- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Archive for category Comms
The Great Radio Spectrum Famine
Mobile broadband is consuming the available radio spectrum. Serving up more won’t be easy.
Read the full article here…
http://spectrum.ieee.org/telecom/wireless/the-great-radio-spectrum-famine/1
EP3 Sonic Defenders Now In Black
Posted by Gary in Accessories, Comms, Medic, Warrior Tools on 15/Oct/2010 14:42
Feds Propose Onerous Internet Laws
From: EFF
Government Seeks Back Door Into All Our Communications
The U.S. government has made two proposals this week that threaten online speech and privacy in radical new ways. Either one, if passed by Congress, will fundamentally rewrite the rules of the Internet. EFF is fighting hard for your rights and needs your help.
These proposals are the most frightening we’ve seen in a long time. The first is a bill called the “Combating Online Infringement and Counterfeits Act,” which would give the Justice Department new powers to censor websites accused of aiding “piracy.” The second is an Obama Administration proposal that would end online privacy as we know it by requiring all Internet communication service providers — from Facebook to Skype to your webmail provider — to rebuild their systems to give the government backdoor access to all of your private Internet communications.
ZeuS Can Defeat Mobile Phone 2-factor Authentication
It appears now that the criminals have developed malicious software for various mobile smart phones, than can capture these (one-time password)  banking text messages, and forward them to the criminals so that they can  log into the user’s bank account.
In his blog posting, David describes analyzing such a mobile phone malware that was designed for Symbian phones.
He calls this attack, “Man-in-the-mobileâ€.
Ballistic Hard Case for iPhone 4
From: goballisticcase.com
iPhone 4 Ballistic HC Series Case
This Ballistic HC Case is a MUST HAVE for your brand new iPhone 4. Keep your iPhone 4 looking as good as the day you took it out of the box! Engineered with FOUR layers of protection AND a built in screen protector, this case offers security from drops, fingerprints, scratches, dust and well… life in general. We assure you this is a case you won’t want to pass up!
- Advanced four layer protection
- Optional outer layer for ultimate protection
- Integrated screen protector and holster
- 180 degree rotating belt-clip
Click here to Download the Installation and Removal Instructions
LastPass Vetted by Steve Gibson of GRC
LastPass is a cross-platform ( Windows, Mac, Linux, iPhone, BlackBerry, Android) password manager and multi-factor authentication tool. I have been using it in a limited test for almost a year now and I am very pleased to say that my confidence in the security of this system is high and I am adopting it as my go-to application for managing secure passwords and for multi-factor authentication. There is a free version with almost all the functionality. This is a well thought out system.
Steve Gibson of GRC.com and the Security Now podcast goes into some detail about the LastPass CRYPTO and why this is a secure and redundant system in the podcast linked bellow . The real meat isn’t until about the 53rd minute so fast forward if you find yourself nodding off in the first part of the show.
Here is a transcript of the show.
Car-Hacking
From: MIT Tech Review
Taking Over a Car
Researchers “break in” with software and a laptop.
By Erica Naone
Cars are becoming more computerized, an evolution that could have an unintended side effect: vulnerability to attacks. Researchers at the University of Washington and the University of California, San Diego, led by Tadayoshi Kohno and Stefan Savage, recently showed that by taking over a car’s computers, they could disable the brakes, stop the engine, and control the door locks. For now, most of the attacks require access to a port inside the car. But wreaking havoc could get easier as carmakers add more wireless connectivity. The researchers hope their work will motivate manufacturers to add security features.
Apple Seeks Patent to Spy on Customers
From: EFF
While users were celebrating the new jailbreaking and unlocking exemptions, Apple was quietly preparing to apply for a patent on technology that, among other things, would allow Apple to identify and punish users who take advantage of those exemptions or otherwise tinker with their devices. This patent application does nothing short of providing a roadmap for how Apple can — and presumably will — spy on its customers and control the way its customers use Apple products.
