Are you still naive enough to think it’s nobody’s business where you’ve been??? Big Brother begs to differ! Suppose someone were to follow you around in your car 24 hours a day and record where you were, who you were with, where you parked and how long you were there. Then suppose this person put…
Category: Information Warfare
Russians Hacked Joint Chiefs of Staff
Investigators say they believe the same Russian hackers that carried out attacks on the White House and State Department last year and the attempted penetration of the Pentagon last month were responsible for a major cyberattack that shut down the Joint Chiefs of Staff email for the past 11 days, The Daily Beast has…
The West’ Failure of Imagination
“The mastery of modern technology and media are central to the authoritarian resurgence.” Pay attention guys and gals….school is out. For the democracies to triumph in the long battle against Soviet communism enormous commitment was necessary. Both geopolitical and ideological, the struggle called for military investment, patience and resolve. As crucially, this challenge required…
Approaching UAV’s as a CO Skill-Set and not just a Weekend Hobby
The civilian operator has to understand that the future of conflict, regardless if it is domestic or foreign, is going to involve technology on a massive scale. With hybrid warfare now being perfected by both state and non-state actors, the civilian operator/prepper needs to plan on also using a combination of conventional, asymmetrical and…
We Are All Big Brother Now
This article presents an interesting question…in a world where connectivity and constant surveillance are a given, where is the line drawn in who is REALLY Big Brother? By exposing the wrongs of police and politicians, video-phone democracy is reinventing freedom. But is this just another form of mob rule? By MICHAEL HIRSH July 23, 2015…
Shooting Holes in the Willy Wonka “Golden Encryption Key” Myth
In response to a recent article in Motherboard, Mr. A had this to say…. This article gets it right, but fails to point out the motivations behind the ‘golden key’. First, the idea of a ‘golden key’ is a decryption backdoor key that only the government would possess. This, we are told, is necessary…