Many Thanks to Mobius Wolf for re-posting this one. If you have not read up on 5G I highly recommend you do. Originally posted on Philosophies of a Disenchanted Scholar: One purpose of 5G. It’s like a prison ankle bracelet. “Oh!” you say, “I’m fine because my phone is 2G/3G/4G!” Except they’re decommissioning those…
Category: Cyber-Warfare
Some Thoughts From A Reader
How Easy is it to Dupe somebody in the 21st Century? This Easy. Plan Accordingly.
Texas facing 10,000 potential cybersecurity attacks from Iran per minute
Texas facing 10,000 potential cybersecurity attacks from Iran per minute, Abbott says Iran and the rest of our enemies have been waging 4GW against the United States for years, so don’t let your guard down. Stay Alert, Armed and Dangerous!
‘Golden Age of SIGINT May Be Over’: New Encryption Foils IC Eavesdropping
‘Golden Age Of SIGINT May Be Over’: New Encryption Foils IC Eavesdropping “Longstanding interest by US national security leaders has been heightened by Chinese advancements in quantum computing. For example, in 2017 China became the first country to demonstrate ‘quantum entanglement’ from a satellite to Earth. It could lead to much more secure communications…
Google Removes The Mask: How Chrome Is Surveillance Software
Great Read. Share it with someone you care about. Beneath the Velvet Glove lay an Iron Fist- a digital one. So what’s Google been up to and what’s your course of action? via Google Removes The Mask: How Chrome Is Surveillance Software — American Partisan
The End of Passwords: DISA Test Walkabout Identity System
End Of Passwords: DISA Tests Walkabout Identity System The Future is Now. Stay Alert, Armed and Dangerous!
Artificial Intelligence in Warfare: “Predictive” Maintenance
Fix It Before It Breaks: SOCOM, JAIC Pioneer Predictive Maintenance AI For those of you that have served you know all too well the term “Preventative Maintenance” (PM). Remember those little White books attached by a dog tag chain to every piece of friggin equipment? Well in the 21st century you can scratch that…
This Person Does Not Exist
Ever wonder how all those American, Russian and Chinese BOT accounts on Twitter, Facebook, Instagram, YouTube, Linked-In etc. got the actual human face avatars for their accounts? How about all those legit looking PHISHING attacks? Well, they created them out of thin air of course! Yep folks, in the 21st century world of cyber-manipulation…
CO 101: Cybersecurity Pitfalls
Cybersecurity Experts: Stop Sending Troops Into Combat With Personal Tablets, Smartphones In the 21st Century, lessons like this are not just for the Military, but for the Civilian Operator as well. As long as we are dependent on tech, exploitation will always be there. Stay Alert, Stay Armed and Stay Dangerous!
CO 101: Battlefield Intelligence
BATTLEFIELD INTELLIGENCE: A PRIMER ON COLLECTION & EXPLOITATION Extremely valuable primer on collecting intel in the field. Stay Alert, Stay Armed and Stay Dangerous!