A recent article about how Google and YouTube Search Algorithims are manipulated got me to thinking. So I emailed a good friend of mine, Mr. A, with my concerns. Mr. A works on the security side of the IT industry. Here is what he had to say: Technology and information warfare have reached a…
Category: Computer Related
Thought Crime at an All Time High!
ON THE HEELS OF THE INFOWARS BANNING, TWITTER BANS THREE PROMINENT LIBERTARIAN ACCOUNTS I don’t know about you folks, but When things like this happen it only strengthens my resolve to be more independent and self-sustaining. I strongly encourage all of you to take the authors advice and seek training not only in communications,…
Surveillance State: SIM Card Tracking
Thailand plans to TRACK all tourists using a special SIM card (click on link above to be re-directed to source page) Voluntary tracking? Don’t see this working too well. It is kinda like agreeing to a voluntary ankle bracelet. Next will be a mandatory rice grain sized tracker they insert under your skin, kinda…
Surveillance State: Ways Your Wi-Fi Router Can Spy on You
All the Ways Your Wi-Fi Router Can Spy on You (click on above link to be re-directed) Overall, not surprising news by a long shot but you may be shocked at the WAYS in which it can spy on you, specifically, programs like Wi-Key. Like all Technology in the tight hands tools like this could…
Cyber Threats – 3 Easy Steps To Getting Your Door Kicked In
By Mr. A The Internet is easy to use, but the consequences of using it are hard for people to understand. Just stop and think about that. This technology can be used by almost anyone with a computer, and yet only a very small fraction of people using computers, smart phones, and tablets really understand…
Crusader Corner: Entire Church on ISIS Kill List – Names Taken From Online Church Directories
Entire church in U.S. on ISIS kill lists (click link above to be re-directed to original page) Christian church security is nothing new in the age of islamic terrorism, many mid to large capacity churches have either hired armed security or encouraged their parishioners to form their own security details during services. This current threat…
Surveillance State: Proof “Being the Gray Man” is an Urban Myth
Every move you make. Every click you take. Every game you play. Every place you stay. They’ll be watching you. It’s time to come to terms with the fact that regardless of how “off the grid” or “careful” or “Gray” you THINK you are online, you have been made. An extensive online profile exist…
OPSEC Tradecraft: Modern Clandestine Groups Face New Challenges
There were no mobile phones or recording devices allowed at this bizarre encounter. The digital era is perceived as posing new threats to the security of terror groups in Ireland in terms of their being tracked and covertly recorded. Source: The Guardian Bottom Line Up Front Compartmentation via unlinking Strict anti forensic practices to mitigate…
Surveillance State: Secret Rules Make it Easy for the FBI to Spy on Journalist
SECRET FBI RULES allow agents to obtain journalists’ phone records with approval from two internal officials — far less oversight than under normal judicial procedures. The classified rules, obtained by The Intercept and dating from 2013, govern the FBI’s use of national security letters, which allow the bureau to obtain information about journalists’ calls without going to a…
Deconstructing Terrorism: World-Check Terrorism Database Exposed
A financial crime database used by banks has been “leaked” on to the net. World-Check Risk Screening contains details about people and organisations suspected of being involved in terrorism, organised crime and money laundering, among other offences. Access is supposed to be restricted under European privacy laws. The database’s creator, Thomson Reuters, has confirmed an…