p></li><li><p>Do you have the analytical capability to validate and correlate weak signals (for example, through Threat Intelligence and OSINT practices)?</p></li></ul><p>Pushing the idea further, a four-part approach emerges:</p><h3><strong>1. Targeted Awareness</strong></h3><p>High-exposure roles&#8212;executives, R&amp;D, procurement, executive assistants&#8212;benefit from tailored briefings. The goal is to recognize patterns such as the &#8220;vendor&#8221; asking unusually detailed questions, the &#8220;journalist&#8221; probing into supply chains, or the LinkedIn contact displaying excessive curiosity about internal initiatives.</p><h3><strong>2. Frictionless Reporting Channels</strong></h3><p>The mechanism matters less than the usability: a dedicated email alias, an intranet button, a lightweight form. The key requirement is speed and simplicity. Employees must be able to flag something suspicious in seconds, without the burden of formal reporting.</p><h3><strong>3. Analysis and Correlation Capability</strong></h3><p>This is where Threat Intelligence functions become critical. An isolated report rarely means anything. Multiple reports involving related teams or projects begin to form a pattern. OSINT techniques then help assess credibility: does the individual exist? Is the digital footprint coherent? Are there inconsistencies?</p><h3><strong>4. Feedback Loops</strong></h3><p>Closing the loop reinforces the security culture. Even minimal responses&#8212;&#8220;Thank you, reviewed, no issue detected&#8221; or &#8220;Good catch, this warranted attention&#8221;&#8212;strengthen awareness and encourage future reporting behaviors.</p><div><hr></div><p>What do you think?<br>Is this already a thing where you work? If not, what prevents it?</p><div class="captioned-button-wrap" data-attrs="{&quot;url&quot;:&quot;https://sharpend.saiz.com/p/military-opsec-coincidence-or-deliberate?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="CaptionedButtonToDOM"><div class="preamble"><p class="cta-caption">Thanks for reading The Sharp End! If you enjoyed this post, feel free to share it :)</p></div><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://sharpend.saiz.com/p/military-opsec-coincidence-or-deliberate?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://sharpend.saiz.com/p/military-opsec-coincidence-or-deliberate?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p></div><p></p>]]></content:encoded></item><item><title><![CDATA[Why is cyber crisis coordination so hard? ]]></title><description><![CDATA[... and why crisis coordinators are such a rare bunch?]]></description><link>https://sharpend.saiz.com/p/why-is-cyber-crisis-coordination</link><guid isPermaLink="false">https://sharpend.saiz.com/p/why-is-cyber-crisis-coordination</guid><dc:creator><![CDATA[Jerome Saiz]]></dc:creator><pubDate>Mon, 02 Feb 2026 13:45:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!uyy-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05703787-a0a6-4e11-a0c7-88336123aaea_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!uyy-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05703787-a0a6-4e11-a0c7-88336123aaea_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!uyy-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05703787-a0a6-4e11-a0c7-88336123aaea_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!uyy-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05703787-a0a6-4e11-a0c7-88336123aaea_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!uyy-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05703787-a0a6-4e11-a0c7-88336123aaea_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!uyy-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05703787-a0a6-4e11-a0c7-88336123aaea_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!uyy-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05703787-a0a6-4e11-a0c7-88336123aaea_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/05703787-a0a6-4e11-a0c7-88336123aaea_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1795632,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://sharpend.saiz.com/i/186609126?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05703787-a0a6-4e11-a0c7-88336123aaea_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!uyy-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05703787-a0a6-4e11-a0c7-88336123aaea_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!uyy-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05703787-a0a6-4e11-a0c7-88336123aaea_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!uyy-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05703787-a0a6-4e11-a0c7-88336123aaea_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!uyy-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F05703787-a0a6-4e11-a0c7-88336123aaea_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>&#8220;<em>What exactly do you DO here?</em>&#8221; a CISO asked me 48 hours into a crisis</p><p>Fair question. I&#8217;d been in every meeting, written half the comms, coordinated with external teams, and somehow still hadn&#8217;t &#8216;fixed&#8217; anything within his area of responsibility.</p><p>After managing dozens of crises since 2019, I&#8217;ve learned the crisis lead role is invisible when it works&#8212;and catastrophic when it doesn&#8217;t.</p><p>But, then again, what exactly do I do here?</p><p>Here&#8217;s what that role actually entails, depending on the victim organization&#8217;s maturity in crisis-management capabilities.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://sharpend.saiz.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Before you continue reading, consider subscribing to support my work and get more real-world insight into cyber crises and cybersecurity.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h2>Coordination and governance</h2><ul><li><p>Ensure cross-functional coordination between all stakeholders (CIO, CISO, business units, executive management, external service providers)</p></li><li><p>Ensure the proper functioning of crisis cells (decision-making and technical)</p></li><li><p>Verify that crisis cells are effectively staffed and operational, and raise alerts in case of failure</p></li><li><p>Define (if not already in place) and enforce the cadence of crisis meetings (frequency, duration, attendees)</p></li><li><p>Maintain alignment between the decision-making cell and the technical cell throughout the crisis</p></li></ul><h2>Advisory role and interface with executive management</h2><ul><li><p>Provide executives with the information required to make informed decisions</p></li><li><p>Clarify technical, legal, and communication-related risks</p></li><li><p>Help translate technical issues into business language for the executive committee</p></li><li><p>Advise management on strategic trade-offs (restart priorities, resource allocation)</p></li><li><p>Frame discussions around a potential ransom payment (in ransomware incidents) using factual, objective elements</p></li><li><p>Contribute to drafting (or, in many cases, directly writing) internal and external communications</p></li></ul><h2>Operational sequencing and steering</h2><ul><li><p>Contribute, when requested, to defining the sequencing of actions based on how the situation evolves</p></li><li><p>Ensure consistency between isolation and remediation actions</p></li><li><p>Validate prerequisites for a phased restart of information systems (initial compromise date, available indicators)</p></li><li><p>Track the progress of incident response and forensic investigation teams</p></li><li><p>Coordinate the transition from emergency response to reconstruction</p></li></ul><h2>Documentation and traceability</h2><ul><li><p>Ensure proper logging and incident diaries are maintained within each crisis cell</p></li><li><p>Advise teams on traceability of checks performed on systems