by Mr. A (HCS’ Resident Cyber-Gandalf) A lot of citizens would immediately think they should so that the government could better catch criminals and terrorist. After all, wouldn’t all of us want terrorist stopped and criminals caught? Of course we would. Does backdoor encryption access accomplish this, or is there something else at work? Here’s…
Category: Technology
And This is How War Starts…
NATO missile system hacked remotely by ‘foreign source’ JULY 10, 2015 BY JOSEPH FITSANAKIS A Patriot missile system stationed in Turkey by the North Atlantic Treaty Organization (NATO) was allegedly hacked by a remote source, according to reports. German magazine Behörden Spiegel said this week that the hacked missile system is owned and operated by…
Mandating Insecurity?
The America Citizens Right of the Expectation of Privacy. It is a touchy subject, no doubt. Ever since the Edward Snowden revelations that big brother was in fact, watching, Americans have realized that everything they do online (pretty much) can be monitored, recorded, analyzed and filed for future use. It was no surprise then…
“Glitches” sounds better than “Hacked”, wouldn’t you agree?
With all the talk of “Internal Technical Issues”, by the NYSE, the fact remains that the day before the Stock Market crashes for 3 hours and all United Airline flights were grounded, this post on twitter by “Anonymous.” Now I am not a IT geek or Cyber-Gandolf by any stretch, but like Jimmy the Greek,…
Being a “Criminal” in a Mass Surveillance World
I want to warn you ahead of time, this article is extremely long and sometimes, dense. But Please, don’t give up on it! Read it all the way through, and then re-read it. After that, you will never look at cyber-security and cyber-surveillance “aka Big Brother” the same way again, I ASSURE YOU! Pay Close…
Email Security 101
Taken from the article: How to prevent the NSA from reading your Email by Raj Sabhlok It always seems to take some sort of major meltdown for people to bother to think seriously about security and privacy. Whether you’re afraid of being erroneously targeted for typing the word “bomb” one too many times or you just don’t want…
Can you Identify these Weapons of WW3?
Part of a contest you can find HERE. BTW, not a bad time to study up on types of UAV’s currently in use, since you might be seeing one in your neck of the woods soon. Just for kicks, I will list my guesses tomorrow. Stay Alert, Stay Armed and Stay Dangerous!
Studying Intelligence Tradecraft: The One Time Pad
Along with the Study of Insurgent Tactics series, I will be adding this series, which will focus on field Intelligence Skill-Sets/Tradecraft that would be practical for the Modern Guerilla to know. Since my knowledge of this is limited, I will be depending on certain friends to help me along. Thanks to Mr. A for this…
Defeating Drones: How to Build a Thermal Evasion Suit
Posted on June 16, 2015 by Brandon Smith This article was written by Brandon Smith and the included video was a joint project between Oath Keepers and Alt-Market Asymmetric tactics rely on the idea of fighting smarter, rather than fighting directly, against a larger or more technologically advanced aggressor. It means turning your opponent’s strengths into…
Cyber-Spook Tradecraft
Originally titled Spyfiles 4 on WikLeaks, this very revealing article reveals some very nasty programs that governments around the world use to spy on their citizens. (Please be careful if you choose to download any of the files on that LINK, as the page warns, even though they have been renamed and compressed, they are still…