The Keystone Collective
  • Home
  • Reports
  • About
Sign in Subscribe

Keystone Collective

Rum Row to Router Logs: Gin, Static, and the Birth of American SIGINT

Counter-Intelligence

Rum Row to Router Logs: Gin, Static, and the Birth of American SIGINT

The Scene: Rum, Radios, and Ridiculous Codes Picture it: late 1920s. A cold Atlantic dawn, waves slapping against the side of a Coast Guard cutter somewhere off New Jersey. In a small shack onshore, a woman sits hunched over a radio receiver, a pencil poised over a scrap of paper.

By Keystone Collective 03 Nov 2025
The Case for Mandatory AI labeling

The Case for Mandatory AI labeling

Why transparency must become a safety standard in the synthetic age. AI-generated content is saturating our feeds, our politics, and our sense of reality. Yet unlike every other product that touches public life, from food to finance, synthetic media carries no label of origin. If society is to preserve trust

By Keystone Collective 26 Oct 2025
Reggie and the Chonky Pings: Adventures in ICMP Tunnelling

Networks

Reggie and the Chonky Pings: Adventures in ICMP Tunnelling

There are two kinds of network traffic: the stuff you expect, polite HTTP calls, earnest software updates, and the occasional desperate Zoom feed, and the stuff that looks exactly like the first lot but is actually committing crimes in a bowler hat. ICMP sits firmly in the first category: a

By Keystone Collective 24 Oct 2025
MAC Me Up Before You Go-Go: Spotting Rogue Devices Without Installing 400 Python Dependencies

Linux

MAC Me Up Before You Go-Go: Spotting Rogue Devices Without Installing 400 Python Dependencies

There’s a certain breed of “cybersecurity enthusiast” who believes enlightenment lies somewhere between installing Arch Linux and setting their terminal background to a gradient of anime characters. They’ll spend six hours customising their Zsh prompt to display Unicode cows and still can’t tell you the difference between

By Keystone Collective 18 Oct 2025
Click Here to Surrender: A Prepper’s Guide to Digital Dependence

Surveillance

Click Here to Surrender: A Prepper’s Guide to Digital Dependence

There was a time when the Internet was supposed to save us. It was going to democratise information, topple dictators, and make cat memes a universal language of peace. A borderless agora of human connection, creativity, and collaboration. Remember that? Now, it mostly spies on us, lectures us, and occasionally

By Keystone Collective 09 Oct 2025
CCTV: Britain’s Favourite Soap Opera You Didn’t Ask to Star In

Surveillance

CCTV: Britain’s Favourite Soap Opera You Didn’t Ask to Star In

Closed-Circuit Television. Even the name sounds like it was designed to lull you into compliance. “Closed-circuit,” as if to reassure you it’s just a cosy little private show, like some electrical knitting club that couldn’t possibly concern you. Yet Britain runs the world’s longest-running soap opera on

By Keystone Collective 26 Sep 2025
The Artful Dodger: Social Engineering, Pen-Testing, and a Toast to Robert Redford

The Artful Dodger: Social Engineering, Pen-Testing, and a Toast to Robert Redford

When the internet whispers “just patch the server,” it forgets the sensible little human who will prop the back door open with a smile. In the old caper film tradition, breaking into a place rarely required a sledgehammer; it required a line, a prop, perfect timing, and someone who believed

By Keystone Collective 17 Sep 2025
Weaponised Outrage: How Virality Became the Internet’s Favourite WMD

Society

Weaponised Outrage: How Virality Became the Internet’s Favourite WMD

Virality used to mean chickenpox. Now it means your aunt’s Facebook post about Bill Gates putting 5G in your teabags. Progress, apparently. Somewhere between cat videos and Kremlin psy-ops, the word stopped being cute and started being terrifying. What we call “going viral” has become less about a quirky

By Keystone Collective 07 Sep 2025
The Michelin Dark Web: When Hackers Steal Your Dinner

Hospitality

The Michelin Dark Web: When Hackers Steal Your Dinner

In the pantheon of cybercrime, you expect the usual suspects: ransomware attacks that freeze hospitals, phishing scams that rob pensioners, and state-sponsored malware targeting power grids. But imagine a shadowy corner of the internet where the prize isn’t stolen credit cards or nuclear secrets, but the exact sous-vide timing

By Keystone Collective 20 Aug 2025
COBOL and Coffins: The UK Still Runs on Dead Tech and Dead Men’s Code

Society

COBOL and Coffins: The UK Still Runs on Dead Tech and Dead Men’s Code

Welcome to the United Kingdom: land of historic traditions, collapsing infrastructure, and government systems running on programming languages that predate moon landings and colour television. The Queen is dead, the trains are delayed, and half the welfare system still relies on Colin, a 68-year-old COBOL wizard whose last holiday was

By Keystone Collective 03 Aug 2025
From Kittens to Cartels: How Watching AI Slop Funds Organised Crime

Society

From Kittens to Cartels: How Watching AI Slop Funds Organised Crime

There’s something eerily hypnotic about a video of a fluffy kitten tumbling in a field of daisies, or a chubby pug struggling with a squeaky toy. Now imagine those videos aren’t made by actual animals, or even humans, but by AI spinning endless reels of digital fluff, designed

By Keystone Collective 30 Jul 2025
Study of the Week: Your Wi-Fi Is a Narc

Surveillance

Study of the Week: Your Wi-Fi Is a Narc

You thought turning off your webcam was enough to protect your privacy. Maybe you stuck a little sticker over it, felt smug, and whispered "Not today, Zuckerberg." But bad news, friend: it’s not the camera you should be afraid of anymore. It's your Wi-Fi. Enter

By Keystone Collective 22 Jul 2025
See all
The Keystone Collective
  • Sign up
Powered by Ghost

The Keystone Collective

Where curiosity meets the keyboard, and chaos finds clarity.