This is the fourth and final installment of Drones and the Civilian Operator. If you missed the preceding installments, the First, Second and Third, are available to read. Think about it, if somebody were to have used terms like: “Counter-UAV Lasers”, “Hacker Drones” or “Invisible UAV’s” ten years ago, you would have called them nuts;…
Category: Privacy
Defeating Drone Surveillance (Part 3)
This is third installment of Drones and the CO. If you missed them or just want to review, here are the FIRST and SECOND installments. There is no doubt that the U.S. is fast becoming a “Surveillance State” similar to the ‘Islamic Bastion of Great Britain’, where there is currently one CCTV camera for every 11…
The Personal ‘Stealth’ Existence: Remain Deadly
Sage Advice Indeed..Heed it Well! -SF By John Farnam Ft Collins, CO –-(Ammoland.com)- In the wake of Friday’s heroic action by US Servicemen in Europe, who are currently getting microphones and camera lenses shoved into their faces by the minute, as well as being invited to appear on all manner of TV talk-shows, along…
Rape Prevention: Understanding Personal Location Data on “Dating” Apps
Whether you are a female CO or have one in your life that you care about, this is very important information..the Predators out there are getting smarter and using cyber tools more and more to track, stalk and eventually rape or murder young women all over this nation. Knowledge is Power, let’s start using it….
Emergence of License Plate Readers
Are you still naive enough to think it’s nobody’s business where you’ve been??? Big Brother begs to differ! Suppose someone were to follow you around in your car 24 hours a day and record where you were, who you were with, where you parked and how long you were there. Then suppose this person put…
Going Grey: The TOR Browser
**Authors Note:This is the first in a series of articles that will cover different tradecraft involving staying anonymous and “off the radar” as much as possible. No tricks here..just goo ole’ fashioned common sense combined with a touch of technology here and there.** Since I come to the conclusion there is no such…
Hackers can Disable a Sniper Rifle-or Change it’s Target
Welcome to the 5th Dimension of Warfare gents. We know about Sea, Air, Land and Space, now we get to truly be one of the first Generations to see how War plays out in the 5th Cyber Arena….Scary? You Bet your Ass. But if you take only one thing away from this article, don’t let…
We Are All Big Brother Now
This article presents an interesting question…in a world where connectivity and constant surveillance are a given, where is the line drawn in who is REALLY Big Brother? By exposing the wrongs of police and politicians, video-phone democracy is reinventing freedom. But is this just another form of mob rule? By MICHAEL HIRSH July 23, 2015…
Ever Wonder Which Words Will Flag You as a Terrorist?
I urge all my readers to go to the site listed below projectseen and experiment with words and language you use everyday in your emails and on social media sites and see which ones the NSA flags as “spook words”. by Joshua Krause By now, we all know that the NSA is spying on us. They…
Backdoor Gov’t Encryption: Is it about Criminals or about you?
by Mr. A (HCS’ Resident Cyber-Gandalf) A lot of citizens would immediately think they should so that the government could better catch criminals and terrorist. After all, wouldn’t all of us want terrorist stopped and criminals caught? Of course we would. Does backdoor encryption access accomplish this, or is there something else at work? Here’s…