Your Watch is Watching you. Who is Watching Your Watch? Not Worried About the Internet of Things? Well You Just Became a Part of It. As more and more “things” that you interact with every day become hooked into the internet, you leave a permanent trail of digital exhaust that enables hackers and government agencies…
Category: Cyber-Warfare
Russians Hacked Joint Chiefs of Staff
Investigators say they believe the same Russian hackers that carried out attacks on the White House and State Department last year and the attempted penetration of the Pentagon last month were responsible for a major cyberattack that shut down the Joint Chiefs of Staff email for the past 11 days, The Daily Beast has…
The West’ Failure of Imagination
“The mastery of modern technology and media are central to the authoritarian resurgence.” Pay attention guys and gals….school is out. For the democracies to triumph in the long battle against Soviet communism enormous commitment was necessary. Both geopolitical and ideological, the struggle called for military investment, patience and resolve. As crucially, this challenge required…
Approaching UAV’s as a CO Skill-Set and not just a Weekend Hobby
The civilian operator has to understand that the future of conflict, regardless if it is domestic or foreign, is going to involve technology on a massive scale. With hybrid warfare now being perfected by both state and non-state actors, the civilian operator/prepper needs to plan on also using a combination of conventional, asymmetrical and…
Going Grey: The TOR Browser
**Authors Note:This is the first in a series of articles that will cover different tradecraft involving staying anonymous and “off the radar” as much as possible. No tricks here..just goo ole’ fashioned common sense combined with a touch of technology here and there.** Since I come to the conclusion there is no such…
Hackers can Disable a Sniper Rifle-or Change it’s Target
Welcome to the 5th Dimension of Warfare gents. We know about Sea, Air, Land and Space, now we get to truly be one of the first Generations to see how War plays out in the 5th Cyber Arena….Scary? You Bet your Ass. But if you take only one thing away from this article, don’t let…
Vehicle Ambush v2.0
The definition of hybrid warfare designates a combination of tactics and strategies; some from the conventional school, some from the asymmetrical and some from the cyber. It is this integration of cyber techniques that can make traditional and asymmetric battlefield strategies much more deadly and efficient. Imagine this: a small insurgent force, (platoon strength…
Shooting Holes in the Willy Wonka “Golden Encryption Key” Myth
In response to a recent article in Motherboard, Mr. A had this to say…. This article gets it right, but fails to point out the motivations behind the ‘golden key’. First, the idea of a ‘golden key’ is a decryption backdoor key that only the government would possess. This, we are told, is necessary…
Ever Wonder Which Words Will Flag You as a Terrorist?
I urge all my readers to go to the site listed below projectseen and experiment with words and language you use everyday in your emails and on social media sites and see which ones the NSA flags as “spook words”. by Joshua Krause By now, we all know that the NSA is spying on us. They…
“This is not your Grandfathers Al-Qaeda”
FBI Director James Comey made this statement in front of the Senate Judiciary Committee this past Wednesday in talking about ISIS. And although, not the main topic of discussion, one could since from the tone of all involved that ISIS continues to be a MAJOR concern to our Government, both in their campaigns in Iraq and…