Security Technology

Invisible Code

Earlier this month, NSA employee Ms. Reality Winner was found distributing a printed copy of sensitive information to the publication Intercept.  Although the NSA did not verify the exact means by which they were able to determine that it was Ms. Winner who printed the document, one possible way is via micro dots.   The…

Read More

More Things, More Trouble

The Internet of things (IoT) is (Wiki definition) the inter-networking of physical devices, vehicles (also referred to as “connected devices” and “smart devices”), buildings, and other items—embedded with electronics, software, sensors, actuators, and network connectivity that enable these objects to collect and exchange data.   Last weekend, when I finally bought home security cameras whose…

Read More

The USS Zumwalt

I had the pleasure of speaking with retired Lt. Col. James Zumwalt about the USS Zumwalt DDG 1000, commissioned in honor of his father Admiral Elmo R. Zumwalt.  Launched October 28, 2013, christened in April 2014, the USS Zumwalt has since undergone sea trials and will be officially commissioned in a ceremony taking place in…

Read More

Iron Dome

The tools of terrorism that aim to threaten citizens range from a knife attack on pedestrians to an IED planted at a train station to rockets directed into populated communities.  As for rockets, during 2006, an estimated 4,000 landed in Israel fired from Lebanon by Hezbollah.  Between 2000 and 2008, 8,000 Grads, Qassams and mortar…

Read More

The i-Spat

At first, the battle between Apple and the FBI seemed straightforward. The FBI wanted the phone used by terrorist Syed Rizwan Farook who with his wife killed 14 people in San Bernardino last December, to be opened in order to retrieve forensic data. Surely law enforcement agencies often find themselves with a piece of technology,…

Read More

Drones

This summer, an 18 year old from Clinton, Connecticut built a drone mounted with a gun that he was able to shoot via remote control. His YouTube video showed it hovering and shooting off 4 rounds.  It allegedly got 2.5 million views (see video below). The local police expressed concern for public safety but noted…

Read More

Robot Force

As much as we promote the importance of the human element in security, how critical our cognitive abilities are in identifying and assessing threat … there is something just plain cool about robots. Robots have moved off the pages of novels and movie screens into our daily lives in a way many would not have…

Read More

Mobile Security Woes

Checkpoint is a billion dollar, international IT security software company offering products for network, cloud, data and mobile security.  Their Third Annual Mobile Security Survey was just published last week.  The survey queried nearly 800 IT professionals in the U.S., Australia, Canada, Germany, and United Kingdom.   Mobile continues to proliferate on all fronts both…

Read More

Fleas, Please

Quite a few years back, I took a rare vacation abroad to France for a leisurely cruise through Burgundy. The weather was fine, the food divine and then, I went shopping. Confidently, I pulled out my U.S. credit card. The cashier examined it suspiciously and then asked (here I translate) did I not have a…

Read More

ID Checker in your Pocket

In the last ten years, forty million travel documents have been reported lost or stolen. In 2013, almost 10,000 people crossing EU borders were found using false or stolen documents. The numbers of people seeking asylum is staggering and circumstances in the countries from which they flee are often such that they cannot do so…

Read More