Protecting the Critical Infrastructure
Posted by Gary in Comms, Threat Watch on 15/Aug/2010 12:40
From: IDGA
With a turbulent economic outlook, advancing threats from cyber criminals and an ongoing oil spill impacting our global ecosystem; the challenge of protecting the critical infrastructure can no longer be an exercise in reactive security. Caretakers of these systems have to look at changing how they monitor, control, and recover in the event of a cyberevent. By the looks of things BP is dealing with their fair share of Hacktivism right now.
Cyber Security Summit
Posted by Gary in Comms, Threat Watch on 14/Aug/2010 12:51
4th Cyber Security Summit
September 20 – 22, 2010, Sheraton Premiere at Tysons Corner Hotel, Vienna, VA
Atlantic Signal Tactical Headsets
Posted by Gary in Comms, Gear, Warrior Tools on 12/Aug/2010 17:27
Atlantic Signal Custom Tactical Headset Systems, Options & Accessories
Atlantic Signal and its predecessor, New Eagle, have been in the business of designing and manufacturing tactical communications for L.E. and Military Operators worldwide since 1989. www.atlanticsignal.com
Smartphones, Jailbreaking and the New Battle Front for Enterprise Security
From: IDGA
… So why is this so bad? First and foremost jailbreaking is a hack! Users are inviting a third party developer to hack your device. Plain and simple. Most recent versions of these tools are able to run over a simple webpage that is exploiting a few unpatched vulnerabilities in the smart phone operating system code. This risk was exposed last year when a worm “rick rolled” jailbroken iPhone users, exploiting a default password setting in secure shell daemon installed as part of the jailbreaking process.
Saudis to Monitor BlackBerry Data
From: CNET
BlackBerry maker Research in Motion has decided to allow the government of Saudi Arabia access to BlackBerry users’ messages, in order to avoid a ban on the device in the country, the Associated Press reported Saturday.
The AP quoted an official at the Saudi Communications and Information Technology Commission as saying that the deal between RIM and the government would likely involve placing a BlackBerry server inside the country to enable the Saudis to monitor data.
Nationwide Simulated Emergency Communications Test
In late June every year in the United States, unbeknownst to most Americans, a nation-wide radio communications network is set up that links every major city and most of the geography of the country. This massive amount of technological infrastructure is set up from scratch within a few hours at locations that vary from State/Local Government Emergency Operations Centers to isolated areas without utilities of any kind. Every mode of radio communications is utilized including analog, digital, voice, data, simplex, duplex, satellites and even automated relay stations launched on aircraft and with weather balloons.  For 24 continuous hours this nation-wide radio communications network is exercised with the primary objective of proving the system’s readiness and capabilities. Then as quickly as it was set up the system is dismantled and stored in preparation for when it is needed. It is the most reliable back-up emergency communication system in the world. And it does not cost the U.S. tax payers one cent — not in equipment or human resources. The benefits of such a system to emergency relief operations should be obvious.  In fact the system has demonstrated its’ value time after time during earthquakes, hurricanes, forest fires, terrorist attacks and other disasters. And all of this capability is provided by volunteers who continuously hone their technical skills and acquire/build/maintain their own equipment. These skilled radio engineers and operators along with their equipment combine into a seriously important resource for emergency communications. And the annual event that tests their readiness is called “Amateur Radio Field Dayâ€.
For Amateur Radio operators (Hams) Field Day is a big deal. In addition to exercising their ability to set up and operate a massive emergency communications network the event also has some fun aspects. Field Day is also a big contest where stations compete to make the most contacts on as many frequencies and modes as possible. And there is the social aspect that usually involves food and ancillary outdoor family activities. This is also the major Amateur Radio annual public awareness event. If you are interested in learning about Amateur Radio or more specific radio communications technologies and techniques then visiting your local Field Day site should net you the information you seek. You will find many knowledgeable people who will welcome you and be happy to answer your questions. You might even get invited to stay for lunch and/or dinner.
The annual Field Day event is coordinated by the national association for Amateur Radio; the American Radio Relay League (ARRL). Here are some links to more information about Field Day which is held on the last full weekend of June each year.
General Field Day Information:
http://www.arrl.org/field-day
Locate a Field Day site near you:
http://www.arrl.org/field-day-locator
Until next time, best wishes.
…Roy…