prior to restart</p></li></ul><h2>Coordination with external parties</h2><ul><li><p>Coordinate interactions with external incident response teams (CERT/CSIRT)</p></li><li><p>Organize technical communications with interconnected customers and partners</p></li><li><p>Support the industrialization of reassurance processes toward third parties (technical commitments, evidence of controls)</p></li><li><p>Facilitate interactions with authorities when required (national cybersecurity agencies, law enforcement)</p></li></ul><h2>Remediation and security advisory</h2><ul><li><p>Advise, when appropriate, on the deployment of emergency cybersecurity solutions (EDR, monitoring)</p></li><li><p>Validate conditions for the progressive reopening of Internet access</p></li><li><p>Ensure hardening measures are integrated into the reconstruction plan</p></li><li><p>Support the definition of criteria for pre-restart control checkpoints</p></li></ul><h2>Human and logistical management</h2><ul><li><p>Alert management to the risk of burnout among key personnel</p></li><li><p>Monitor team cohesion and morale throughout the crisis and raise alerts if degradation could jeopardize crisis operations</p></li></ul><h2>Preparing for crisis exit</h2><ul><li><p>Define objective exit criteria with the decision-making cell</p></li><li><p>Prepare the handover to internal teams for the return to normal operations</p></li><li><p>Contribute to organizing the post-incident review</p></li><li><p>Identify security initiatives to be launched after the crisis</p></li></ul><div><hr></div><p>Of course, every crisis and every organization is different, so the balance across these areas can vary. Some internal functions may fully take over certain tasks from the crisis lead&#8212;but he or she must still maintain visibility over them, either to contribute directly or to enrich collective decision-making.</p><p>Today, this role is better understood, yet remains just as difficult to staff (internally and externally). It is often split across several profiles, particularly within organizations. But this inevitably increases the coordination burden&#8212;which is then frequently outsourced.</p><p>After another crisis ended, a CTO confessed: &#8220;<em>I wasn&#8217;t convinced we needed you. But I get it now. You were the glue</em>.&#8221;</p><p>That&#8217;s the crisis lead role: the glue nobody sees until everything falls apart without it.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://sharpend.saiz.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">If you read that far, cyber crisis management &amp; cybersecurity clearly is your thing! Subscribe for free to receive new posts and support my work ;)</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[Managing Crises Means Failing Fast and Failing Often]]></title><description><![CDATA[&#8230;and in a controlled way.]]></description><link>https://sharpend.saiz.com/p/managing-crises-means-failing-fast</link><guid isPermaLink="false">https://sharpend.saiz.com/p/managing-crises-means-failing-fast</guid><dc:creator><![CDATA[Jerome Saiz]]></dc:creator><pubDate>Fri, 23 Jan 2026 22:15:45 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!cwdS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9725ac4-bb68-4e8d-8ad7-e0078d2ae36f_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!cwdS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9725ac4-bb68-4e8d-8ad7-e0078d2ae36f_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!cwdS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9725ac4-bb68-4e8d-8ad7-e0078d2ae36f_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!cwdS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9725ac4-bb68-4e8d-8ad7-e0078d2ae36f_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!cwdS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9725ac4-bb68-4e8d-8ad7-e0078d2ae36f_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!cwdS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9725ac4-bb68-4e8d-8ad7-e0078d2ae36f_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!cwdS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9725ac4-bb68-4e8d-8ad7-e0078d2ae36f_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a9725ac4-bb68-4e8d-8ad7-e0078d2ae36f_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1490027,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://sharpend.saiz.com/i/185584084?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9725ac4-bb68-4e8d-8ad7-e0078d2ae36f_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!cwdS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9725ac4-bb68-4e8d-8ad7-e0078d2ae36f_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!cwdS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9725ac4-bb68-4e8d-8ad7-e0078d2ae36f_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!cwdS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9725ac4-bb68-4e8d-8ad7-e0078d2ae36f_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!cwdS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa9725ac4-bb68-4e8d-8ad7-e0078d2ae36f_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>I've sat in 50+ crisis rooms during major ransomware incidents. The organizations that recovered fastest weren't the ones with the best playbooks. They were the ones willing to fail fast, kill bad ideas, and try something else. </p><p>Here's why crisis management is closer to startup mode than anyone admits...</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://sharpend.saiz.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Interested in cyber crisis management, straight from someone who has spent weeks in boardrooms during major crises? Subscribe for free to The Sharp End!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Crises are, by definition, &#8220;out-of-framework&#8221; events. They push us beyond the boundaries of contingency plans. For if there were a plan that could simply be followed to resolve the situation, then strictly speaking we wouldn&#8217;t be in a crisis. </p><p>An organization that activates a contingency plan is not, in my view, in crisis: it may be operating in a degraded mode, for sure. But it is relying on an existing plan and well-defined steps and resources to return to normal. In that context, the framework still holds&#8212;and it is obviously not desirable to &#8220;fail fast and often.&#8221;</p><p>Contingency measures must be applied, and they must work. If they don&#8217;t, then the real problem lies elsewhere.</p><p>A situation becomes a crisis when there is no plan&#8212;or when contingency measures fail. And in such circumstances, clinging to the framework can be dangerous. </p><p>A framework limits options; it defines a territory shaped by the pre-crisis state: a state designed for day-to-day operations and long-term stability. Above all, it is a state whose mission is to drive the organization toward its usual objectives&#8230; which are not necessarily the objectives that matter during a crisis.</p><h2>Crisis Organization Is Not Day-to-Day Organization</h2><p>That is precisely why crisis organization rarely mirrors day-to-day organization. Managing a crisis ultimately means switching into &#8220;startup mode&#8221;: tapping into the creativity and energy of highly motivated teams operating closely within a very flat structure&#8212;namely the crisis cell.</p><p>It also means rapidly and efficiently surfacing ideas from the field, and above all maintaining a short feedback loop between observation, analysis, decision, and action (the famous OODA loop developed by Colonel John Boyd). These are things that, in normal operations, either don&#8217;t work or require an unsustainable level of energy and micromanagement once an organization reaches a certain size.