Networks
Operation Mistyped: Behavioural Counterintelligence for the Remote Desktop Era
At 02:14 on an otherwise unremarkable Wednesday, an accountant at Thames & District Water Services (fictitious), a critical infrastructure provider whose security budget was approved by someone who still calls Wi-Fi “the wireless internet”, appeared to log in and begin transferring large volumes of financial records to an external