In response to a recent article in Motherboard, Mr. A had this to say…. This article gets it right, but fails to point out the motivations behind the ‘golden key’. First, the idea of a ‘golden key’ is a decryption backdoor key that only the government would possess. This, we are told, is necessary…
Category: Cyber-Warfare
Ever Wonder Which Words Will Flag You as a Terrorist?
I urge all my readers to go to the site listed below projectseen and experiment with words and language you use everyday in your emails and on social media sites and see which ones the NSA flags as “spook words”. by Joshua Krause By now, we all know that the NSA is spying on us. They…
“This is not your Grandfathers Al-Qaeda”
FBI Director James Comey made this statement in front of the Senate Judiciary Committee this past Wednesday in talking about ISIS. And although, not the main topic of discussion, one could since from the tone of all involved that ISIS continues to be a MAJOR concern to our Government, both in their campaigns in Iraq and…
Backdoor Gov’t Encryption: Is it about Criminals or about you?
by Mr. A (HCS’ Resident Cyber-Gandalf) A lot of citizens would immediately think they should so that the government could better catch criminals and terrorist. After all, wouldn’t all of us want terrorist stopped and criminals caught? Of course we would. Does backdoor encryption access accomplish this, or is there something else at work? Here’s…
And This is How War Starts…
NATO missile system hacked remotely by ‘foreign source’ JULY 10, 2015 BY JOSEPH FITSANAKIS A Patriot missile system stationed in Turkey by the North Atlantic Treaty Organization (NATO) was allegedly hacked by a remote source, according to reports. German magazine Behörden Spiegel said this week that the hacked missile system is owned and operated by…
Mandating Insecurity?
The America Citizens Right of the Expectation of Privacy. It is a touchy subject, no doubt. Ever since the Edward Snowden revelations that big brother was in fact, watching, Americans have realized that everything they do online (pretty much) can be monitored, recorded, analyzed and filed for future use. It was no surprise then…
“Glitches” sounds better than “Hacked”, wouldn’t you agree?
With all the talk of “Internal Technical Issues”, by the NYSE, the fact remains that the day before the Stock Market crashes for 3 hours and all United Airline flights were grounded, this post on twitter by “Anonymous.” Now I am not a IT geek or Cyber-Gandolf by any stretch, but like Jimmy the Greek,…
Amazon Spying on Reviewers? No!!
Amazon Is Analyzing the Personal Relationships of Its Reviewers This is an interesting story of a reviewer who had her reviewer deleted because Amazon believed she knew the author personally. Leaving completely aside the ethics of friends reviewing friends’ books, what is Amazon doing conducting this kind of investigative surveillance? Do reviewers know that Amazon…
Being a “Criminal” in a Mass Surveillance World
I want to warn you ahead of time, this article is extremely long and sometimes, dense. But Please, don’t give up on it! Read it all the way through, and then re-read it. After that, you will never look at cyber-security and cyber-surveillance “aka Big Brother” the same way again, I ASSURE YOU! Pay Close…
Email Security 101
Taken from the article: How to prevent the NSA from reading your Email by Raj Sabhlok It always seems to take some sort of major meltdown for people to bother to think seriously about security and privacy. Whether you’re afraid of being erroneously targeted for typing the word “bomb” one too many times or you just don’t want…