</p><p>Most importantly, startup mode makes it possible to test things&#8212;lots of things. Not solutions meant to be permanent, but initiatives that, when they work, help move the organization one step closer to exiting the crisis, or at least keep it afloat long enough to try something else.</p><p>This inevitably involves making mistakes. Errors in judgment or assessment are unavoidable when you have to move forward with partial information and a rapidly evolving situation. These mistakes must be identified quickly (thanks to a short OODA loop) and discarded just as quickly, to make room for a better approach. Crisis time is constrained; there is no room for unnecessary wandering. Wasting time on doomed approaches can be fatal.</p><p>The goal of crisis management, in my view, is therefore to create the conditions that enable this way of working: allowing rapid, blame-free failure so that good ideas can emerge through iteration. Putting safeguards in place to limit the impact of failed initiatives, while knowing how to capitalize on those that succeed. And ultimately, discovering the path out of the crisis&#8212;a path that was not written in advance, that will inevitably be unique, and whose every step must be documented to feed the final lessons-learned process.</p><h2>A Startup Mindset&#8212;But a Responsible One</h2><p>This does not mean doing just anything. Startup mode, yes&#8212;but a responsible startup. An organization cannot simply disregard its legal and contractual obligations because it is in crisis (national public crises are, of course, a different matter). Some things can be renegotiated, but broadly speaking, an organization has very few &#8220;jokers&#8221; when dealing with third parties&#8212;unless it relies on their understanding, which actually does happen more often than one might think (I even saw competitors ready to help a major pig breeder brought to a complete standstill by ransomware).</p><p>It is therefore essential that the crisis organization is also capable of ensuring compliance with these obligations, so as not to add a second crisis on top of the first.</p><p> Poor decisions can worsen the situation, open a new legal front or trigger a secondary public communications crisis. This is a delicate balancing act: between formalism and openness to all proposals, between controlled chaos and the discipline of proper logging and traceability. In short, it&#8217;s a profession in its own right.</p><h2>Above All, a Matter of Culture</h2><p>Let me be clear: I am not suggesting that crisis management consists of trying everything at random until something finally works. What I want to emphasize is the importance of agility and humility in steering a crisis&#8212;and the need to foster a culture of initiative rather than blame (I will probably write about my worst crises someday&#8230; including toxic corporate cultures and a lot of blame being thrown around).</p><p>Rapid iteration, killing bad ideas, and keeping only the good ones is only possible within a very specific culture. One where failure is not stigmatized (far from the infamous &#8220;career-limiting moves&#8221; so dear to the most suffocating organizations), and where everyone&#8212;because they are professionals whose expertise is respected&#8212;can speak up and make proposals before the crisis cell&#8217;s director decides. Crisis time is not the time for blame: neither for the origin of the crisis nor for exit strategies that fail. </p><p>Under these conditions, the crisis cell may fail often. But it will fail safely, within a controlled framework&#8212;and that is precisely what will allow it to uncover the path out of the crisis.</p><p>What about your own experience? Have you ever been in a crisis where blame was flying around and failure was stigmatized&#8212;where trying things and failing was discouraged? How did it go?</p>]]></content:encoded></item><item><title><![CDATA[When Passwords Are Cooked Properly]]></title><description><![CDATA[A story of salt and pepper&#8212;to understand the next major breach, and why the cryptography legends I interviewed are urging us to move beyond passwords.]]></description><link>https://sharpend.saiz.com/p/when-passwords-are-cooked-properly</link><guid isPermaLink="false">https://sharpend.saiz.com/p/when-passwords-are-cooked-properly</guid><dc:creator><![CDATA[Jerome Saiz]]></dc:creator><pubDate>Fri, 23 Jan 2026 21:14:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!ME3w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F221d8086-8f7c-4e9e-a8c6-fcc22c38fb1d_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ME3w!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F221d8086-8f7c-4e9e-a8c6-fcc22c38fb1d_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ME3w!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F221d8086-8f7c-4e9e-a8c6-fcc22c38fb1d_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ME3w!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F221d8086-8f7c-4e9e-a8c6-fcc22c38fb1d_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ME3w!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F221d8086-8f7c-4e9e-a8c6-fcc22c38fb1d_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ME3w!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F221d8086-8f7c-4e9e-a8c6-fcc22c38fb1d_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ME3w!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F221d8086-8f7c-4e9e-a8c6-fcc22c38fb1d_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/221d8086-8f7c-4e9e-a8c6-fcc22c38fb1d_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3134188,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://sharpend.saiz.com/i/185578071?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F221d8086-8f7c-4e9e-a8c6-fcc22c38fb1d_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ME3w!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F221d8086-8f7c-4e9e-a8c6-fcc22c38fb1d_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!ME3w!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F221d8086-8f7c-4e9e-a8c6-fcc22c38fb1d_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!ME3w!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F221d8086-8f7c-4e9e-a8c6-fcc22c38fb1d_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!ME3w!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F221d8086-8f7c-4e9e-a8c6-fcc22c38fb1d_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>The seemingly endless stream of announcements about multi-million-user account breaches is a good opportunity to revisit industry best practices: how do serious web services and applications actually protect your passwords?</p><p>Answer: they cook them.</p><p>In this article, we&#8217;ll step behind the counter and see what really happens in the kitchen of a well-run online service. How does a careful developer&#8212;our digital chef&#8212;go about protecting users&#8217; passwords?</p><p>Over 15 years as a tech journalist, I interviewed some of the people who built these foundations. Including Bruce Schneier and two of the creators of the RSA algorithm (Rivest, Shamir, Adleman).</p><p>Here&#8217;s what they got right about password protection&#8212;and why all three now argue passwords should be killed entirely.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://sharpend.saiz.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">If you are ready to cook in cybersecurity, subscribe for free to The Sharp End and support my work!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Before stepping into the kitchen, it&#8217;s worth revisiting the problem the chef is trying to solve. The developer doesn&#8217;t know you, has never met you, yet still needs to reliably recognize you when you return to the service.</p><p>The simplest way to do this is to ask you, during registration, to choose a secret (your password), which they store carefully&#8212;usually in a database accessible to the web application. From that point on, anyone claiming to be you must provide the same secret. The developer simply compares what you enter with what they have on file. If they match, you&#8217;re in; if not, try again.