Search:  

 Blog     e-Newsletter       Resource Library      Directories      Webinars  Apps     EBooks
   AFCEA logo
 

On Cyber Patrol

The Last Cyber Warrior

Tuesday, February 7, 2012

When it comes down to it, you — yes, you — are the last line of cyber defense against the endless hordes of cyber criminals, terrorists and foreign agents. Digital technology now touches almost every living person and as time moves on its reach will only continue to grow. With technology reaching us all and being incorporated into more parts of our daily lives, you can no longer rely on someone else to protect you. Whether it is defending your data at work, or defending your personal data at home, being an effective cyber defender is a continuous responsibility.

'Tis the Season to Watch for Scams

December 16, 2011

This holiday season, don’t fall prey to a criminal’s cyber scam. Protect yourself by following a few simple guidelines when shopping online and giving to charities. Actually, these rules are good all year round as well.

An Alternative Approach to Implementing New Technology

November 28, 2011

Here’s an interesting look into the inner workings of international cyber criminals by virtue of covertly recorded conversation snippets. The characteristics of similar processes in Western governments, particularly here in the United States, are well known because they are described in detail in the media. Our processes exist to provide accountability, budget constraint, quality assurance and fair competition. The bad guys have a slightly different take on how to go about things.

It's All About the Net-Work!

August 22, 2011

“It’s all about the network” is the rallying cry for the digital resources that enable the Army to perform its mission more effectively and efficiently. Yet, the Army Network requires a significant amount of effort, not only to develop, implement, maintain and improve it, but also to keep it secure. Those specific network or “Net-Work” tasks are the responsibility of everyone who touches the Army Network.

It's All About the Net-Work!

August 22, 2011

“It’s all about the network” is the rallying cry for the digital resources that enable the Army to perform its mission more effectively and efficiently. Yet, the Army Network requires a significant amount of effort, not only to develop, implement, maintain and improve it, but also to keep it secure. Those specific network or “Net-Work” tasks are the responsibility of everyone who touches the Army Network.

The Dangers of Getting Picked Up in a Parking Lot

August 2011

According to a recent story in Bloomberg News, the Department of Homeland Security tried a little experiment by dropping CDs and thumb drives in the parking lots of government building and private contractors. Well, one would imagine this would be a great opportunity for our government employees and the specialized contractors that support them to show off their cyber security chops. After all, isn’t it a given that these people would have cyber security and information assurance best practices drilled into them?

Don't Wear the Hat!

May 26, 2011

A series of raids, both CONUS and OCONUS, on the hideouts of known cyber criminals has resulted in the discovery of a number of information documents. These documents indicated that the cyber crime and terrorism communities have ceased global operations involving the exploitation of unsecured wireless networks. But don't let that fool you.

Classic Cyber Caltrops

Wednesday, April 27, 2011

What’s a Caltrop? It could be the start of a lame joke like, “what’s a hen way” or “what’s a Grecian earn?” In fact, a Caltrop is an ancient land mine of sorts. It is usually a multi-sided spiked object that could seriously tear up a bare foot, an unshod hoof or a pair of Bronze Age sandals. Today the modern version of caltrops is used against vehicles with unreinforced tires. Think televised car chase on some freeway. They are not sophisticated and certainly not anywhere as bad as an IED. Yet, given the right circumstances, they are very effective.

Preparing for Predatory Peripherals

February 22, 2011

Your mouse may no longer be a friendly. That goes for your keyboard as well. Cyber security researchers have reportedly found a way to create peripherals that can be programmed to steal and transmit data when certain actions or keystrokes are performed.

2011 New Year's Resolutions (Theirs, Not Ours)

January 21, 2011

In an intelligence coup, G2 operatives were able to secure the New Year’s Resolutions of the infamous International Cyber Criminal (ICC).

Pages

Subscribe to RSS - On Cyber Patrol