At Least 3 Ways to Hack a Police Body Camera

As the public and police rush to embrace body cams, they may have overlooked a key point. What about security? Can body cameras be hacked? If they can, what would be the results? These questions only raise more questions about these cameras. The first, and possibly the most important question, must be; who would control … Continue reading At Least 3 Ways to Hack a Police Body Camera

Part 2: How the DEA Brought Down Silk Road and How Silk Road Brought Down Two DEA Agents

In April 2013, Ross Ulbricht encountered DeathfromAbove. Apparently, Force, no doubt inspired by the ease with which he conned Ulbricht out of $80,000 and realizing his newly acquired power over Ulbricht due to the murder-for-hire scheme, had devised another, novel, money-making idea. For this new scam, he created, yet, another persona with the apocalyptic name, … Continue reading Part 2: How the DEA Brought Down Silk Road and How Silk Road Brought Down Two DEA Agents

How the DEA Took Down Silk Road and How Silk Road Took Down Two DEA Agents (Part 1)

Carl Mark Force was not a poor man. Many would be happy making $150,000 a year, but not DEA investigator Carl Mark Force. He wanted money and that got him into trouble. Then, he wanted to cover up the fact that he wanted money, and that got him into even more trouble. The documents that … Continue reading How the DEA Took Down Silk Road and How Silk Road Took Down Two DEA Agents (Part 1)

Corporate Leaders Urge Government to Adopt Paradigm-Shifting Security Architecture

“Any Fortune 500 company that has a CIO, ought to have a CSO”, so said the former president of Lockheed Martin and General Motors International Operations, Lou Hughes, in a recent Fox News interview. Hughes’ words should not be taken lightly. Unlike other corporate leaders who routinely pay lip service to cyber security, Hughes has … Continue reading Corporate Leaders Urge Government to Adopt Paradigm-Shifting Security Architecture

Email Scams, Tricks, Hacks, Cheats, and Tweaks That Everyone Should Know

If you get an email from yourself that you never wrote, it doesn’t mean you’ve sent yourself an email from another dimension. It most likely means you are a victim of email spoofing. Yes, it has your email address as the sender and it may look convincing, but unless you are suffering from a split … Continue reading Email Scams, Tricks, Hacks, Cheats, and Tweaks That Everyone Should Know

Employee Freedom vs. Company Security: New Architecture Finally Solves the Basic BYOD Dilemma

Companies need it. Employees want it. Hackers love it. BYOD (Bring Your Own Device) seems to have something for everyone. Companies like the idea that employees are, at least in principle, available to work 24/7. Employees like the freedom BYOD gives them. They can work from anywhere and plan their time in a way that’s … Continue reading Employee Freedom vs. Company Security: New Architecture Finally Solves the Basic BYOD Dilemma