</p><p>An attentive reader will notice that this implies all user passwords are stored in a database fully accessible to the web application. That&#8217;s unavoidable with traditional password-based authentication: the application must be able to receive your password and compare it against a stored value&#8212;which is precisely why the industry has been searching for better alternatives for quite some time (biometrics, certificates, pass-phrases, physical tokens...)</p><p>But let&#8217;s get back to passwords. So how do you prevent an attacker from simply reading the database directly and walking away with every password?</p><blockquote><p>Short answer: it&#8217;s hard.</p></blockquote><p>Of course, there are well-known basic protections. The database itself is password-protected and typically not exposed directly to the internet&#8212;only the web application is allowed to query it. A conscientious developer will also design the application so attackers can&#8217;t trick it into revealing passwords (notably via classic SQL injection attacks). Beyond that, there are more advanced measures to protect the infrastructure itself&#8212;and even to restrict what people with database access can do.</p><p>But a realistic developer assumes that, sooner or later, the password database will fall into attackers&#8217; hands. The real goal is then to make life as difficult as possible for anyone who steals it.</p><div><hr></div><h3>Chop Finely</h3><p>The first technique is to <em>hash</em> passwords. Not with a butcher&#8217;s knife, but with a mathematical function known as a <em>hash function</em>.</p><p>Starting from a readable password, a hash function produces a completely different sequence of letters and numbers. For example, the word <em>&#8220;Casimir&#8221;</em> (a very poor password, by the way) becomes:</p><pre><code><code>8a7b9eadc09b43afa96ce42c5febdca94ea8ac04
</code></code></pre><p>when run through the (now deprecated) SHA-1 algorithm (just one hash function among many).</p><p>Important point: this is <em>not</em> encryption. Anyone can compute the hash of &#8220;Casimir&#8221;; no secret key is required. Hash algorithms are public and you can easily try them yourself online.</p><p>So what&#8217;s the point of hashing passwords?</p><p>It prevents attackers from immediately reading them in the stolen database.</p><p>In normal use, when you log in, you enter your password in plain text (&#8220;<em>Casimir</em>&#8221;). The web application hashes it and compares the result with the hash stored in the database. The password itself is never stored&#8212;or even seen&#8212;in clear text.</p><p>This process is invisible to users, but for attackers it makes things much harder. If all they have is the hash <code>8a7b9eadc09b43afa96ce42c5febdca94ea8ac04</code>, and they want to know that the actual password is &#8220;Casimir,&#8221; they must try every possible word, hash each one, and compare the results to the stolen hashes. Done properly, this can take quite a long time.</p><p>At this point, it should be obvious why choosing common dictionary words as passwords is a bad idea. To save time, attackers long ago automated dictionary attacks: they hash every word from dictionaries (in multiple languages) and automatically check whether any of those hashes appear in the stolen database. When they find a match, they&#8217;ve cracked a password and can log in. </p><p>To slow them down, security specialists, and especially mathematicians, whom we should thank for not giving up during high-school math, designed hash functions that deliberately take a noticeable amount of time to compute. We&#8217;re talking milliseconds, but the difference matters.</p><p>The idea is simple: when a legitimate user logs in, the web application has all the time it needs to compute a single hash. Adding a few extra milliseconds doesn&#8217;t matter to the real human who is trying to log in. But when an attacker steals hundreds of millions of passwords, those milliseconds add up. Potentially to years of computation.</p><p>That&#8217;s time during which the victim organization can notify users and force password resets. Every passing hour reduces the number of valid passwords left to crack&#8212;and therefore the value of the stolen data.</p><p>Today, the state of the art is to use functions like Argon2id, which can be configured to make large-scale hash computation prohibitively expensive.</p><div><hr></div><h3>Pre-Cooked Meals: Rainbow Tables</h3><p>Attackers, of course, didn&#8217;t stop there. Since they can&#8217;t take months or years to compute hashes after a breach, they took a shortcut: pre-computing hashes for the most common passwords. We are talking millions of them.</p><p>These pre-computed datasets are known as <em>rainbow tables</em>. When attackers obtain a new password database, comparison becomes instant: they simply look up matches in their tables.</p><p>Now you can see why choosing &#8220;123456&#8221; (or &#8220;Casimir&#8221;) is such a terrible idea. Those passwords have been sitting in rainbow tables for years. They&#8217;re the first to fall.</p><div><hr></div><h3>Add Salt&#8212;Generously</h3><p>Defenders responded quickly. To prevent attackers from relying on pre-computed hashes, systems now add a random value to each password <em>before</em> hashing it. This value is unique per user and is appended to the password in plain text prior to hashing.</p><p>So even though you enter &#8220;Casimir&#8221; into the password field, what actually gets hashed behind the scenes might look like:</p><pre><code><code>494301c9-2e9c-48ef-965e-2a74ac373dc9::Casimir
</code></code></pre><p>That extra value is called the <em>salt</em>.</p><p>Each user gets a unique salt. It doesn&#8217;t need to be secret and can be stored openly in the database next to the password hash. Its sole purpose is to make rainbow tables useless.</p><p>Attackers are extremely unlikely to already have rainbow tables computed for every dictionary word combined with <em>your specific salt</em> and then again for every other user&#8217;s in that database. So they&#8217;re forced to start from scratch and compute hashes in real time for each password. Goodbye, rainbow tables.</p><div><hr></div><h3>Add Pepper for Extra Bite</h3><p>At this point, we&#8217;re already following good practice: passwords hashed with a strong algorithm like Argon2id and salted per user give attackers a serious headache. But defenders still have one last ace up their sleeve: <em>pepper</em>.</p><p>Pepper is the opposite of salt. It&#8217;s a single value shared by all passwords (unlike salt), but this time it <em>must remain secret</em> (unlike salt). It&#8217;s stored outside the database, usually directly in the application code or configuration.</p><p>Pepper is applied just like salt: it&#8217;s added to the password (and its salt) before hashing.</p><p>Why bother?</p><p>Because in many breaches, attackers only access the database. Either they can&#8217;t fully compromise the servers and infrastructure (for example, they exploited an SQL injection and only were able to dump the database&#8217;s content), or they&#8217;re short on time, can&#8217;t audit the code to locate the salt and thus grab the easiest target before moving on: the database.</p><p>By adding a secret value outside the database, you dramatically increase the attacker&#8217;s workload. You&#8217;ve effectively strengthened every password by increasing its length and complexity with a value they don&#8217;t have&#8212;unless they also gain deeper access to the system, such as the application source code or configuration files.</p><div><hr></div><h3>How Bad Is the Breach?