Drones - Countering Criminal Usage

Tri, Quad, Hexa and Octocopters. Multi-rotor micro copters are so numerous and advanced, that they are in use by criminal elements for various purposes. Their utility will expand along with criminal creativity. Imagine our government’s “official” uses:

Gathering information from hacking into private WiFi networks Spoofing cell towers to snoop on cell phone conversations and text exchanges Spying on private on-goings Listening in via microphone Assaulting with lights, tazers, guns and flash-bang grenades Starting fires Illuminating dark areas Infiltrating buildings,

Continue reading Drones – Countering Criminal Usage

The Drone Wars - Data Thieves

In others articles we’ve published, we shared with you the existence of data-stealing technology mounted on drones. The most common of all communications methods used at fixed locations is a WiFi network. With specialized equipment, Data Thieving Drones can hack into your communications stream and see all that you see. Add to that, Persistent Perch capability, and a network spook can nab your bits and bytes for a very long length of time.

Defending against these things is a wide

Continue reading The Drone Wars – Data Thieves

SmartPhone Preps /Apps - Guest Post from Jerry D Young

My thoughts on Smartphone Preps from a presentation I did for one of the local prep groups I am with.

This presentation is based on my experiences with the Samsung Galaxy S 4 Android Smartphone. The concepts and ideas will relate to other Android and Apple electronic platforms, but specifics will be different depending on the capability of the individual phone and which carrier is being used.

In no way do I want to imply that you depend solely on

Continue reading SmartPhone Preps /Apps – Guest Post from Jerry D Young

Seems Data-Thieves cracked WPA-2

The most secure of personal wireless security password protocols has been hacked. WPA-2, the best choice for general home wireless network security, seems to have been cut to pieces. In this article by phys.org, we read:

Now, a new study published in the International Journal of Information and Computer Security, reveals that one of the previously strongest wireless security systems, Wi-Fi protected access 2 (WPA2) can also be easily broken into on wireless local area networks (WLANs). The researchers have

Continue reading Seems Data-Thieves cracked WPA-2

Data-Thieving Drones

And you thought only the NSA was snooping at your window. Forget, for the moment, the

Picture from heliguy.com

drone /UAV aspect of this story. Consider that the technology for hacking your Wi-Fi network exists in great abundance, and data-thieves everywhere would love to get a peek at your network data streams. Imagine a world where the guy a few booths over inside your favorite coffee hangout is a thief. His pal behind you, too. It isn’t enough that

Continue reading Data-Thieving Drones

US to Give Up Control of the Internet

Or, will give up what control it has left.

I remember the days of slow dial-up network access with fondness on one level – a private network. When Prodigy and Promenade were pretty much the big guys as far as inter-connectivity among the masses. You became a member, and then could network with people anywhere on the system. Promenade later became America Online, or AOL. Each system had its own closed network, services, communities, downloads games and chatrooms. It was

Continue reading US to Give Up Control of the Internet

50 Page Catalog of Equipment and Techniques for Government Hackers

Copied it full from ZeroHedge. If the ZeroHedgers have an issue with it, I’ll remove it.

Submitted by Tyler Durden on 12/29/2013 15:39 -0500

The NSA’s 50-Page Catalog Of Back Door Penetration Techniques Revealed

While the world may have become habituated to (and perhaps revels in, thank you social media exhibitionist culture) the fact that the NSA is watching anyone and everyone, intercepting, recording, and hacking every electronic exchange regardless if it involves foreign “terrorists” or US housewives, the discoveries

Continue reading 50 Page Catalog of Equipment and Techniques for Government Hackers

Information Security - Update

Well, the argument on the forums concerning the NSA’s ability to crack e-mail encryption seems to have been resolved.

They can.

The agency has fulfilled a decades-long quest to break the encryption of e-mail, online purchases, electronic medical records and other Web activities, the New York Times, the U.K.’s Guardian and ProPublica reported yesterday. The NSA also has been given access to — or found ways to enter — databases of major U.S. Internet companies operating the most popular e-mail

Continue reading Information Security – Update

Did Yesterday's Amber Alert Spook You?

Many Californians were shocked out of their seats and beds yesterday and early this morning when the first ever Amber Alert via iPhone went out. It was preceded by a very ominous alert, much like a danger signal or warning. If you were a participant in this event, and would rather not participate in another, you can turn off the alert in your iPhone.

Touch “Settings” and then “Notifications”. Scroll to the bottom of that screeen and you will see

Continue reading Did Yesterday’s Amber Alert Spook You?

Government Assisted Identity Theft

As if hacked government databases haven’t already place our personal information at risk, here is news of another problem that promises to be the biggest yet.

The information database necessary for the Health Care exchanges to operate has NOT passed security testing. It will be the world’s largest and most complete storehouse of personal information ever. It will be the target of hackers large and small, government and geek, and the attacks will be round the clock.

Our people can’t

Continue reading Government Assisted Identity Theft

Follow us on ...


ASP Store

Browse our store to see things we use, or recommend. It is one way to review items you may want in your preps inventory.

Monthly Archives