Entire church in U.S. on ISIS kill lists (click link above to be re-directed to original page) Christian church security is nothing new in the age of islamic terrorism, many mid to large capacity churches have either hired armed security or encouraged their parishioners to form their own security details during services. This current threat…
Category: Computer Related
Surveillance State: Proof “Being the Gray Man” is an Urban Myth
Every move you make. Every click you take. Every game you play. Every place you stay. They’ll be watching you. It’s time to come to terms with the fact that regardless of how “off the grid” or “careful” or “Gray” you THINK you are online, you have been made. An extensive online profile exist…
OPSEC Tradecraft: Modern Clandestine Groups Face New Challenges
There were no mobile phones or recording devices allowed at this bizarre encounter. The digital era is perceived as posing new threats to the security of terror groups in Ireland in terms of their being tracked and covertly recorded. Source: The Guardian Bottom Line Up Front Compartmentation via unlinking Strict anti forensic practices to mitigate…
Surveillance State: Secret Rules Make it Easy for the FBI to Spy on Journalist
SECRET FBI RULES allow agents to obtain journalists’ phone records with approval from two internal officials — far less oversight than under normal judicial procedures. The classified rules, obtained by The Intercept and dating from 2013, govern the FBI’s use of national security letters, which allow the bureau to obtain information about journalists’ calls without going to a…
Deconstructing Terrorism: World-Check Terrorism Database Exposed
A financial crime database used by banks has been “leaked” on to the net. World-Check Risk Screening contains details about people and organisations suspected of being involved in terrorism, organised crime and money laundering, among other offences. Access is supposed to be restricted under European privacy laws. The database’s creator, Thomson Reuters, has confirmed an…
Surveillance State: Hackers Have Found a Pulsating New Way to Spy on You on Your Phone and FitBit
Hackers may be pickin’ up good vibrations from your phone. All the better to surveil you with, my dear. Researchers at the Electrical and Computer Engineering school of the University of Illinois at Urbana-Champaign discovered that the vibration motor in your devices can operate like a microphone, according to the researchers’ paper. That means, if…
Technology: Sci-Fi Classics That Accurately Predicted the Future
With all this talk lately of “Minority Report” type technology in Bio-Metrics and other Security apparatus, I thought it would be interesting to look at other sci-fi movies that nailed it as far as actual current or “coming soon” technology. -SF Did you know a kid’s cartoon predicted 3D-printed food in 1962? Or that…
Surveillance State: The FBI’s Secret Biometric Database
FBI wants to keep secret who’s stored in its massive biometric database The FBI said it would retain the data to “aid in establishing patterns of activity” to help discover new criminals when they arise. The FBI is proposing keeping information that it stores as part of a massive biometric database private — even to…
Cyber-Security Threat Update: Don’t Get Juice-Jacked
You are racing through the airport. The low power light is blinking red. You are desperate to plug into any outlet you can find. Watch out. You could get juice jacked. Guess what? In every smart phone—no matter what the model—power and data flow through the same USB port and power cable. That creates a potential attack…
Surveillance State: Everything We Know About How the FBI Hacks People
RECENT HEADLINES WARN that the government now has greater authority to hack your computers, in and outside the US. Changes to federal criminal court procedures known as Rule 41 are to blame; they vastly expand how and whom the FBI can legally hack. But just like the NSA’s hacking operations, FBI hacking isn’t new. In…