</h3><p>Hopefully, you can now better judge the severity of the next mega-breach you read about:</p><ul><li><p><strong>&#8220;Passwords were stored in clear text&#8221;</strong> &#8594; disaster (and arguably professional malpractice)</p></li><li><p><strong>&#8220;Passwords were not salted&#8221;</strong> &#8594; almost as bad</p></li><li><p><strong>&#8220;Passwords were hashed, salted (and peppered for bonus points)&#8221;</strong> &#8594; relax for now&#8230; They&#8217;re still out there, waiting for someone to crack them one day. At least you&#8217;ve got time to change them</p></li></ul><p>So, bon app&#233;tit&#8230; and now that you understand everything that can go wrong with passwords and how much of it is out of your control, try to move away from them whenever and wherever you can.</p><div class="pullquote"><p>In a future article, I'll explore why the RSA creators, pure cryptography legends, believe passwords are fundamentally broken, and why we're still using them anyway. </p></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://sharpend.saiz.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Subscribe for free to be sure to read it when it publishes!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[A closer look at retirement frauds]]></title><description><![CDATA[... and 5 steps to identify fraud websites]]></description><link>https://sharpend.saiz.com/p/a-closer-look-at-retirement-frauds</link><guid isPermaLink="false">https://sharpend.saiz.com/p/a-closer-look-at-retirement-frauds</guid><dc:creator><![CDATA[Jerome Saiz]]></dc:creator><pubDate>Mon, 19 Jan 2026 21:02:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!dhm2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8ea505-b7c9-413b-bf4c-7d35d8abd951_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!dhm2!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8ea505-b7c9-413b-bf4c-7d35d8abd951_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!dhm2!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8ea505-b7c9-413b-bf4c-7d35d8abd951_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!dhm2!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8ea505-b7c9-413b-bf4c-7d35d8abd951_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!dhm2!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8ea505-b7c9-413b-bf4c-7d35d8abd951_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!dhm2!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8ea505-b7c9-413b-bf4c-7d35d8abd951_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!dhm2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8ea505-b7c9-413b-bf4c-7d35d8abd951_1536x1024.png" width="1456" height="971" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0e8ea505-b7c9-413b-bf4c-7d35d8abd951_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2581702,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://sharpend.saiz.com/i/185106591?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8ea505-b7c9-413b-bf4c-7d35d8abd951_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!dhm2!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8ea505-b7c9-413b-bf4c-7d35d8abd951_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!dhm2!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8ea505-b7c9-413b-bf4c-7d35d8abd951_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!dhm2!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8ea505-b7c9-413b-bf4c-7d35d8abd951_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!dhm2!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0e8ea505-b7c9-413b-bf4c-7d35d8abd951_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>French national television invited me to expose AI-generated fraud sites targeting retirees. The 3-minute segment couldn't cover everything I found. Here's the full investigation.</p><h3>What&#8217;s this all about?</h3><p>For several months now, we&#8217;ve been seeing a rise in fake news websites put together very crudely. They all follow a very similar template and publish alarmist articles about pensions: loss of contribution quarters, supposed legislation leading to reduced benefits, and so on. And when it&#8217;s not pensions, it&#8217;s gardening&#8230;</p><p>In short, someone is clearly targeting seniors. But why?</p><h3>AI-generated sites and content</h3><p>Everything is fake, obviously. In fact, these sites don&#8217;t even really try to hide it. On one of them, the following notice appears at the top of every article:</p><blockquote><p>&#8220;<em><strong>Our site is based on entirely fictional facts generated by artificial intelligence. No content should be interpreted as real or factual</strong></em><strong>.</strong>&#8221;</p></blockquote><p>An interesting detail: this disclaimer is displayed as an image, not as text. As a result, search engines don&#8217;t index it, and it doesn&#8217;t appear in search results. The goal is clearly to mislead readers who land on these articles coming from a search engine.</p><h3>Where&#8217;s the scam?</h3><p>The goal of the sites we identified is merely to generate large amounts of web traffic in order to earn advertising revenue. In that sense, it&#8217;s not strictly a scam, but rather disinformation: false information knowingly spread as such. It&#8217;s rather petty and not really worht investigating per se.</p><p>Visitors to these sites are therefore not directly at financial risk. Only their gullibility is exploited to generate ad revenue. That&#8217;s the lesser evil&#8212;but as we&#8217;ll see, it could easily go much further.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://sharpend.saiz.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Before diving into the worst parts of this type of scam, please consider subscribing for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h3>How it works</h3><p>On the sites we analyzed, everything is fake: the articles, obviously, but also the &#8220;journalists,&#8221; their bios, and even their photos. After all, generative AI can do all of that, so why not use it?</p><p><strong>Step one</strong> is to generate the most alarming articles possible on topics that matter to the target audience (here, retirees, who are often more vulnerable to digital disinformation).</p><p><strong>Step two</strong> is to distribute this content as widely as possible to expose the target audience. The aim is to get it shared as much as possible&#8212;which explains the deliberately inflammatory themes. </p><p>To reach retirees, Facebook groups are the obvious channel. And indeed, a simple Google search such as <code>site:facebook.com scammydomain.com</code> shows that these articles are very frequently shared by users. And these users then express outrage in the comments, and go on sharing the false information themselves. And the cycle continues.</p><p>The operators behind these sites are actually quite good at SEO. I looked into one of them before my evening news segment, and it ranks first on Google for the query &#8220;pension seniors news&#8221;</p><h3>Who&#8217;s behind this?</h3><p>Potentially anyone. All it takes is an account with an online ad network to start cashing in. In that sense, it&#8217;s similar&#8212;ethically speaking&#8212;to the so-called &#8220;toxic content&#8221; monetized on YouTube.</p><p>I looked into one of these sites before yesterday&#8217;s broadcast, and it turns out to be operated by a small digital marketing company based in a small French town</p><p>That immediately explains the site&#8217;s strong search rankings.</p><p>Incidentally, I&#8217;m not surprised to find this kind of professional behind such practices. For those just joining and not yet familiar with my deep affection for digital marketing agencies, feel free to check my <a href="https://sharpend.saiz.com/p/how-lead-sellers-harm-your-business">previous article</a>, where I describe their harmful&#8212;and often dangerous&#8212;spam-related practices.