Monthly Archives: April 2015

At Least 3 Ways to Hack a Police Body Camera

As the public and police rush to embrace body cams, they may have overlooked a key point. What about security? Can body cameras be hacked? If they can, what would be the results? These questions only raise more questions about … Continue reading

Posted in Uncategorized | Tagged , , | 2 Comments

Part 2: How the DEA Brought Down Silk Road and How Silk Road Brought Down Two DEA Agents

In April 2013, Ross Ulbricht encountered DeathfromAbove. Apparently, Force, no doubt inspired by the ease with which he conned Ulbricht out of $80,000 and realizing his newly acquired power over Ulbricht due to the murder-for-hire scheme, had devised another, novel, … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

How the DEA Took Down Silk Road and How Silk Road Took Down Two DEA Agents (Part 1)

Carl Mark Force was not a poor man. Many would be happy making $150,000 a year, but not DEA investigator Carl Mark Force. He wanted money and that got him into trouble. Then, he wanted to cover up the fact … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Corporate Leaders Urge Government to Adopt Paradigm-Shifting Security Architecture

“Any Fortune 500 company that has a CIO, ought to have a CSO”, so said the former president of Lockheed Martin and General Motors International Operations, Lou Hughes, in a recent Fox News interview. Hughes’ words should not be taken … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Email Scams, Tricks, Hacks, Cheats, and Tweaks That Everyone Should Know

If you get an email from yourself that you never wrote, it doesn’t mean you’ve sent yourself an email from another dimension. It most likely means you are a victim of email spoofing. Yes, it has your email address as … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Employee Freedom vs. Company Security: New Architecture Finally Solves the Basic BYOD Dilemma

Companies need it. Employees want it. Hackers love it. BYOD (Bring Your Own Device) seems to have something for everyone. Companies like the idea that employees are, at least in principle, available to work 24/7. Employees like the freedom BYOD … Continue reading

Posted in Uncategorized | Tagged , | Leave a comment