Your Watch is Watching you. Who is Watching Your Watch? Not Worried About the Internet of Things? Well You Just Became a Part of It. As more and more “things” that you interact with every day become hooked into the internet, you leave a permanent trail of digital exhaust that enables hackers and government agencies…
Category: Security
Approaching UAV’s as a CO Skill-Set and not just a Weekend Hobby
The civilian operator has to understand that the future of conflict, regardless if it is domestic or foreign, is going to involve technology on a massive scale. With hybrid warfare now being perfected by both state and non-state actors, the civilian operator/prepper needs to plan on also using a combination of conventional, asymmetrical and…
Going Grey: The TOR Browser
**Authors Note:This is the first in a series of articles that will cover different tradecraft involving staying anonymous and “off the radar” as much as possible. No tricks here..just goo ole’ fashioned common sense combined with a touch of technology here and there.** Since I come to the conclusion there is no such…
We Are All Big Brother Now
This article presents an interesting question…in a world where connectivity and constant surveillance are a given, where is the line drawn in who is REALLY Big Brother? By exposing the wrongs of police and politicians, video-phone democracy is reinventing freedom. But is this just another form of mob rule? By MICHAEL HIRSH July 23, 2015…
Vehicle Ambush v2.0
The definition of hybrid warfare designates a combination of tactics and strategies; some from the conventional school, some from the asymmetrical and some from the cyber. It is this integration of cyber techniques that can make traditional and asymmetric battlefield strategies much more deadly and efficient. Imagine this: a small insurgent force, (platoon strength…
Shooting Holes in the Willy Wonka “Golden Encryption Key” Myth
In response to a recent article in Motherboard, Mr. A had this to say…. This article gets it right, but fails to point out the motivations behind the ‘golden key’. First, the idea of a ‘golden key’ is a decryption backdoor key that only the government would possess. This, we are told, is necessary…
The Paper Tiger that is American Domestic Counter-Terrorism Policy
Yesterday was a Sad Day when 4 Marines and now a Navy Petty Officer (who was wounded but succumbed to his wounds Saturday) lost their lives not on a foreign battlefield, but right here in America by the hands of a coward terrorist. My deepest sympathies and heartfelt prayers go out to the families of these…
5 Fast Facts You Need to Know about the Chattanooga TN Shooter
Mohammod Youssuf Abdulazeez: 5 Fast Facts You Need to Know Mohammod Youssof Abdulazeez has been identified by the FBI as the gunman who fatally shot four Marines and wounded a police officer on Thursday in shootings at two military recruiting and training centers in Chattanooga, Tennessee. Abdulazeez, 24, is also dead, the FBI says. At…
Countering ISIS Propaganda
The best way to show people what ISIS is REALLY like and not what they want the world to believe them to be through their slick Propaganda videos is through documentaries and homemade cell phone video secretly filmed by people who then upload it to social media. These secret “cells” of brave activist, risk…
The Terrorist Next Door
The chances of the next big domestic terror plot by ISIS being stopped are not good folks. Sorry, but please don’t be encouraged by all these arrest that were made over the July 4th weekend the Justice Dept and FBI is making such a big show over, these were just the few knuckleheads the…