</p><p>The domain name itself, registered only 46 days ago, appears to have previously belonged to an asbestos removal company in eastern France, whose last Facebook post dates back five years. It smells like a recovered expired domain, likely in the hope of benefiting from its previously &#8220;clean&#8221; history.</p><h3>Is it illegal?</h3><p>Apparently not&#8212;and that&#8217;s precisely why it&#8217;s so easy to trace the site back to its operator (and, with a bit of entry-level OSINT, to some of their clients as well).</p><p>To cover themselves, the site owner makes a point of stating at the top of each article that everything is fake. It&#8217;s clever. Beyond that, when you compare this to legitimate satire websites, which are in the business of publishing fake news, there are actually fewer differences than one might hope.</p><p>We&#8217;re likely in a grey area. The approach is clearly unethical, but not obviously illegal (I&#8217;m not a lawyer&#8212;if any legal professionals are reading, I&#8217;d welcome your take in the comments).</p><h3>How to identify these sites</h3><p>It&#8217;s fairly straightforward. The domain names are usually ridiculous, completely unknown, and the headlines are almost always alarmist, exploiting the classic scammer biases: urgency, fear of missing out, and&#8212;when targeting retirees&#8212;the fear of seeing their pension reduced.</p><p>Since their purpose is to maximize ad revenue, these sites are also easy to spot by the sheer volume of advertising compared to a legitimate editorial site. There&#8217;s a lot of it.</p><p>These sites also tend to be short-lived. The one I investigated had existed for only 46 days. Another similar one: 39 days. Once again, I strongly recommend checking the creation date of sites before trusting them. Tools like <a href="https://www.whatsmydns.net/domain-age">https://www.whatsmydns.net/domain-age</a> are often very revealing.</p><p>Legal notices can also be a useful indicator. If they&#8217;re missing, that&#8217;s obviously a bad sign. In this case, it&#8217;s even more amusing: they are present, but list nothing except the hosting provider (which, of course, has nothing to do with the scheme&#8212;but from the scammer&#8217;s point of view it at least provides an address to display).</p><p>The rest is almost comical:</p><ul><li><p>The site publisher? Simply &#8220;an independent, passionate editorial team.&#8221;</p></li><li><p>The person responsible for publication? You get a description of what a publishing director is, their role and responsibilities&#8212;but no name, obviously.</p></li></ul><p>At this point, I&#8217;m inclined to blame it on AI hallucination rather than an intentional attempt at concealment, since the company behind the site is actually very easy to identify.</p><h3>Why it could get worse</h3><p>In this case, we&#8217;re &#8220;only&#8221; dealing with disinformation designed to attract traffic and generate advertising revenue. Ultimately, the real damage is done to social cohesion: these sites quietly fuel distrust, pessimism, and sometimes even hatred, contributing to divisions within society. They become useful idiots for genuinely malicious disinformation operations run from abroad (see the <a href="https://en.wikipedia.org/wiki/Doppelganger_(disinformation_campaign)">Doppelg&#228;nger campaign</a>).</p><p>Here at least, the visitors themselves aren&#8217;t directly at risk.</p><p>However, as soon as you combine elderly people and money, the next step is unfortunately rather easy to predict.</p><p>While the sites discussed here don&#8217;t go that far, foreign-based criminal gangs certainly do. Every day, on dedicated forums and mailing lists, I see pleas for help from victims&#8212;or their families&#8212;who have lost a lifetime of savings after being persuaded to invest in a so-called &#8220;revolutionary&#8221; investment platform.</p><p>This is a massive transfer of wealth. Losses regularly reach several hundred thousand euros or dollars per victim. Some have even taken out loans to &#8220;invest more.&#8221; They&#8217;re left destitute, burdened with debt, often having lost their homes and torn their families apart.</p><p>You can clearly see how these fake news sites&#8212;relatively harmless in this specific case&#8212;could quickly become extremely dangerous bait in the wrong hands.</p><p>That&#8217;s why it&#8217;s vital to educate seniors on how to spot this kind of online deception. And that&#8217;s why I was genuinely pleased that a national TV news program took the time to shed light on this practice, even if only for a few minutes.</p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!iL01!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba7cbd90-95ef-4b6c-b974-0ce087b57ccf_466x538.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!iL01!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba7cbd90-95ef-4b6c-b974-0ce087b57ccf_466x538.png 424w, https://substackcdn.com/image/fetch/$s_!iL01!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba7cbd90-95ef-4b6c-b974-0ce087b57ccf_466x538.png 848w, https://substackcdn.com/image/fetch/$s_!iL01!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba7cbd90-95ef-4b6c-b974-0ce087b57ccf_466x538.png 1272w, https://substackcdn.com/image/fetch/$s_!iL01!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba7cbd90-95ef-4b6c-b974-0ce087b57ccf_466x538.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!iL01!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba7cbd90-95ef-4b6c-b974-0ce087b57ccf_466x538.png" width="466" height="538" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ba7cbd90-95ef-4b6c-b974-0ce087b57ccf_466x538.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:538,&quot;width&quot;:466,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:596607,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://sharpend.saiz.com/i/185106591?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba7cbd90-95ef-4b6c-b974-0ce087b57ccf_466x538.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!iL01!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba7cbd90-95ef-4b6c-b974-0ce087b57ccf_466x538.png 424w, https://substackcdn.com/image/fetch/$s_!iL01!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba7cbd90-95ef-4b6c-b974-0ce087b57ccf_466x538.png 848w, https://substackcdn.com/image/fetch/$s_!iL01!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba7cbd90-95ef-4b6c-b974-0ce087b57ccf_466x538.png 1272w, https://substackcdn.com/image/fetch/$s_!iL01!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fba7cbd90-95ef-4b6c-b974-0ce087b57ccf_466x538.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h3>Now, how to avoid financial scams?</h3><p>I go into much more detail on these mechanisms during presentations for my clients, but in summary:</p><ul><li><p>Any unsolicited offer of investment help (coaching, mentoring, &#8220;trading signals&#8221; to copy, &#8220;investor clubs&#8221;) is almost certainly a scam&#8212;especially if it quickly moves to instant messaging platforms like WhatsApp or Telegram groups (where the victim is often alone, surrounded by bots creating the illusion that everyone is making money).</p></li><li><p>Dozens of fake trading platforms are created every day, particularly in crypto. They&#8217;re extremely convincing and appear fully functional&#8212;except that everything is fake. On-screen &#8220;profits&#8221; are virtual, and any money sent is lost the moment it&#8217;s transferred. Scammers use every possible tactic to funnel victims to these platforms: fake romances, fake advice on public forums, hijacked social media accounts posing as real friends, and so on. It&#8217;s therefore essential to invest only on well-established, reputable platforms&#8212;and to know how to identify them.</p></li><li><p>For victims who have already been scammed, any offer claiming to help recover lost funds is invariably another scam designed to extract additional fees.