Posts Tagged communications

Drone Video Unencrypted

From Danger Room:

Four years after discovering that militants were tapping into drone video feeds, the U.S. military still hasn’t secured the transmissions of more than half of its fleet of Predator and Reaper drones, Danger Room has learned. The majority of the aircraft still broadcast their classified video streams “in the clear” — without encryption. With a minimal amount of equipment and know-how, militants can see what America’s drones see.

, , , , , , , ,

No Comments

Smartphone Malware

FBI: Smartphone Users Should be Aware of Malware Targeting Mobile Devices and the Safety Measures to Help Avoid Compromise

The IC3 has been made aware of various malware attacking Android operating systems for mobile devices. Some of the latest known versions of this type of malware are Loozfon and FinFisher. Loozfon is an information-stealing piece of malware. Criminals use different variants to lure the victims. One version is a work-at-home opportunity that promises a profitable payday just for sending out e-mail. A link within these advertisements leads to a website that is designed to push Loozfon on the user’s device. The malicious application steals contact details from the user’s address book and the infected device’s phone number.

, ,

No Comments

Communications Go Bag

From KF7ETX:

, , , , , , ,

No Comments

FBI: Malware Attacking Andriod

Malware Targets Android Smartphones

October 12, 2012
Attention smartphone users: be on guard for various types of malware attacking Android operating systems.

, , , , , ,

No Comments

Mozilla’s New Universal Login

Mozilla has developed a competing login framework that they claim is more secure than Facebook’s or Google’s design.

, , , , ,

No Comments

Spy Law Extended For 5 Years

From Threat Level:

The FISA Amendments Act, (.pdf) which is expiring at year’s end, allows the government to electronically eavesdrop on Americans’ phone calls and e-mails without a probable-cause warrant so long as one of the parties to the communication is believed outside the United States. The communications may be intercepted “to acquire foreign intelligence information.”

, , , ,

No Comments

Congressman Leaks – Government Spying on Our Phones

From Threat Level:

The carriers said they responded to police emergencies, subpoenas and other court orders. They did not clearly say how many times they responded to probable-cause warrants. That’s because much of Americans’ mobile-phone data is not protected by the Fourth Amendment.

The reports showed that AT&T, the nation’s second largest carrier, received about 125,000 requests from the authorities in 2007 — mushrooming to more than 260,000 last year.

Verizon, the nation’s largest carrier… said it also received about 260,000 requests last year…

Sprint said it has received…500,000 requests last year.

…T-Mobile, declined to divulge how many requests it gets.

McCone said the company (AT&T) employs more than 100 full-time staffers and “operates on a 24/7 basis for the purpose of meeting law enforcement demands.”

, , , ,

No Comments

Goal Zero Nomad 7 Solar Panel

Nomad 7 Solar Panel

This ultra compact solar charger will charge cell phones, GPS devices and cameras.

Reviews

Outdoor Gear Lab

Goal Zero Review

Backpack Gear Test

Backpacker Magazine

Video

, , , , ,

No Comments

Brunton – The Leader in Portable Power Introduces the Resync™ For 2012

Press Release

RIVERTON, WYOMING, Brunton Hunting, a premiere leader in optics, portable power, navigation, instruments, lighting and gear announces the addition of the Resync to their portable power pack line.

The Resync is Brunton’s solution for demanding USB devices like tablet computers and e-readers, and is also compatible for smaller devices such as smart phones and GPS units.  With a power gauge and auto shut-off, you never need to worry about overcharging.  The all weather shell tough rubberized Adventure-Armor™ provides a positive grip and impact protection for extreme use.  High efficiency ports and protective Adventure-armor™ makes this portable power pack the back-up of choice for hunters out in the field.

Weighing just 10 ounces, you can easily stow the Resync in your backpack when heading out for your big game hunts.  It is waterproof and has a durable rubberized shell to help protect it from the elements.

Features:

  • Output: 5 volts 2,100 mA USB
  • Input: 5 volt USB or 12 volt DC, compatible with USB-based or 12v Brunton solar panels
  • Capacity: 9000 mA rechargeable Lithium Polymer battery
  • Compatible with Brunton Sync Techâ„¢ enabled headlamps and task lights
  • Water resistant
  • Durable rubberized shell
  • Power gauge and auto shut off
  • Dimensions: 2.7” x 5.7” x 0.9”
  • Weight: 10 oz.

MSRP: $168.00

ABOUT BRUNTON: The leading manufacturer of equipment for the outdoor adventure, Brunton’s passion for innovation and quality dates back to 1894.  Brunton delivers performance, comfort and convenience to the outdoors with a full line of portable power, navigation, lighting, weather and optical products. See Brunton’s full line at www.bruntonhunting.com.

, , ,

No Comments

New Generation of U.S. Military Communication Satellites

The United States military is upgrading its communication satellites with two new programs known as Advanced Extremely High Frequency (AEHF) and Wideband Global SATCOM (WGS).

There is a detailed analysis of the new infrastructure at Aero.org.

, , , ,

No Comments

NSA Creates Secure Call System

Technology Review reports that the NSA has devised a system in which phones with the Android software are able to make encrypted phone calls.

Let’s hope that this tech trickles down to the consumer market.

, , , , ,

No Comments

Web Links Could Compromise Your Smartphone

Technology Review reports that if you have a smartphone that runs a version of Android, be careful about the links you click:

A chilling demonstration to a small, packed room at the RSA security conference today showed how clicking a single bad Web link while using a phone running Google’s Android operating system could give an attacker full remote control of your phone.

, , , , ,

No Comments