THE NEWS THIS week that a magistrate ordered Apple to help the FBI hack an iPhone used by one of the San Bernardino shooter suspects has polarized the nation—and also generated some misinformation. Those who support the government say Apple has cooperated in the past to unlock dozens of phones in other cases—so why…
Category: Communications
Exploiting Gaps: Russia and Electronic Warfare
In an article I wrote on FO about Russia’s EW Capabilities, I showed how NATO commanders were concerned about how far ahead Russia was in this department. That concern has not diminished, and for good reason as the article below shows. -SF Much has been written about the weakness of the Russian military. Commentators describe it…
Hacker Plans to Dump Alleged Details of 20K FBI and 9K DHS Employees
If the account given below is accurate, it will not matter HOW MUCH money the US Govt spends on Cyber Defense. We have bonafide IDIOTS giving away information on “how-to” access secure Govt. data. You cannot FIX STUPID folks. And oh yeah, Iran is now a viable threat. -SF A hacker, who wishes to…
The Espionage Economy
U.S. firms are making billions selling spyware to dictators. By James Bamford Ricardo Martinelli resides in a condo at the Atlantis, a luxury high-rise on Florida’s Biscayne Bay made famous by the TV series Miami Vice. A hefty, white-haired billionaire, Martinelli, 63, was viewed just a few years ago as one of Latin America’s most…
Just Another Reason Why You Should Dump Facebook
Facebook’s War on Freedom of Speech By Douglas Murray Facebook is now removing speech that presumably almost everybody might decide is racist — along with speech that only someone at Facebook decides is “racist.” The sinister reality of a society in which the expression of majority opinion is being turned into a crime has already…
Security Firm Warns of NEW Chinese Cyber Attacks
China is stepping up their game and timeline for War. -SF China’s cyber attacks against U.S. government and private sector databases are part of a major intelligence-gathering operation and are likely to continue, according to a new report by a cyber security firm. Chinese hackers stole health care data pertaining to some 80 million Americans…
Sharpen your Cyber-Skills: How to Make Your Own NSA Bulk Surveillance System
OF ALL THE NSA surveillance documents Edward Snowden leaked, some of the most important exposed the spy agency’s so-called XKEYSCORE program, a massive system for vacuuming up and sifting through emails, chats, images, online search activity, usernames and passwords, and other private digital data from core fiber optics cables around the world. XKEYSCORE, which the…
Device OPSEC: If You Use an LG Device, Read This!
Millions of LG phones at risk, Israeli team discovers For the second time in a month, researchers at cyber-security firms BugSec and CyNet have discovered a major security problem that leaves tens of millions of users at risk For the second time in a month, an Israeli team has uncovered a major security breach built…
Humor: New DOD Regulations Confirm that OPSEC Does Not Apply to Everyone
I always get a kick out of the Duffel Blog. This is what Everybody is thinking and this is what should be printed versus the spin and outright lies. -SF THE PENTAGON — The Department of Defense is set to release new security rules later this week, making it clear that consequences for violations don’t apply…
Calculating your “Threat Score”
As technology advances in our society, those sci-fi movies that everybody thought were outlandish and far-fetched will start being seen as harbingers. After reading this article, watch a few minutes of the movie “Minority Report”. “Psychic Technology” is nothing more now than an advanced algorithm. -SF FRESNO, Calif. — While officers raced to a recent…