- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged security
Protecting Your Home While You’re Traveling
Posted by Brian in Opinion, Threat Watch on 24/Jul/2011 09:52
How To Think About Security
Posted by Brian in Opinion, Threat Watch, Training on 5/May/2011 15:43
Bruce Schneier gives an excellent presentation on how security affects us and how we think about it.
USB Drives left at Dry Cleaners on the Rise
Posted by Gary in Comms, News, Threat Watch on 25/Mar/2011 14:59
Encrypt your USB Drives
From: SC Magazine UK
A survey of dry cleaners in the UK has found that more than 17,000 USB sticks were left behind in 2010.
More than 500 dry cleaners and launderettes in the UK were asked during December 2010 and January 2011 about removable media that was left behind. Estimated figures suggested that there was an increase on the number of USB sticks left in dry cleaners of more than 400 per cent when compared with figures from 2009, and almost double from what was found in 2008.
…With the best intentions in the world, the reality is devices are often left behind and the information they contain could be devastating if disclosed. Organizations need to plan for this when developing their security strategies.â€
GovSec 2011: March 29-30
Posted by Gary in Threat Watch, Training on 9/Mar/2011 14:48
The Government Security Expo and Conference
Tuesday – Wednesday, March 29-30, 2011
Washington D.C.
Gain valuable insights into key issues central to the protection of our nation through in-depth conference sessions and conference-only keynote addresses.
GovSec, The Government Security Expo and Conference, features an exposition with a full spectrum of physical, IT and cybersecurity solutions, alongside wireless and mobility communications equipment for federal, state and local governments. GovSec is a one-of-a-kind event that unites thousands of professionals tasked with securing our homeland, from the decision-makers at the federal level to the first responders, firefighters and police officers responding to catastrophic events in their hometown and every government security professional in between.  Attendance to the exposition is free for government, military, law enforcement and first responders as well as industry — new this year!
GovSec is co-located with U.S. Law, the U.S. Law Enforcement Conference and Exposition for federal, state and local law enforcement.
Complimentary Training for CISSP and Security Clearance
From: University of Fairfax
Federal agencies and contractors need CISSP certified and cleared cyber security professionals. Don’t miss out! Earn your CISSP and get your Security Clearance in 2011 and watch your cyber security career take off! Attend a complimentary:
– CISSP Exam Prep Clinic and
– Security Clearance Workshop
at GOVSEC 2011 Thursday March 31, 2011. Seating is limited…
Congressional Security and the Tucson Shooting
Posted by Brian in Opinion, Threat Watch on 13/Jan/2011 15:15
Congressional Security and the Tucson Shooting is republished with permission of STRATFOR.
By Fred Burton and Sean Noonan
Following the Jan. 8 shooting of U.S. Rep. Gabrielle Giffords, Federal District Judge John McCarthy Roll and 17 others in Tucson, Arizona, discussion has focused on the motivations and ideology of the accused shooter, Jared Loughner. While it was important to make a quick assessment of Loughner’s profile in order to evaluate the possibility of an organized threat, all the available evidence (though not conclusive) indicates that he acted alone.
For the most part, discussion of the event has not touched on a re-evaluation of security for members of Congress. STRATFOR has previously analyzed the issues surrounding presidential security, and while there are common concerns in protecting all branches of government, Congress and the judiciary involve much larger numbers of people — 535 representatives and senators and more than 3,000 federal judges. And members of Congress put a high priority on public accessibility, which makes them more vulnerable.
A common mindset of politicians and their staffers is that better security will limit their accessibility and thus hinder their ability to do their job (and win elections). In fact, there are a number of measures that members of Congress and other public officials can institute for better security without limiting accessibility. While staying in a secure facility would be the safest, it isn’t a realistic option. What is realistic — and effective — is the prudent employment of protective intelligence as well as some measure of physical protection on the move. Read the rest of this entry »
China and its Double-edged Cyber-sword
Posted by Brian in Comms, Threat Watch on 10/Dec/2010 09:25
China and its Double-edged Cyber-sword is republished with permission of STRATFOR.
By Sean Noonan
A recent batch of WikiLeaks cables led Der Spiegel and The New York Times to print front-page stories on China’s cyber-espionage capabilities Dec. 4 and 5. While China’s offensive capabilities on the Internet are widely recognized, the country is discovering the other edge of the sword.
China is no doubt facing a paradox as it tries to manipulate and confront the growing capabilities of Internet users. Recent arrests of Chinese hackers and People’s Liberation Army (PLA) pronouncements suggest that China fears that its own computer experts, nationalist hackers and social media could turn against the government. While the exact cause of Beijing’s new focus on network security is unclear, it comes at a time when other countries are developing their own defenses against cyber attacks and hot topics like Stuxnet and WikiLeaks are generating new concerns about Internet security.
One of the U.S. State Department cables released by WikiLeaks focuses on the Chinese-based cyber attack on Google’s servers that became public in January 2010. According to a State Department source mentioned in one of the cables, Li Changchun, the fifth highest-ranking member of the Communist Party of China (CPC) and head of the Party’s Propaganda Department, was concerned about the information he could find on himself through Google’s search engine. He also reportedly ordered the attack on Google. This is single-source information, and since the cables WikiLeaks released do not include the U.S. intelligence community’s actual analysis of the source, we cannot vouch for its accuracy. What it does appear to verify, however, is that Beijing is regularly debating the opportunities and threats presented by the Internet. Read the rest of this entry »
Guard Force Marines Make Security a Priority at Geronimo
Posted by Jack Sinclair in News, Warriors on 3/Oct/2010 23:28
LastPass Vetted by Steve Gibson of GRC
LastPass is a cross-platform ( Windows, Mac, Linux, iPhone, BlackBerry, Android) password manager and multi-factor authentication tool. I have been using it in a limited test for almost a year now and I am very pleased to say that my confidence in the security of this system is high and I am adopting it as my go-to application for managing secure passwords and for multi-factor authentication. There is a free version with almost all the functionality. This is a well thought out system.
Steve Gibson of GRC.com and the Security Now podcast goes into some detail about the LastPass CRYPTO and why this is a secure and redundant system in the podcast linked bellow . The real meat isn’t until about the 53rd minute so fast forward if you find yourself nodding off in the first part of the show.
Here is a transcript of the show.
Cyber Security Summit
Posted by Gary in Comms, Threat Watch on 14/Aug/2010 12:51
4th Cyber Security Summit
September 20 – 22, 2010, Sheraton Premiere at Tysons Corner Hotel, Vienna, VA
Smartphones, Jailbreaking and the New Battle Front for Enterprise Security
From: IDGA
… So why is this so bad? First and foremost jailbreaking is a hack! Users are inviting a third party developer to hack your device. Plain and simple. Most recent versions of these tools are able to run over a simple webpage that is exploiting a few unpatched vulnerabilities in the smart phone operating system code. This risk was exposed last year when a worm “rick rolled” jailbroken iPhone users, exploiting a default password setting in secure shell daemon installed as part of the jailbreaking process.
Stratfor Security
Posted by Brian in Threat Watch on 19/Jan/2010 18:07
Stratfor is a global intelligence network and here is their take on airline security.