Tag Archives: Security

Red Teaming and the Adversarial Mindset: Have a Plan, Backup Plan and Escape Plan

Recently, I attended a fascinating class given in San Francisco by fellow ITS Tactical contributor and author of the Red Teams… View Article

Posted in Security | Tagged , , , , , , , , , , , , , , , , , , , , , , , , | 4 Comments

Protecting Your Identity on the Internet – Part 1: Fighting Data Brokers

Imagine a file containing your name, address, political party, income, hobbies and favorite brand of soap. Sounds like the intro… View Article

Posted in Privacy | Tagged , , , , , , , , , , , , , , , , , , , , | 13 Comments

Peeple: Get a Photo of Who’s Knocking at Your Door

Yesterday, I was watching the developments from the International CES (Consumer Electronics Show) in Las Vegas, like I do each… View Article

Posted in Security | Tagged , , , , , , , , , , , , | 10 Comments

How To Make Your Escape and Disappear from the Internet

There are a few straightforward steps you can take if you’re looking to remove yourself from the World Wide Web,… View Article

Posted in Privacy | Tagged , , , , , , , , , , , , , | 1 Comment

Can Anyone Truly Be Anonymous Online?

The Internet is the single greatest information resource available to mankind today. Unfortunately, the Internet of today has become a… View Article

Posted in Privacy | Tagged , , , , , , , , , , , | 9 Comments

Plan, Execute and Vanish: Everyday Red Teaming

While “Red Team” often refers to a group of experts testing or infiltrating a physical or virtual perimeter of an… View Article

Posted in Mindset | Tagged , , , , , , , , , , , | 1 Comment

5 Phone Numbers You Need on Speed Dial

Not every situation is one that requires dialing 9-1-1; that line should be kept clear for true emergencies only. 911.gov… View Article

Posted in Comms | Tagged , , , , , , , , , , , | 10 Comments

Lifesaving Tips to Prevent a Carjacking and Not Become a Victim

I was browsing Facebook the other day and someone posted a link to the recent Colorado carjacking video. I clicked the link… View Article

Posted in Driving, Physical Security | Tagged , , , , , , , , , , , , | 8 Comments

Is Blackphone the World’s First NSA Secure Phone?

If you’ve ever used PGP encryption to communicate over the internet, you may be familiar with its creator, Phil Zimmerman… View Article

Posted in Privacy | Tagged , , , , , , , , , , , , , , | 18 Comments

Lessons Learned from the Los Angeles International Airport Shooting

There are several lessons learned from the LAX shooting on November 1, 2013 in California, but first, I want to… View Article

Posted in Medical | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , | 13 Comments