VISUALIZED: Map of Ransomware Attacks Since 2018 Each dot represents the location of a ransomware attack, with the size of the dot depicting the number of records impacted. This map updates weekly and pinpoints the locations of each ransomware attack in the US, from 2018 to present day. Where available, it includes the ransom amount,…
Category: Cyber-Warfare
Weaponized Drones: The Spread of Commercial Grade Flying IED’S
Weaponized Drones: The Spread of Commercial Grade Flying IED’S A look at how civilian quad-copters are being utilized by paramilitary groups, drug cartels and terrorist. This is the future of Asymmetrical Warfare. Prepare Accordingly.
A Safe and Secure Way to Decommission a Hard Drive | (ISC)² Article
Secret Messages – A Guide To Covert Communication
Secret Messages – A Guide To Covert Communication Nothing ground breaking here, just some “secret comm” fundamentals. Remember, having a Security mindset in today’s cyber-snooping world is just good common sense.
The Surveillance State: Metaverse Is the Ultimate Surveillance Tool
The Metaverse Is the Ultimate Surveillance Tool Really well done podcast about Metaverse and it’s application for global surveillance the likes of which you have never imagined!
How to Hide from Drones: Lessons Learned in Modern War
HOW TO HIDE FROM DRONES: LESSONS LEARNED IN MODERN WAR Some excellent information here. Drones are going to be part and parcel of Modern Guerilla Warfare, so take notes. Here is a post from the ARCHIVES as well.
Law Enforcement Agencies Are Now Buying Personal Cell Phone Data From Commercial Brokers Without Warrants
Three words: OPSEC! OPSEC! OPSEC!!
More Lessons from Afghanistan
The Taliban Is Hunting Down, Killing Afghans Using Biometric Data Gathered And Then Abandoned By The US Listen up Folks. What is happening in Afghanistan right now is a BLUEPRINT of what is going to happen here in the U.S. VERY SOON. Think about this: With information brokers ability to mine meta data and…
The Militant Drone Playbook
The Militant Drone Playbook “Therefore, we believe that militants will continue to view drones as a useful adjunct to their existing military repertoires, using them to assist in targeting forces on the battlefield, to harass command and logistic hubs, and to disrupt the supply and movement of adversaries’ soldiers and materiel.” Drones have a…
The Rise of China’s State Surveillance Machinery
The Rise of China’s State Surveillance Machinery Make no mistake, this is happening in CONUS. NSA Snooping on American Citizens because of their political beliefs is a full blown reality. Prepare Accordingly.