Category identity management

How To Track The Original Location Of An Email Via Its IP Address

This isn’t bullet-proof.  Spoofing, stealth malware, and so on.  A sophisticated cyber adversary/thief can and do make digital attribution a challenge to say the least.  And, if they muddy their digital tracks well enough, false-flag ops, etc., it will cost you a lot of time and money to eventually locate the IP.  And by then, […]

Cardio Scan Authentication — Your Heart As Your Password

Cardio Scan Authentication — Your Heart As Your Password http://www.fortunascorner.com      Your heartbeat, as your authentication for your networked devices?  That’s one initiative underway by some technology firms to try and establish a more secure way of preventing cyber thieves from hacking into our devices.  Swati Khandelwal writes on the September 26, 2017 online […]

Facial Recognition Software Can Now Identify People Even If There Face Is COVERED In A Breakthrough That Will Quickly Unmask Criminals — Implications For Undercover Operatives?

Facial Recognition Software Can Now Identify People Even If There Face Is COVERED In A Breakthrough That Will Quickly Unmask Criminals — Implications For Undercover Operatives?   http://www.fortunascorner.com        One of the most important challenges that any intelligence or law enforcement agency has to confront is — how to keep their most precious […]

How Russia Is Using LinkedIn As A Tool Of War Against Its U.S. Enemies

How Russia Is Using LinkedIn As A Tool Of War Against Its U.S. Enemies By Jeff Stein, www.newsweek.com View Original One night in mid-March, Alan Malcher, a British military veteran, dropped into the Queen’s Arms, a working-class pub in north London. He took a seat at the bar and ordered his customary pint of Foster’s. Within a […]

‘Is That Really You Typing?  New Pentagon Technology Will Know’; But, Beware Of Over-Reliance, Or over-Confidence In This Technique — Only The Digital Shadow…….Really Knows

‘Is That Really You Typing?  New Pentagon Technology Will Know’; But, Beware Of Over-Reliance, Or over-Confidence In This Technique — Only The Digital Shadow…….Really Knows   http://www.fortunascorner.com        Mohana Ravindranath had an article last week by NextGov.com, and posted on the national security website, DefenseOne.com, with the title above.  He begins, “in its quest to drop […]

U.S. Special Operations Commander Says LEAKS To New York Times Are The Reason Islamic State Leader Abu Bakr al-Baghdadi Escaped U.S. Forces And Is Likely Still Alive

U.S. Special Operations Commander Says LEAKS To New York Times Are The Reason Islamic State Leader Abu Bakr al-Baghdadi Escaped U.S. Forces And Is Likely Still Alive http://www.fortunascorner.com      General Raymond ‘Tony’ Thomas, Commander, U.S. Special Operations Command (USSOCOM), told an audience at the Aspen Security Forum last week, that Islamic State leader Abu […]

How To Steal a Mobile Phone Number & Everything Linked To It  — Meet Signaling System 7, A Hacker’s Best Friend

How To Steal a Mobile Phone Number & Everything Linked To It  — Meet Signaling System 7, A Hacker’s Best Friend   www.frotunascorner.com        Steven Melendez has a July 18, 2017 article on the website, FastCompany, with the title above.  Mr. Melendez begins by writing how even the most tech-savvy can still be vulnerable, and […]

Staying Secret in The Age Of Social Media

Staying Secret in The Age Of Social Media thecipherbrief.com · July 19, 2017 July 19, 2017 | Mark Kelton Mark Kelton Former Deputy Director for Counterintelligence, CIA National Clandestine Service Intelligence officers must often use a false identity – a legend or cover. How has social media and digital technology changed how they create and preserve these cover […]

How Hostile Spies Study Social Media to Crack CIA Cover, Spot Likely Agents

How Hostile Spies Study Social Media to Crack CIA Cover, Spot Likely Agents thecipherbrief.com · July 19, 2017 July 19, 2017 | Daniel Hoffman The Newsletter Get exclusive analysis delivered to your inbox daily. subscribe now Daniel Hoffman Former Chief of Station, Central Intelligence Agency Intelligence officers’ tradecraft is highly guarded for good reason. One of its most […]

‘Click Here To Kill Everyone,’:  Internet Of Things (IoT) Physical Attack Exploit To Be Revealed At Upcoming Black Hat Convention In Las Vegas, July 26-27, 2017; 20th Year Of Annual Gathering Of World’s Elite White Hat Hackers 

‘Click Here To Kill Everyone,’:  Internet Of Things (IoT) Physical Attack Exploit To Be Revealed At Upcoming Black Hat Convention In Las Vegas, July 26-27, 2017; 20th Year Of Annual Gathering Of World’s Elite White Hat Hackers    http://www.fortunascorner.com       For the 20th straight year, the world’s most — must-attend event — for the […]