The Defense Department’s recent emphasis on the importance of the electromagnetic spectrum could be coming to a head, as the department is considering recognizing the spectrum as a sixth domain of operations, in addition to land, air, sea, space and cyberspace, which officially was declared a domain in 2011. In a statement to Breaking Defense, DOD…
Category: Technology
A Glimpse into the Future of Electromaganetic Spectrum Weapons
The electromagnetic spectrum is where the wars of the future will be won or lost. Here’s a brief glimpse of what those battles will look like. In conflict zones from Europe to the Middle East, the electromagnetic spectrum has assumed a central place on the modern battlefield. In eastern Ukraine, Russian-backed forces have used sophisticated…
How NexDoor and NestCams Help Cops Solve Crimes
I will be doing some articles on the many civilian applications of both of these apps soon for both home and business security. -SF (NOTE: I think the name of the below video should have been “Night of the Living Trans-Vestites” or something along them lines; regardless I think it proves the absolute necessity of…
Computer Security: Email Hygiene Tips
Anti-phishing and Email Hygiene Journalists and newsrooms are increasingly the victims of hacking and malware, and often hackers target them through their email. Virtually every “sophisticated” hack of an individual reporter or entire newsroom starts with a relatively simple attack: phishing and spear phishing. Phishing is a social-engineering attack where an adversary crafts an email…
How to Find out if your Netflix Account was Hacked-And Fix It
Netflix lets multiple people use an account at the same time, and this feature is great when it allows you to mooch off a friend’s account without inconveniencing them. But one problem with this policy is that it has inadvertently created a black market for “access” to stolen Netflix accounts. A recent report by McAfee Labs revealed you…
Intel Tradecraft: Geo-Tagging and Identifying a Picture by it’s Background (Similar Image Search)
In the most recent episode of Homeland, Carrie while trying to figure out what direction to go in searching a stolen laptop for intel, is distracted by the computer’s screen saver which is a picture that shows the suspect in a beachfront bar in what appears to be a tropical location. Thinking back, Carrie remembers…
The Truth about Terrorist and Encryption Technology
Terrorists were using encryption technology to evade detection long before Snowden and the Paris attacks By Natasha Bertrand A wave of coordinated terror attacks that killed at least 130 people in Paris last week have had experts grappling with how French intelligence could have missed an operation that was most likely months in the making….
The Civilian Guide to Fighting ISIS Online
Anonymous Publishes Guide to ‘Fighting ISIS Online’ Since the FBI and CIA Won’t In the wake of the Paris terror attacks, and several high-casualty acts of terrorism from the so-called Islamic State in the past week, Anonymous has come out with a series of guides for getting involved in the hacktivist group’s Operation ISIS…
How Active Camouflage will Make Small Drones Invisible
British company Plextek Consulting wants to make drones impossible for their targets to spot. And rather than having to choose between camouflage patterns optimized for rocky desert terrain or for dense vegetation, they have developed electronic panels to cover a vehicle with adaptive camouflage that could display different patterns at the flick of a switch….
Where Americans Can Be Tracked Without A Warrant
Since the Paris attacks, there is a growing concern by DHS and the FBI that ISIS are able to communicate via “Dark Comms” or communications that are so highly encrypted they cannot tracked or monitored, common sense would tell you that authorities are going to start casting the “Surveillance” net wider to compensate, meaning more…