Category Archives: Computer Security

3-D Printing

One of the most interesting stories I’ve read all year: Forbes’ Andy Greenberg reports that the security consultant, who goes by the name “Ray,” used a 3-D printer to cheaply produce plastic versions of the keys to high-security handcuffs manufactured by the … Continue reading

Posted in Computer Security | Leave a comment

Border Security

Security wonks like Bruce Schneier talk about things like “How to secure your laptop from being searched crossing international borders,” and I blog about it occasionally because it’s interesting from a technological point of view, but it usually seems pretty … Continue reading

Posted in Computer Security | Tagged , , , | Leave a comment

Cyber Offense

There’s a great piece at Information Dissemination on the DOD’s Cyber Offense capabilities – while much has been written about the DOD’s ability (or inability) to defend US military and civilian networks against cyber attack, there’s been a lot less about our … Continue reading

Posted in Computer Security, Military, National Security | Tagged , , , , , | 1 Comment

Pirate Airships

We like to think of the internet as being ethereal and non-physical – that it can’t be constrained by normal pressures and forces. The fact though, is that it is completely bound by physical infrastructure – infrastructure that is generally … Continue reading

Posted in Computer Security, Military | Tagged , , , | Leave a comment

Low-Tech Cyberwar

Details matter. As this article from Defense Tech shows, not understanding the hidden side of technology can have deadly consequences: When you take a photo with your cellphone, the gps coordinates of the location you took the picture is embedded … Continue reading

Posted in Computer Security, Military | Tagged , , , , , | Leave a comment

There’s an interesting trend going on right now, and I’m struggling with exactly what to call it. In at least three seperate, widely diverse incidents, there’s been a pattern where: a) A set of documents is leaked from a person … Continue reading

Posted in Computer Security, Toolkit | Tagged , , , , | Leave a comment

Hacking News

Two interesting bits of news from the world of computer security: Wired discusses the “Pwnie,” a product that highlights the increasingly modular and streamlined world of system penetration and hacking. Built by a startup company called Pwnie Express, the Pwn … Continue reading

Posted in Computer Security | Tagged , , , , | Leave a comment