Last Week's Chinese Hack of Federal Employee Info

The bold and successful hack of our Federal Employee database is a BIG DEAL. I’m sure you’ve heard that this information can be used for:

phishing schemes identity theft credit attacks e-mail hacks blackmail collection of further, more important and damaging information

In order to fully comprehend the importance of this effort, we have to look at what was done, and what can happen as a result.

Personal information regarding current and past employee identities was stolen. This information give

Continue reading Last Week’s Chinese Hack of Federal Employee Info

Police Tech can be Perp Tech

When I see news about “official” law enforcement or agency incorporation of spy tech into their routines, I get a bit uneasy. Not because I have “anything to hide”, but because I have “everything to hide.”

“Huh? What do you mean?”

Here’s what I mean. If I have property that I’d rather not show the world, it’s MY RIGHT to keep it to myself – from everyone. I owe no one any knowledge of my life behind my walls. I

Continue reading Police Tech can be Perp Tech

Drones - Countering Criminal Usage

Tri, Quad, Hexa and Octocopters. Multi-rotor micro copters are so numerous and advanced, that they are in use by criminal elements for various purposes. Their utility will expand along with criminal creativity. Imagine our government’s “official” uses:

Gathering information from hacking into private WiFi networks Spoofing cell towers to snoop on cell phone conversations and text exchanges Spying on private on-goings Listening in via microphone Assaulting with lights, tazers, guns and flash-bang grenades Starting fires Illuminating dark areas Infiltrating buildings,

Continue reading Drones – Countering Criminal Usage

The Drone Wars - Data Thieves

In others articles we’ve published, we shared with you the existence of data-stealing technology mounted on drones. The most common of all communications methods used at fixed locations is a WiFi network. With specialized equipment, Data Thieving Drones can hack into your communications stream and see all that you see. Add to that, Persistent Perch capability, and a network spook can nab your bits and bytes for a very long length of time.

Defending against these things is a wide

Continue reading The Drone Wars – Data Thieves

SmartPhone Preps /Apps - Guest Post from Jerry D Young

My thoughts on Smartphone Preps from a presentation I did for one of the local prep groups I am with.

This presentation is based on my experiences with the Samsung Galaxy S 4 Android Smartphone. The concepts and ideas will relate to other Android and Apple electronic platforms, but specifics will be different depending on the capability of the individual phone and which carrier is being used.

In no way do I want to imply that you depend solely on

Continue reading SmartPhone Preps /Apps – Guest Post from Jerry D Young

Seems Data-Thieves cracked WPA-2

The most secure of personal wireless security password protocols has been hacked. WPA-2, the best choice for general home wireless network security, seems to have been cut to pieces. In this article by, we read:

Now, a new study published in the International Journal of Information and Computer Security, reveals that one of the previously strongest wireless security systems, Wi-Fi protected access 2 (WPA2) can also be easily broken into on wireless local area networks (WLANs). The researchers have

Continue reading Seems Data-Thieves cracked WPA-2

Data-Thieving Drones

And you thought only the NSA was snooping at your window. Forget, for the moment, the

Picture from

drone /UAV aspect of this story. Consider that the technology for hacking your Wi-Fi network exists in great abundance, and data-thieves everywhere would love to get a peek at your network data streams. Imagine a world where the guy a few booths over inside your favorite coffee hangout is a thief. His pal behind you, too. It isn’t enough that

Continue reading Data-Thieving Drones

US to Give Up Control of the Internet

Or, will give up what control it has left.

I remember the days of slow dial-up network access with fondness on one level – a private network. When Prodigy and Promenade were pretty much the big guys as far as inter-connectivity among the masses. You became a member, and then could network with people anywhere on the system. Promenade later became America Online, or AOL. Each system had its own closed network, services, communities, downloads games and chatrooms. It was

Continue reading US to Give Up Control of the Internet

50 Page Catalog of Equipment and Techniques for Government Hackers

Copied it full from ZeroHedge. If the ZeroHedgers have an issue with it, I’ll remove it.

Submitted by Tyler Durden on 12/29/2013 15:39 -0500

The NSA’s 50-Page Catalog Of Back Door Penetration Techniques Revealed

While the world may have become habituated to (and perhaps revels in, thank you social media exhibitionist culture) the fact that the NSA is watching anyone and everyone, intercepting, recording, and hacking every electronic exchange regardless if it involves foreign “terrorists” or US housewives, the discoveries

Continue reading 50 Page Catalog of Equipment and Techniques for Government Hackers

Information Security - Update

Well, the argument on the forums concerning the NSA’s ability to crack e-mail encryption seems to have been resolved.

They can.

The agency has fulfilled a decades-long quest to break the encryption of e-mail, online purchases, electronic medical records and other Web activities, the New York Times, the U.K.’s Guardian and ProPublica reported yesterday. The NSA also has been given access to — or found ways to enter — databases of major U.S. Internet companies operating the most popular e-mail

Continue reading Information Security – Update

Monthly Archives