- Comms
- Law
- Medic
- News
- Opinion
- Threat Watch
- Training
- Warrior Tools
- Accessories
- Ammo
- Body Armor
- Books
- Clothing
- Commo
- Gear
- Handguns
- Holsters
- Knives
- Long Guns
- ACC
- Accuracy International
- Barrett
- Benelli
- Beretta
- Blaser
- Bushmaster
- Custom
- CZ
- Desert Tactical Arms
- DPMS
- FN
- Forums
- HK
- IWI
- Kel-Tec Long Guns
- LaRue
- LWRC
- McMillan
- Mosin Nagant
- Mossberg
- Para
- Remington
- Rock River Arms
- Ruger Long Guns
- Sabre Defense
- Sako
- SIG Sauer
- SKS
- Smith & Wesson Long Guns
- Springfield
- Styer
- Weatherby
- Wilson Combat
- Winchester
- Magazines
- Maintenance
- Navigation
- Optics
- Sights
- Tech
- Warriors
Posts Tagged technology
Rep. Waxman (D-CA) Wants to Ban Individuals From Making Their Own Guns.
Posted by Brian in Law, News, Threat Watch on 18/Jul/2013 12:38
From LA’s NBC affiliate:
The mass shooting that left five people dead in Santa Monica is the reason a California congressman wants to make it illegal for people to buy parts on the Internet to build their own weapons.
Creating and Managing Passwords: How the Experts Do It
Posted by Brian in Comms, Opinion, Threat Watch on 15/Jul/2013 12:12
From Ars Technica:
I recently checked in with five security experts to learn about their approach to choosing and storing crack-resistant passwords. They include renowned cryptographer Bruce Schneier, who is a “security futurologist” at BT and recently joined the Electronic Frontier Foundation’s board of directors; Adriel T. Desautels, CEO of Netragard, a firm that gets paid to hack large companies and then tell them how it was done; Jeremiah Grossman, founder and CTO of WhiteHat Security; Jeffrey Goldberg, “defender against the dark arts” at AgileBits, a company that develops the popular 1Password password manager; and Jeremi Gosney, a password security expert at Stricture Consulting.
New Software Designed to Prevent 3D Printing of Firearms
From ArsTechnica:
On Tuesday, Create it Real announced that in the coming months its software would include an option to find and block gun parts. When it detects a file that contains firearm parts, the software will shut down and disallow printing. Create it Real’s software will likely be licensed to 3D printer manufacturers for around “several thousand euros annually” and then bundled with a 3D printer sold to individual consumers.
New Night Vision With Heads Up Display
Posted by Brian in Comms, News, Optics, Warrior Tools on 25/May/2013 08:17
ITT Exelis has developed a new night vision goggle. From KitUp:
“You can have a heads up display inside the goggle which can be maps, images or GPS coordinates. You can configure it for text messages. This is a multi-faceted device. It allows us to take night vision technology and connect it to a tactical network…”
Tracking Point Rifle System
It seems that this has the potential to be more dangerous than single shot plastic guns. With this system it looks like someone with no shooting experience could pick up this rifle and be extremely deadly. That said, in a free society plastic guns and point-and-shoot rifles should not be a concern to anyone. The pros outweigh the cons.
Dept. of State Takes Down DEFCAD Gun Files
Posted by Brian in Law, News, Threat Watch on 10/May/2013 15:21
The Blaze reports that the Department of State has claimed ownership of the information which Defense Distributed had on its website.
A letter to Defense Distributed from the Department of State, Bureau of Political Military Affairs, Office of Defense Trade Controls Compliance, Enforcement Division (DTCC/END) explains that while conducting a review of the data posted on DEFCAD it found that the licensed firearm manufacturer might have released ITAR (International Traffic in Arms Regulations)-controlled information without authorization and would thus be in violation.
Technology vs Security
Posted by Brian in Opinion, Threat Watch on 19/Mar/2013 08:22
From Wired:
Because the damage attackers can cause becomes greater as technology becomes more powerful. Guns become more harmful, explosions become bigger, malware becomes more pernicious … and so on. A single attacker, or small group of attackers, can cause more destruction than ever before.
As the destructive power of individual actors and fringe groups increases, so do the calls for — and society’s acceptance of — increased security.
Groupon Cancels Conceled Carry Deals
3D Printed Magazines
You can’t stop innovation:
Steganography
Posted by Brian in News, Threat Watch on 16/Jan/2013 08:44
Article from SOFREP about how terrorist organizations are hiding and transmitting information:
In the digital world the most common form of steganography is embedding information in media files. Media files are rather large, so a little data padding isn’t as noticeable. They are also created with layers of information, which allows the embedding of other data into a layer, and keeps it obscured behind preceding layers – kind of like slipping a tiny, extra piece of cheese into a dagwood sandwich.
Israel Cyber Security Summit
From Defense Update:
Since the creation of cyberspace and the internet Israeli security experts and scientists have positioned the country at the forefront of cyber defense, developing everything from the basic building blocks of network security, data encryption and information protection to integrated system providing monitoring, simulation and rapid response in the event of cyber attacks. The Israeli government has recently established a national cyber center, with the goals to coordinate the research, development, legislation and preparedness among the academy, private and public sector, to enhance the protection and minimize vulnerability of the country’s commercial, industrial and public sector to hacking, cyber crime and cyber attacks.
FBI Science and Technology Branch Website
With about 4,500 highly trained professionals in a wide range of disciplines, the Science and Technology Branch supports the FBI mission—along with the U.S. intelligence and law enforcement communities—by creating, adapting, and deploying state-of-the-art tools and techniques to collect, analyze, and share information and evidence.