On Cyber Patrol

Tuesday, February 7, 2012

 

December 16, 2011

This holiday season, don’t fall prey to a criminal’s cyber scam. Protect yourself by following a few simple guidelines when shopping online and giving to charities. Actually, these rules are good all year round as well.

November 28, 2011

Here’s an interesting look into the inner workings of international cyber criminals by virtue of covertly recorded conversation snippets. The characteristics of similar processes in Western governments, particularly here in the United States, are well known because they are described in detail in the media. Our processes exist to provide accountability, budget constraint, quality assurance and fair competition. The bad guys have a slightly different take on how to go about things.

May 26, 2011

The following is a public service announcment regarding public wireless networks.

 

Wednesday, April 27, 2011

January 21, 2011

In an intelligence coup, G2 operatives were able to secure the New Year’s Resolutions of the infamous International Cyber Criminal (ICC). Normally such information would not be released to the public in order to keep military intelligence gathering techniques and operations secure. However, as this information was taken from an unsecured social networking page of one of the ICC’s top lieutenants, the decision was made to release it for its educational value.   

September 2010

A soldier in harm’s way has no greater ally than other soldiers watching his or her back. That trust is the
key component of a good unit. Usually, the bond of trust that only members of the military share is built
during training and missions. That trust is priceless in theater, but what about other environments?
Dark alleys, sketchy neighborhoods, the bleachers of an away game – soldiers have that covered. But,
who has your back in cyberspace?

July 15, 2010

Some of you might find this interesting.

Below is the personal information of the author of this article and a few other goodies.  It contains his full name, date and location of birth, Social Security Number, current and previous addresses for the past ten years, mother and father’s names and social security numbers, bank accounts and PINs, military CAC (including SIPR) PIN, AKO logon and PIN, entire work history and the combination to the electronic lock on his house (address provided above): 

May 20, 2010

April 16, 2010

 

Every day there are hundreds, maybe thousands, of people searching the Internet for classified military data and the identities of military personnel and their families. However, they are not hacking into sensitive databases or trying to breach Pentagon networks. They are simply looking in locations that are filled of this type of free information: social networking sites and personal Web pages.

March 2010

Can technology counteract the determined, the deceitful and the dimwitted? This is a question that has yet to be answered as the Army and other branches look at resuming the use of flash media on military networks.

Pages