</p></li></ul><h3>The basics of verification</h3><ul><li><p>Check which carrier operates the contact phone number. &#8220;Exotic&#8221; or virtual operators are automatically suspicious.</p></li><li><p>How long has the website existed? Check via <a href="https://www.whatsmydns.net/domain-age">https://www.whatsmydns.net/domain-age</a>. A domain that&#8217;s only weeks or months old is suspicious&#8212;especially if it was registered for just one year, the bare minimum.</p></li><li><p>Legal notices: do they clearly identify the individuals and the company behind the site and service? And is it really them? Finally, does the bank account (IBAN) used for transfers match the legal information? Any discrepancy is of course a major red flag (special mention for &#8220;investment firms&#8221; using a personal bank account).</p></li><li><p>Google. A simple search often turns up victim testimonials&#8212;or, as I recently saw during an engagement, reveals that the company is outright blacklisted by the national financial markets regulator. It doesn&#8217;t get much more red-flagged than that.</p></li><li><p>One last trick: copy a few sentences from the site and search for them verbatim on Google, in quotation marks. If the same text appears on multiple other sites under different names&#8230; that&#8217;s suspicious to say the least.</p></li></ul><p>In my professional work, I&#8217;ve traced back operations of this kind and these methods have helped expose hostile campaigns. They could just as easily have prevented them&#8212;if the victims had used them. And honestly, it&#8217;s not that complicated.</p><p>And this is everything I wish I could have crammed into that short TV slot the other night but could not!</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://sharpend.saiz.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Don&#8217;t miss other articles like this! (registering is free and also spam-free, obviously!)</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[How Lead Sellers Harm Your Business]]></title><description><![CDATA[TL;DR: If you buy email address lists for sales outreach, you are probably being taken for a ride.]]></description><link>https://sharpend.saiz.com/p/how-lead-sellers-harm-your-business</link><guid isPermaLink="false">https://sharpend.saiz.com/p/how-lead-sellers-harm-your-business</guid><dc:creator><![CDATA[Jerome Saiz]]></dc:creator><pubDate>Mon, 19 Jan 2026 19:24:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!j1pW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57b75fd-8dba-4fb7-8e2b-2c3db7ae81c1_1280x607.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!j1pW!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57b75fd-8dba-4fb7-8e2b-2c3db7ae81c1_1280x607.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!j1pW!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57b75fd-8dba-4fb7-8e2b-2c3db7ae81c1_1280x607.png 424w, https://substackcdn.com/image/fetch/$s_!j1pW!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57b75fd-8dba-4fb7-8e2b-2c3db7ae81c1_1280x607.png 848w, https://substackcdn.com/image/fetch/$s_!j1pW!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57b75fd-8dba-4fb7-8e2b-2c3db7ae81c1_1280x607.png 1272w, https://substackcdn.com/image/fetch/$s_!j1pW!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57b75fd-8dba-4fb7-8e2b-2c3db7ae81c1_1280x607.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!j1pW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57b75fd-8dba-4fb7-8e2b-2c3db7ae81c1_1280x607.png" width="1280" height="607" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f57b75fd-8dba-4fb7-8e2b-2c3db7ae81c1_1280x607.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:607,&quot;width&quot;:1280,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1666577,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://sharpend.saiz.com/i/185097760?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57b75fd-8dba-4fb7-8e2b-2c3db7ae81c1_1280x607.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!j1pW!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57b75fd-8dba-4fb7-8e2b-2c3db7ae81c1_1280x607.png 424w, https://substackcdn.com/image/fetch/$s_!j1pW!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57b75fd-8dba-4fb7-8e2b-2c3db7ae81c1_1280x607.png 848w, https://substackcdn.com/image/fetch/$s_!j1pW!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57b75fd-8dba-4fb7-8e2b-2c3db7ae81c1_1280x607.png 1272w, https://substackcdn.com/image/fetch/$s_!j1pW!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff57b75fd-8dba-4fb7-8e2b-2c3db7ae81c1_1280x607.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>For once, I won&#8217;t be talking about cybersecurity, but about reputational risk.</p><p>Receiving a spam email promoting a local company led me to try to trace the origins of this rigged market that claims to sell &#8220;<em>qualified</em>&#8221; and &#8220;<em>legal</em>&#8221; email addresses.</p><p>What I uncovered were concealment practices that go as far as abusing one client&#8217;s trust to serve another. And this is in Europe, where a privacy law such as GDPR is supposed to be in full swing.</p><div><hr></div><h2>The spam too many</h2><p>It all started with yet another spam email, this time advertising a software solution. Let&#8217;s call it <strong>ACME.com</strong>. The email was unsolicited (and thus landed straight in my spam folder).</p><p>I don&#8217;t know this company, I&#8217;ve never interacted with it, and I&#8217;ve never asked to receive information from it. This is therefore a clear case of illegal collection of my email address. The company would in fact be unable to prove my &#8220;opt-in&#8221; (I&#8217;ll come back in a future article to how scammers obtain such email addresses illegitimately).</p><p>Still, since the company is local, I decide to unsubscribe. Naively, I assume that such a company doing email outreach, even if illegally at first, must at least comply with the famous GDPR when it comes to unsubscribe requests.</p><p>And while looking at the unsubscribe link (old habits die hard), I discover that it points to a very respectable national industrial group specializing in industrial cleaning, including dry ice blasting. Let&#8217;s call it <strong>Group-clean.com</strong>.</p><p>Dry ice blasting might be useful to some people&#8217;s email databases, but as things stand, I struggle to see the connection between these two companies. I struggle even more to imagine a perfectly legitimate industrial group, with nothing to do with digital marketing, lending its domain to spammers. At this point, I am also tempted to rule out a domain compromise for the sakes of Occam&#8217;s razor. I&#8217;m therefore very curious to understand what <strong>Group-clean.com</strong> is doing in this spam setup.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://sharpend.saiz.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading The Sharp End! Before reading how this story evolves in a strange m&#233;nage &#224; trois, consider registering for free to receive new posts and support my work!</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h2>A m&#233;nage &#224; trois&#8230;</h2><p>By following the unsubscribe link, I discover that it points to a well-known email marketing platform. Let&#8217;s call it <strong>TheEmailer.com</strong>.</p><p>These perfectly legitimate platforms do not provide email lists; they allow their customers to send bulk emails using their own lists. And <strong>TheEmailer.com</strong>&#8217;s terms and conditions are very clear: customers may only use email addresses collected in compliance with GDPR. In particular, the recipient must have explicitly agreed to be contacted, and must know what they are agreeing to be contacted about.