Analog all the way! Paper don’t need batteries.
Category: OPSEC
On the Guerrilla, His Ecology and His Communications
On the Guerrilla, His Ecology and His Communications The Guerrilla must recognize three critical points: He, and his local network, are his own supply line. He fights with what he has, not with what he wishes. He cannot fight as a conventional force. If you have not already, be sure and order your…
Cyber-Security: WOROK – Powerful Malware Hidden in .PNG Images
WOROK: Powerful Malware Hidden in .PNG Images “Unless it’s your first day on the internet, you’re probably aware that downloading certain files can be a serious mistake. It doesn’t take a cybersecurity expert to know that double-clicking the TotallyNotAVirus.exe file that mysteriously appeared in your downloads folder is a bad idea. If you’re a bit more security…
Common Tasks Testing (CTT), The Army’s “Everybody” Requirement
Common Tasks Testing (CTT), The Army’s “Everybody” Requirement I know this is Army Doctrine (May God Forgive Me) but at the end of the day if it helps you PREPARE Better, who cares, right? ☺️ Prepare Accordingly.
The Proliferation of Wireless Signal Jammers
The Proliferation of Wireless Signal Jammers This is a fundmental part of 4GW. Learn about it now so you are not behind the 8 ball.
OACOK* For Home Defense Terrain Analysis
OACOK* For Home Defense Terrain Analysis Refresh your brain on OAKOC. Highly recommend you have a flash drive for such material and keep it in your Go-Bag
4GW Cyber Warfare: U.S. Treasury Hacked in Far Reaching Espionage Campaign
Sen. Wyden: ‘Dozens of Email Accounts’ Were Hacked at Treasury It appears Russia and China have been busy lately. 4GW never sleeps folks. It rages everyday. Take a look at all the companies under the Solar Winds umbrella and then ask yourself if you think your personal data is SAFE? Stay Alert, Armed and…
Why the Average Civilian Should Study Asymmetrical Warfare
From the Archives, 2015. I got asked this question the other day by a close friend and it occurred to me that I had never really plainly answered that question on this blog, even though I talk about the subject frequently. I think the best way to approach this subject is through historical precedent. It…
‘Golden Age of SIGINT May Be Over’: New Encryption Foils IC Eavesdropping
‘Golden Age Of SIGINT May Be Over’: New Encryption Foils IC Eavesdropping “Longstanding interest by US national security leaders has been heightened by Chinese advancements in quantum computing. For example, in 2017 China became the first country to demonstrate ‘quantum entanglement’ from a satellite to Earth. It could lead to much more secure communications…
Why You Should Side With Apple and Not the FBI in the San Bernardino I-Phone Case
I have the utmost respect for Bruce. The man knows his stuff and is the final word in topics of this sort. -SF By Bruce Schneier Earlier this week, a federal magistrate ordered Apple to assist the FBI in hacking into the iPhone used by one of the San Bernardino shooters. Apple will fight this order…