- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged security
Drone Video Unencrypted
Posted by Brian in News, Threat Watch, Warriors on 9/Nov/2012 08:22
From Danger Room:
Four years after discovering that militants were tapping into drone video feeds, the U.S. military still hasn’t secured the transmissions of more than half of its fleet of Predator and Reaper drones, Danger Room has learned. The majority of the aircraft still broadcast their classified video streams “in the clear†— without encryption. With a minimal amount of equipment and know-how, militants can see what America’s drones see.
Scam Alerts
Posted by Brian in News, Threat Watch on 25/Oct/2012 02:56
FBI: Smartphone Malware Safety Tips
Posted by Brian in Comms, News, Threat Watch on 13/Oct/2012 03:28
Internet Crime Complaint Center (IC3) | Smartphone Malware Safety Tips
The IC3 has been made aware of various malware attacking Android operating systems for mobile devices. Some of the latest known versions of this type of malware are Loozfon and FinFisher. Loozfon is an information-stealing piece of malware. Criminals use different variants to lure the victims.
US Drones Susceptible to Hacking
Posted by Brian in News, Threat Watch on 2/Oct/2012 08:39
From Wired’s Threat Watch:
The Government Accountability Office is warning Congress that its push for drones to become commonplace in U.S. airspace fails to take into account concerns surrounding privacy, security and even GPS jamming and spoofing.
FBI Computer Scam Alert
Posted by Brian in News, Threat Watch on 22/Sep/2012 01:51
Computer Virus: Reveton Ransomware
Posted by Brian in News, Threat Watch on 13/Aug/2012 13:01
A new Internet virus is holding computers hostage across the United States and beyond.
– FBI, This Week
New Malware Goes After Financial Information
Posted by Brian in Comms, News, Threat Watch on 10/Aug/2012 16:56
CNET reports on the new Gauss malware tool:
Gauss has unique characteristics relative to other malware. Kaspersky said it found Gauss following the discovery of Flame. The International Telecommunications Union has started an effort to identify emerging cyberthreats and mitigate them before they spread.
Smartphones Leak Encryption
Posted by Brian in Gear, News, Threat Watch on 7/Mar/2012 19:26
Technology Review reports that an attacker my be able to pick up encryption keys from cellphones with a TV antenna:
The antenna was detecting radio signals “leaking” from the transistors on the chip inside the phone performing the encryption calculations. Transistors leak those signals when they are active, so the pattern of signals from a chip provides an eavesdropper a representation of the work the chip is doing. When Kenworthy tuned his equipment to look in the right place, a clear, regular pattern of peaks and troughs appeared on his computer screen. They could be seen to come in two varieties, large and small, directly corresponding to the string of digital 1s and 0s that make up the encryption key.
Web Links Could Compromise Your Smartphone
Technology Review reports that if you have a smartphone that runs a version of Android, be careful about the links you click:
A chilling demonstration to a small, packed room at the RSA security conference today showed how clicking a single bad Web link while using a phone running Google’s Android operating system could give an attacker full remote control of your phone.
U.S. and U.K. Counter Terror Expos
Posted by Brian in News, Threat Watch on 23/Feb/2012 08:39
U.S. – Washington, D.C. May 16-17, 2012
U.K. – Olympia, London April 25-26, 2012
Counterterrorism & Security Education and Research Foundation
Posted by Brian in Threat Watch, Warriors on 22/Feb/2012 13:49
CTSERF is a not-for-profit organization dedicated to understanding all facets of terrorism.
LAPD Bails on Google Apps Because of Security & Privacy Concerns
Posted by Gary in Comms, News, Threat Watch on 16/Dec/2011 14:23
From: Cloudline
Microsoft’s Office 365 isn’t the only cloud service losing high-profile customers to security and privacy concerns. Google got a dose of the same medicine on Wednesday, with the LA Timesreporting that the LAPD is now backing out of its contract with Google so it can stick with its on-premises Novell platform for e-mail.
The LAPD and the city attorney’s office ultimately decided, some two years after deciding to move their e-mail systems to the cloud in order to save costs, that no cloud computing solution is really compatible with the federal security guidelines that the departments are required to follow.
“It will be difficult for law enforcement to move to a cloud solution until the [security requirements] and cloud are more in line with each other,†LAPD’s CIO told the LA Times.
Situational Awareness: How Everyday Citizens Can Help Make a Nation Safe
Posted by Brian in News, Threat Watch on 12/Aug/2011 13:56
Situational Awareness: How Everyday Citizens Can Help Make a Nation Safe is republished with permission of STRATFOR.
By Scott Stewart
Last week’s Security Weekly discussed the important role that grassroots defenders practicing situational awareness play in defending against terrorist attacks by individuals and small cells, what we refer to as grassroots militants. Anyone who reads STRATFOR’s security and terrorism material for any length of time will notice that we frequently mention the importance of situational awareness. The reason we do so, quite simply, is that it works. Situational awareness is effective in allowing people to see potential threats before — and as — they develop. This allows potential victims to take proactive measures to avoid a perceived threat, and it enables them or other observers to alert authorities.
While threats can emanate from a number of very different sources, it is important to recognize that terrorist attacks — and other criminal acts, for that matter — do not materialize out of thin air. In fact, quite the opposite is true. Terrorists and other criminals follow a process when planning their actions, and this process has several distinct steps. The process has traditionally been referred to as the “terrorist attack cycle,†but if you look at the issue thoughtfully, it becomes apparent that the same steps apply to nearly all crimes. Of course, the steps in a complex crime like a kidnapping or car bombing are far more involved than the steps in a simple crime such as purse-snatching or shoplifting, where the steps can be completed quite rapidly. Nevertheless, the same general steps are usually followed.
People planning attacks are vulnerable to detection during various phases of this process, and observant people can often spot such attacks developing. Therefore, situational awareness serves as one of the key building blocks of effective personal security, and when practiced collectively, national security. Since situational awareness is so important, we thought it would be helpful to once again discuss the subject in detail and provide a guide that can help describe what situational awareness is and explain how it can be practiced at a relaxed, sustainable level. Read the rest of this entry »