</p><p>Clearly, the email I received is in blatant violation of the platform&#8217;s terms of use.</p><p>The question remains: who sent it?</p><p>And that&#8217;s where we tumble down the rabbit hole.</p><p>Thanks to the magic of LinkedIn, I reach out to everyone involved to try to understand how this m&#233;nage &#224; trois works: <strong>ACME.com</strong>, <strong>Group-clean.com</strong>, and <strong>TheEmailer.com</strong>. </p><p>And everyone appears genuinely surprised&#8230;</p><div><hr></div><h2>&#8230;then four</h2><p><strong>ACME.com</strong> seems shocked&#8212;borderline outraged&#8212;to be labeled a spammer. Their head of marketing tells me they use their own tool for email campaigns, that they do not do cold spamming, and that I&#8217;m not even in their database.</p><p>More importantly, they don&#8217;t know the salesperson who supposedly signed the email&#8212;despite it clearly being sent in their name.</p><p>That&#8217;s when I notice that although the signature displayed <strong>ACME.com</strong>, the email was actually sent from the domain <strong>ACME-software.com</strong>. A small but very real difference.</p><p>A quick WHOIS lookup later, a fourth player enters the picture: a Paris-based marketing agency promising &#8220;high value-added leads&#8221; on its website. Let&#8217;s call it <strong>MegaLeads.fr</strong>.</p><p>They registered the <strong>ACME-software.com</strong> domain less than two weeks ago. I then look at the mobile number shown in the spam signature. It turns out to be with an MVNO, and a quick OSINT search yields nothing. Most likely a temporary number, used only for spam campaigns.</p><p>I inform <strong>ACME.com</strong>&#8217;s head of marketing, who tells me she has never heard of <strong>MegaLeads.fr</strong>.</p><p>Not believing in the concept of the benevolent spammer, I start imagining a scenario where someone at <strong>ACME.com</strong> decided to launch a campaign on their own, without informing marketing. That would explain the use of <strong>ACME-software.com</strong>: since the agency cannot send emails from the main domain without proof of ownership (email platforms require this), it&#8217;s easier to impersonate the client by registering a similar domain under their own control (yes, criminals do exactly this for phishing campaigns).</p><p>In short, we already knew about shadow IT. Welcome to shadow marketing.</p><div><hr></div><h2>The magic of social networks</h2><p>We&#8217;ve made progress, but I still need to understand what <strong>Group-clean.com</strong> is doing in this mess.</p><p>That&#8217;s when I&#8217;m contacted privately by someone who clearly knows the territory. They suggest I check whether <strong>Group-clean.com</strong> might also be a client of <strong>MegaLeads.fr</strong>, just in case.</p><p>One quick Google dork later, I have my answer: <strong>Group-clean.com</strong> does indeed appear to be a <strong>MegaLeads.fr</strong> client. I suggest my contact consider a career in Cyber Threat Intelligence. He simply replies: &#8220;<em>When you see enough shit, you can smell it from far away.</em>&#8221;. Good enough.</p><p>LinkedIn comes to the rescue once again. Through a mutual contact, I finally manage to speak with the CEO of <strong>Group-clean.com</strong>. He confirms having worked with <strong>MegaLeads.fr</strong>, but to his knowledge only for SEO. Which should not involve creating such a subdomain in his company&#8217;s name&#8212;let alone using it as an unsubscribe link in another company&#8217;s spam campaign.</p><p>Unsurprisingly, he is furious.</p><div><hr></div><h2>MegaLeads&#8217; response to its client</h2><p>Meanwhile, <strong>ACME.com</strong>&#8217;s head of marketing is conducting her own investigation. She learns that a newly hired sales manager took it upon herself&#8212;without informing marketing&#8212;to order a campaign from <strong>MegaLeads.fr</strong>. When contacted, <strong>MegaLeads.fr</strong> acknowledged a &#8220;<em>cache error</em>&#8221; that supposedly caused the wrong domain to be used for the unsubscribe link (my LinkedIn contact, for his part, had previously bet on &#8220;<em>an intern&#8217;s mistake, sorry</em>&#8221;. Close enought to give him the win).</p><p>We will obviously never know the full truth. Human error is entirely possible. However, when I reviewed the spam emails I&#8217;ve received from <strong>MegaLeads.fr</strong> over the past six months, I found several similar &#8220;<em>cache errors</em>&#8221;:</p><ul><li><p>Two domains registered by <strong>MegaLeads.fr</strong> itself (one about cyber resilience, one about TLS certificates) used as unsubscribe links for mobile app development studios. Completely unrelated. Likely an attempt at concealment&#8212;but at least the unsubscribe domain is under <strong>MegaLeads.fr</strong>&#8217;s control.</p></li><li><p>Two sister companies whose domains are swapped between the spam sender and the unsubscribe link. Still deceptive, but at least it stays in the family.</p></li><li><p>A deactivated domain (for rugged laptop sales) registered by the Cayman Islands branch of an Israeli company selling IT asset management solutions. This improbable domain is used as the unsubscribe link for spam promoting a French corporate expense management company. I assume they are unaware of this little arrangement.</p></li><li><p>The domain of a company reselling the HubSpot CRM, used as the unsubscribe link in spam for a French generalist consulting firm. I&#8217;d bet the former doesn&#8217;t know either.</p></li></ul><p>That&#8217;s a lot of cache errors.</p><div><hr></div><h2>How to protect yourself</h2><p>First and foremost, understand that a qualified lead can only come from a content campaign (white paper, study, etc.) or from an event the user attended and explicitly agreed that you could contact them. And they expect you to contact them about the specific topic that led them to give you their email address in the first place.</p><p>I&#8217;m not a GDPR expert, but even the famous checkbox saying &#8220;<em>I agree to receive information from our business partners</em>&#8221; doesn&#8217;t really meet the requirements in this context.</p><p>So agencies that sell &#8220;<em>high value-added leads</em>&#8221; without being able to clearly explain where they come from are, in reality, selling hot air.</p><p>An agency that sells genuinely qualified leads will support you in creating high-value content or organizing events, and will orchestrate the whole thing (there&#8217;s plenty to do). In other words, it helps you talk about <em>you</em> to your prospects, and then collects their consent. That&#8217;s a real profession.</p><p>How can anyone seriously imagine that some generic agency can magically provide you with entire lists of contacts who are dying to hear from you? It doesn&#8217;t exist. It&#8217;s called spam. These contacts didn&#8217;t ask for anything, don&#8217;t know you, and when they receive your email, many will at best ignore you&#8212;and at worst, actively dislike you.</p><p>And if, on top of that, you end up in <strong>Group-clean.com</strong>&#8217;s position, you find yourself unwillingly associated with a spam campaign that has nothing to do with you, simply because a few months earlier you picked the wrong horse for a basic SEO engagement.</p><p>Worse still: by associating your domain name with a spam campaign, the agency risks lowering its trust score, which can eventually cause problems for your employees. Legitimate emails may land in spam more often&#8212;or be rejected outright.</p><p>In short, rather than dreaming of &#8220;magically&#8221; buying prospects, it&#8217;s far better to roll up your sleeves and build a real, solid content marketing strategy, and to participate in relevant events. That&#8217;s the only way to generate qualified leads. Real ones.</p>]]></content:encoded></item></channel></rss>