Computer Security · Information operations · Information Warfare · OPSEC · Security

Here’s Why Lawyers Suggest You Stop Using Your Finger to Unlock Your Phone


You are protected against revealing passwords under the Fifth Amendment’s right against self-incrimination, but your biometrics are not. By Will Yakowicz Staff writer, Inc. http://www.inc.com/will-yakowicz/why-biometrics-are-bad-for-your-constitutional-rights.html?platform=hootsuite Biometrics might be cool and convenient, but the technology could potentially undermine your legal rights under the Fifth Amendment, which prohibits the government from compelling a witness to testify against… Continue reading Here’s Why Lawyers Suggest You Stop Using Your Finger to Unlock Your Phone

Communication · Computer Security

50+ Years of Innovation


I recently gave a presentation at the DC Campus of Drexel University, at a forum on ‘Cybersecurity in the year 2024’.  My good friend, retired USAF Colonel Norman Balchunas, assembled thought leaders, mainly from the Washington DC area, to discuss cybersecurity, learn more about Drexel University’s various cyber programs and help devise a ‘road ahead’.… Continue reading 50+ Years of Innovation

Computer Security

Copiers as an Information Warfare Tool


Imagine my horror to read that Xerox Copiers, specifically the Xerox Workcentre 7535 and 7556, using  Jbig2, an image compression standard, are unilaterally changing numbers within documents.    The BBC report is here.  In a specific example, dimensions in a plan which was copied were changed from 21.11m to 14.13m. To my naturally devious mind this presents… Continue reading Copiers as an Information Warfare Tool

Computer Security

Putting the Privacy Test to Congress


The Cyber Intelligence Sharing and Protection Act (CISPA) is a proposed law intended to share information between the US government and industry. For years the information security community has sought to build a more comprehensive picture to establish greater situational awareness of how US networks are being attacked and probed and to guage the amount… Continue reading Putting the Privacy Test to Congress