- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged internet
NRA and ACLU Join Forces to Fight NSA Spying Program
Posted by Brian in News, Threat Watch on 8/Sep/2013 08:59
From Reuters:
In a brief backing the American Civil Liberties Union’s lawsuit against senior U.S. government officials, the NRA said the collection of vast communications threatens privacy and could allow the government to create a registry of gun owners.
NSA Targeted TOR Network With Malware
Posted by Brian in Comms, News, Threat Watch on 8/Aug/2013 13:06
From BoingBoing.net:
Initial investigations traced the address to defense contractor SAIC, which provides a wide range of information technology and C4ISR (Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance) support to the Department of Defense. The geolocation of the IP address corresponds to an SAIC facility in Arlington, Virginia.
Andriod Backup Services May Not Be Secure
If you use an Android device you may want to review how you store your settings and passwords.
From the Electronic Frontier Foundation:
If you have a recent Android phone or tablet, chances are you take advantage of a convenient feature to backup your application settings and wireless network passwords. This feature is enabled by default in Android 2.2 and later, and it can make switching to a new device or replacing a lost phone a quicker process. If you haven’t examined all the settings for your phone, you might not know if this setting is enabled.
Rep. Waxman (D-CA) Wants to Ban Individuals From Making Their Own Guns.
Posted by Brian in Law, News, Threat Watch on 18/Jul/2013 12:38
From LA’s NBC affiliate:
The mass shooting that left five people dead in Santa Monica is the reason a California congressman wants to make it illegal for people to buy parts on the Internet to build their own weapons.
Creating and Managing Passwords: How the Experts Do It
Posted by Brian in Comms, Opinion, Threat Watch on 15/Jul/2013 12:12
From Ars Technica:
I recently checked in with five security experts to learn about their approach to choosing and storing crack-resistant passwords. They include renowned cryptographer Bruce Schneier, who is a “security futurologist” at BT and recently joined the Electronic Frontier Foundation’s board of directors; Adriel T. Desautels, CEO of Netragard, a firm that gets paid to hack large companies and then tell them how it was done; Jeremiah Grossman, founder and CTO of WhiteHat Security; Jeffrey Goldberg, “defender against the dark arts” at AgileBits, a company that develops the popular 1Password password manager; and Jeremi Gosney, a password security expert at Stricture Consulting.
Anonymity Impossible?
Posted by Brian in Law, News, Threat Watch on 16/May/2013 08:00
MIT asks the question in an article about how much information individuals create about themselves.
Much of this data is invisible to people and seems impersonal. But it’s not. What modern data science is finding is that nearly any type of data can be used, much like a fingerprint, to identify the person who created it: your choice of movies on Netflix, the location signals emitted by your cell phone, even your pattern of walking as recorded by a surveillance camera. In effect, the more data there is, the less any of it can be said to be private, since the richness of that data makes pinpointing people “algorithmically possible,†says Princeton University computer scientist Arvind Narayanan.
Dept. of State Takes Down DEFCAD Gun Files
Posted by Brian in Law, News, Threat Watch on 10/May/2013 15:21
The Blaze reports that the Department of State has claimed ownership of the information which Defense Distributed had on its website.
A letter to Defense Distributed from the Department of State, Bureau of Political Military Affairs, Office of Defense Trade Controls Compliance, Enforcement Division (DTCC/END) explains that while conducting a review of the data posted on DEFCAD it found that the licensed firearm manufacturer might have released ITAR (International Traffic in Arms Regulations)-controlled information without authorization and would thus be in violation.
Technology vs Security
Posted by Brian in Opinion, Threat Watch on 19/Mar/2013 08:22
From Wired:
Because the damage attackers can cause becomes greater as technology becomes more powerful. Guns become more harmful, explosions become bigger, malware becomes more pernicious … and so on. A single attacker, or small group of attackers, can cause more destruction than ever before.
As the destructive power of individual actors and fringe groups increases, so do the calls for — and society’s acceptance of — increased security.