- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Archive for category Comms
Google Removes Privacy Feature From Android, Claims Release Was Accidental
Posted by Gary in Comms, News, Threat Watch on 6/Feb/2014 15:05
From: EFF
Google told us that the feature had only ever been released by accident — that it was experimental, and that it could break some of the apps policed by it. We are suspicious of this explanation, and do not think that it in any way justifies removing the feature rather than improving it.
Android App Warns When You’re Being Watched
Posted by Gary in Comms, News, Threat Watch on 4/Feb/2014 14:52
From: MIT
Researchers find a way to give Android users prominent warnings when apps are tracking their location.
CRYPTO Author Speaks with the NSA
CRYPTO author Steven Levy met with Gen. Keith Alexander, the Director of the NSA, and others to discuss the Snowden leaks .
From: Threat Level
The NSA is clearly, madly, deeply furious at the man whose actions triggered the biggest crisis in its history. Even while contending they welcome the debate that now engages the nation, they say that they hate the way it was triggered. The NSA has an admittedly insular culture — the officials described it as almost like a family. Morale suffers when friends and neighbors think that NSA employees are sitting around reading grandma’s email. Also, the agency believes that the Snowden leaks have seriously hurt national security
BitTorrent Creates More Secure Chat Program
From BitTorrent:
First, a few words on Chat’s origins. Here at BitTorrent, we value privacy. With the news this year reminding us all of the susceptibility of the communications platforms we rely on to snooping, we found ourselves wanting something new, something secure, something private. We ultimately realized that we were uniquely qualified to build this platform.
Military To Add Mobile Devices To Networks
From FierceMobileIT:
For the first time in U.S. military history, foot soldiers and company support teams in Afghanistan are using specialized handheld mobile devices to access digital maps, exchange information with other troops and store mission-critical information. What began in 2011 as a way to supply soldiers with high-resolution maps on a PDA-type device eventually morphed into a suite of over 50 apps on something that now more closely resembles a mobile phone.
From Military.com:
In May, the Defense Department approved government-issued Apple devices using the iOS 6 operating system to connect to its networks, so long as they are operated within the confines of mobility pilots or a mobile device management (MDM) solution, once that is in place.
Likewise, the Samsung Knox version of Android was approved for use on DoD networks, pending the rollout of an MDM solution, said DoD spokesman Lt. Col. Damien Pickart.
Repeated attacks hijack huge chunks of Internet traffic.
Posted by Gary in Comms, News, Threat Watch on 22/Nov/2013 14:44
From: Ars Technica
Man-in-the-middle attacks divert data on scale never before seen in the wild.
The hacks, which exploit implicit trust placed in the border gateway protocol used to exchange data between large service providers, affected “major financial institutions, governments, and network service providers” in the US, South Korea, Germany, the Czech Republic, Lithuania, Libya, and Iran.
Spy Apps For the Individual
Posted by Brian in Comms, News, Threat Watch on 6/Nov/2013 13:26
Head of NSA Out in 2014
Posted by Brian in Comms, News, Threat Watch on 24/Oct/2013 12:54
From The Guardian:
Alexander has formalized plans to leave by next March or April, while his civilian deputy, Chris Inglis, is due to retire by year’s end, according to US officials who spoke on condition of anonymity.
Ham Radios – James Yeager
James Yeager talks about his Ham Radios
http://youtu.be/j3Az58kYd58
Did the NSA Build a Backdoor into U.S. Crypto?
Posted by Gary in Comms, News, Threat Watch on 24/Sep/2013 13:37
From: Threat Level
… The talk was only nine slides long (.pdf). But those nine slides were potentially dynamite. They laid out a case showing that a new encryption standard, given a stamp of approval by the U.S. government, possessed a glaring weakness that made an algorithm in it susceptible to cracking. But the weakness they described wasn’t just an average vulnerability, it had the kind of properties one would want if one were intentionally inserting a backdoor to make the algorithm susceptible to cracking by design.
Senate to Approve “Real” Journalists, Drudge Explodes
Matt Drudge was none too happy about Democrats determining who is and who is not a journalist: