Cyber Obscura banner: ornate Victorian title flanked by a keyhole and a glowing terminal, against a dark engraved background of circuit traces.

About Cyber Obscura

An archive of special-interest stories about cybercrime, surveillance, strange networks, artificial intelligence behaving opaquely, and the hidden systems that shape the online world. Plus a curated set of lessons drawn from what they reveal.

It is the study of deterministic systems quietly doing exactly what they were designed to do, expected to do, and sometimes not.

The stories are unusual, sometimes unsettling. To unravel them, we need clear-eyed explanations of the technology that made each one possible.

Cyber Obscura is not a true-crime shrine. It is not a how-to manual for harm or hacking. It is an archive for the otherwise inattentive: the student who flips past the worked example to find the weird footnote. My hope is that reader will recognise themselves and stay.

Take E-Juche and the Optimisation of the Surveillance Stack. A case study in engineering censorship, a dictatorship dream come true: infrastructure, the political management of the information space, elaborate filtering, device patterns, and the everyday realities of who is online, how they connect, and what they are forbidden to see.

How to read Cyber Obscura

Start with the story.

Then read the technical breakdown. This is where the article explains the security concept in plain language, with the jargon unpacked.

The point is not to grasp what happened. The point is to understand what the technology made possible.

This site is built to make the technical layer luminous, to convey ideas without simplifying them into nonsense. Subnetting, ports, routing, protocols, application programming interfaces, mobile signalling, internet governance.

Cybersecurity is not a list of tools. It demands that you think, that you learn to notice systems, that you figure it out.

The work is observation. Inspection of the technical layer beneath the drama. That is the rabbit hole. That is where the failure points live.

From the archive

Case index

Strange systems, caught doing exactly what they were built to do.