- Threat Watch
- Warrior Tools
- Body Armor
- Long Guns
- Accuracy International
- Desert Tactical Arms
- Kel-Tec Long Guns
- Mosin Nagant
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- SIG Sauer
- Smith & Wesson Long Guns
- Wilson Combat
Archive for category Comms
From: Threat Level
Hackers Who Breached Google in 2010 Accessed Company’s Surveillance Database
…The database contained years’ worth of information on law enforcement surveillance surveillance orders issued by judges around the country. The hackers were hoping to discover if law enforcement agents were investigating undercover Chinese intelligence operatives who were working out of the U.S.
Is It Illegal To Unlock a Phone? The Situation is Better – and Worse – Than You Think
Legal protection for people who unlock their mobile phones to use them on other networks expired last weekend. According to the claims of major U.S. wireless carriers, unlocking a phone bought after January 26 without your carrier’s permission violates the Digital Millennium Copyright Act (“DMCA”) whether the phone is under contract or not. In a way, this is not as bad as it sounds. In other ways, it’s even worse.
From: Danger Room
In the late ’80s and early ’90s, Phil Zimmermann was a Colorado peacenik with a half-written program that he swore would one day let people exchange messages without Big Brother peering inside. The problem was, with a freelance job and two kids, Zimmermann could never quite find the time to finish the damn code — until Joe Biden came along.
From: Wired Enterprise
Google’s Gmail service went down for about 20 minutes on Monday. That was annoying, but not exactly unprecedented. These sorts of outages happen all the time. What was strange is that the Gmail outage coincided with widespread reports that Google’s Chrome browser was also crashing.
Late Monday, Google engineer Tim Steele confirmed what developers had been suspecting. The crashes were affecting Chrome users who were using another Google web service known as Sync, and that Sync and other Google services — presumably Gmail too — were clobbered Monday when Google misconfigured its load-balancing servers.
The IC3 has been made aware of various malware attacking Android operating systems for mobile devices. Some of the latest known versions of this type of malware are Loozfon and FinFisher. Loozfon is an information-stealing piece of malware. Criminals use different variants to lure the victims. One version is a work-at-home opportunity that promises a profitable payday just for sending out e-mail. A link within these advertisements leads to a website that is designed to push Loozfon on the user’s device. The malicious application steals contact details from the user’s address book and the infected device’s phone number.
Verizon is Very Excited That It Can Track Everything Phone Users Do And Sell That To Whoever Is Interested
Verizon Very Excited That It Can Track Everything Phone Users Do And Sell That To Whoever Is Interested
October 12, 2012
Attention smartphone users: be on guard for various types of malware attacking Android operating systems.
The IC3 has been made aware of various malware attacking Android operating systems for mobile devices. Some of the latest known versions of this type of malware are Loozfon and FinFisher. Loozfon is an information-stealing piece of malware. Criminals use different variants to lure the victims.
From the EFF:
In what can only be described as a results-oriented opinion, the court found Skinner had no reasonable expectation of privacy in the cell phone location data because “if a tool used to transport contraband gives off a signal that can be tracked for location, certainly the police can track the signal.” Otherwise, “technology would help criminals but not the police.” In other words, because cell phones can be used to commit crimes, there can’t be any Fourth Amendment privacy rights in them. If this sounds like an over-simplistic description of the legal reasoning in an opinion we disagree with, the sad reality is that the court’s conclusion really did boil down to this shallow understanding of the law.
From: Healthy Passwords
Ironkey S200 Flash Drive Review from 2011.
The security industry has long considered Ironkey to be “the” premiere flash drive. We wondered how user-friendly Ironkey would be for non-technical users, so we decided to evaluate the drive from a non-technical perspective.
- Military-grade Hardware Encryption.
- Support for Windows, Mac OS X, and Linux.
- Portable Application Support (Apps living and running only on flash drive).
- Identity Manager for Password Management. (Windows Only)
- Verisign Identity Protection Built into Identity Manager. (Windows Only)
- Secure Sessions Service to encrypt browser traffic. (Windows Only)
- Self-Destruct after 10 consecutive invalid password attempts (just erases flash).
- Online management account to backup Identity Manager records. (Windows Only)
- Optional ability to reset hardware password online.
From: Technology Review
At the heart of Apple’s security architecture is the Advanced Encryption Standard algorithm (AES), a data-scrambling system published in 1998 and adopted as a U.S. government standard in 2001. After more than a decade of exhaustive analysis, AES is widely regarded as unbreakable. The algorithm is so strong that no computer imaginable for the foreseeable future—even a quantum computer—would be able to crack a truly random 256-bit AES key. The National Security Agency has approved AES-256 for storing top-secret data.