Medium Source Index
Purpose
Track the public Medium source material used as the primary inspiration layer for this field manual.
Source Feed
- Profile: medium.com/@1200km
- RSS: medium.com/feed/@1200km
- Feed captured during scaffold: 2026-05-16
Current Feed Items
| Date | Title | URL | Themes |
|---|---|---|---|
| 2026-05-13 | Customer-Driven AI CTI Project | https://medium.com/@1200km/customer-driven-ai-cti-project-c0db3cdc1830 | CTI delivery, AI-assisted CTI, detection outcomes |
| 2026-05-12 | Customer-Driven AI CTI Project Template: Part 2B: Reference Toolkit | https://medium.com/@1200km/customer-driven-ai-cti-project-template-part-2b-reference-toolkit-3a56fab0b943 | templates, gates, workflows |
| 2026-05-12 | Customer-Driven AI CTI Project Template. Part 2A: Phase-by-Phase Execution Guide | https://medium.com/@1200km/customer-driven-ai-cti-project-template-part-2a-phase-by-phase-execution-guide-f9751a8bcb59 | intelligence cycle, CTI delivery phases |
| 2026-05-11 | Customer-Driven AI CTI Project Template. Part 1: Foundations | https://medium.com/@1200km/customer-driven-ai-cti-project-template-part-1-foundations-745861507d03 | PIR/SIR, evidence labels, source reliability, confidence, DRL |
| 2026-05-10 | Applying Sherman Kent's Analytic Discipline to CTI | https://medium.com/@1200km/applying-sherman-kents-analytic-discipline-to-cti-a-practical-analyst-guide-33142ad7553b | estimative language, analytic discipline |
| 2026-05-09 | CTI-Led Defensive Strategy for a Cellular Provider | https://infosecwriteups.com/cti-led-defensive-strategy-for-a-fictional-cellular-provider-case-study-c77bc5765b31 | telecom CTI, cellular provider case study |
| 2026-05-09 | CTI Kill Chain: An Analyst Guide With Real-World Evidence | https://medium.com/@1200km/cti-kill-chain-an-analyst-guide-with-real-world-evidence-c3bef6fd2979 | kill chain, evidence-driven lifecycle |
| 2026-05-08 | Manual CTI vs. AI-Assisted CTI | https://infosecwriteups.com/manual-cti-vs-ai-assisted-cti-a-step-by-step-clock-comparison-ee08325203fc | AI-assisted research workflow |
| 2026-05-04 | Attack Playbook — Operation DragonRx | https://infosecwriteups.com/attack-playbook-operation-dragonrx-91339316f0df | APT41, playbook, detection engineering |
| 2026-05-02 | APT41 Targeting Pharmaceutical Sector: Log4Shell to Domain Compromise | https://infosecwriteups.com/apt41-targeting-pharmaceutical-sector-log4shell-to-domain-compromise-9e4c1ba9dad6 | APT41, kill chain, ATT&CK, detection |
Editorial Rule
The field manual should transform these themes into structured tradecraft. It should not reproduce full Medium articles.