On a clear afternoon in March 2011, the relatively still air in Uruzgan’s Tarin Kot bowl was punctured by a blast wave and flame ball that rose more than 100 meters into the sky. Insurgents had concealed an improvised explosive device within a motorcycle, and infiltrated it into the logistics soak yard outside the Multi-National…
Category: Information Warfare
Use Espionage to Destroy ISIS
By William A. Levinson Sun Tzu’s Art of War admonished more than 2500 years ago, “Hostile armies may face each other for years, striving for the victory which is decided in a single day. This being so, to remain in ignorance of the enemy’s condition simply because one grudges the outlay of a hundred ounces…
Non-Kinetic Warfare Skills for the Civilian
The Kinetic Threats faced by the 21st Century Civilian Operator are getting more and more violent and random. Every day it seems we hear on the news about another Active Shooter, Carjacking, Kidnapping or Home Invasion. For most CO’s, this ignites a burning desire to train harder, more realistic and more enthusiastic than ever before….
Asymmetrical Warfare Moves Into Your iPad
Now that the Internet is so ubiquitous that you must accept direct deposit for your paycheck, and your refrigerator has to get online to check for sales on cottage cheese, we find ourselves totally dependent on a service that we don’t understand and can’t live without. System engineers, whether they work for huge companies…
Flying Malware Injectors, Invisible UAV’s and Anti-Drone Lasers (Part 4)
This is the fourth and final installment of Drones and the Civilian Operator. If you missed the preceding installments, the First, Second and Third, are available to read. Think about it, if somebody were to have used terms like: “Counter-UAV Lasers”, “Hacker Drones” or “Invisible UAV’s” ten years ago, you would have called them nuts;…
The Age of the Data Broker: Where Information is King
By Hammerhead Cyber crime is evolving as fast as the technology in which it exploits. Hackers no longer are content in just stealing your money outright; they have realized the real prize, the real pay dirt, is raw DATA. The criminals have realized that the new billionaires in the tech world are no longer the software and…
RFID Microchips in Clothing (Part 2)
“I’d Rather Go Naked” Spyware vs. Spy Wear: Emergence of RFID Microchips in Clothing In part 1 of our story, we discussed how clothing manufacturers have started to embed RFID microchips into their apparel. These chips are sensors that cannot be turned off and — with readily available readers — can be used to track information about the consumer…
RFID Microchips in Clothing (Part 1)
They say “Clothes make the man”…what happens when “Clothes reveal everything about the man?” The Emergence of RFID Microchips in Clothing (Part 1) Imagine walking into a store you have never previously visited and a clerk walks up to you and asks, “How are those size 36 Dockers pants working out for you? Would you…
Mr. Robot’s Black Hat Bag of Tricks
Note: For all you Mr. Robot fans like myself who were looking forward to tonight’s Season Finale, bad news: 1 Update on 8/26/2015 at 5:01 p.m. ET: The season finale of Mr. Robot was scheduled to air tonight at 10 p.m. ET, but USA Networks announced just before 5 p.m. that it was holding the…
Guerilla “Drone-Craft” (Part 2)
This is the second installment about Drones and the CO. The first one can be read HERE. By Hammerhead As Drone (UAV) Technology grows, so will the expanding creativity in how to exploit it. Add to this the growing concern and at times, outright resentment, of how the Military and Local, State and Federal Law…