Secure Mobile Phone
Tuesday, 19 February 2013
A UAV Alternate POV
Posted on 05:52
by Unknown
Cute animated video from The New York Times... (
more
)
Email This
BlogThis!
Share to X
Share to Facebook
Share to Pinterest
Posted in
aerial
,
drone
,
KGB
,
mores
,
satire
|
No comments
Newer Post
Older Post
Home
0 comments:
Post a Comment
Subscribe to:
Post Comments (Atom)
Popular Posts
How secure is the Merkel-Phone?
(Latest update: October 28, 2013) In an article by the German magazine Der Spiegel it was said that the NSA probably also eavesdropped on t...
Vatican Bugs
Last Month - An Italian news magazine, Panorama, claimed that Vatican authorities h ad conducted, and are still conducting, an extensive co...
The VD of Apple iOS Devices - Unsafe Charging
Using the bogus charger, a team from Georgia Institute of Technology managed to infect a phone with a virus in less than a minute. Any dev...
Digital Cameras Easily Turned into Spying Devices
Newer cameras increasingly sport built-in Wi-Fi capabilities or allow users to add SD cards to achieve them in order to be able to upload a...
Highly secure mobile phones
(Updated: June 5, 2013) In the previous post we saw that ordinary mobile phones offer only limited protection against eavesdropping. Theref...
Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
Sometimes you just need a dumb phone that can't spy on you. inKlien Global's tiny phone 6.5mm Ultra Thin AIEK M3 Cool Card Cell Ph...
CONTEST (ENDED) - Who Is This Man?
We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper. • Good high speed driver. • Shar...
New slides about NSA collection programs
(Updated: November 12, 2013) Over the last month, the publication of various slides of a powerpoint presentation about the top secret NSA co...
Mobile Security Apps Perform Dismally Against Spyware
via Josh Kirschner at Techlicious ... Mobile spyware can have a devastating effect on your life; the constant fear that a spouse, significa...
From BULLRUN to NOCON and LACONIC
On September 5, The Guardian , The New York Times and ProPublica jointly revealed that NSA has a top secret program to break encryption sy...
Categories
advice
aerial
amateur
Android
App
Apple
art
biometric
BlackBerry
blackmail
Bluetooth
Boeing
book
business
BYOD
CALEA
cartoon
cautionary tale
CCTV
cell phone
CIA
Classification
Clothing
computer
contest
counterespionage
Darwin
data
detection
drone
dumb
eavesdropping
email
employee
encryption
ERII
espionage
extortionography
FBI
fiber-optic
find
food
FREE
fun
FutureWatch
General Dynamics
Germany
Gold Phone
government
GPS
GSM
Hack
historical
Hotline
humor
IAPSC
IMCPB
Infrared
Internet
ISAF
Israel
IST
IT
just coincidence?
KDM
keystroke
KGB
Kremlin
laser
law
lawsuit
leaks
malware
marketing
MI6
mind reading
miscellaneous
mores
movie
nature
Netherlands
North Korea
NSA
Obama
optics
OSS
password
PI
police
political
poll
POTUS
PRISM
privacy
product
quiz
quote
Ra-parents
Ray-Gun
recording
Red Phone
religion
RFID
Russia
sabotage
satire
scam
shredder
Situation Room
social engineering
software
sports
Spy Museum
spy school
spybot
spycam
spyware
SpyWarn
statistics
STE
steganography
STU-II
STU-III
surveillance
survey
telephone
TEMPEST
Tips
toy
tracking
trade secret
TSCM
Twitter
UMTS
USA
USB
USSR
Vatican
VoIP
voyeurism
Watergate
weird
White House
Wi-Fi
Wireless
wiretapping
X-Ray Vision
Blog Archive
▼
2013
(455)
►
November
(47)
►
October
(53)
►
September
(31)
►
August
(50)
►
July
(50)
►
June
(47)
►
May
(35)
►
April
(40)
►
March
(29)
▼
February
(33)
Papal telephony
Security Scrapbook Reader's Question - Spy School
Business Espionage - Quote of the Month
Spykpe
Express Scripts vs. E&Y - Trade Secret Theft Alleg...
U.S. Unveils New Strategy to Combat Trade-Secret T...
Skype Plebes Petition Redmond Patricians
Yet Another Teleconference Eavesdrop (with recomme...
Send Employees for Counterespionage Training? Bril...
United States Intelligence Community - Virtual Car...
Weird Security News of the Week
Mechanic Hits Emails at Rival Limo Firm
Hobby Drones Under Fire
A UAV Alternate POV
President Reagan using a STU-II telephone
US State Department red phones
Two Princesses in a Bug House
If the competition isn't bugging you, they are pro...
Report Recommends a TSCM Sweep of City Hall
Law Proposed to Let Parents Wiretap Kids
Groundbreaking Encryption App is a Fed Freaker
Authorities... "No probing all the way. Promise."
Business Espionage - Sentences Short - Fines Small
British Army Unveils New Mini Spy Drone
Two sneaky Android apps have been detected...
New Wave Of Hidden Cameras Make Spying Easy
Spy vs. Spy vs. Judge Leonie
See What Drones See
Experts warn on wire-tapping of the cloud
Man held on suspicion of business espionage
New Report: Drones Could Be Used for Stalking, Voy...
Alerts sent in by our Blue Blaze Irregulars this w...
From the Business Spy's Toolkit - NoteMark
►
January
(40)
►
2012
(84)
►
December
(33)
►
November
(33)
►
October
(12)
►
June
(2)
►
May
(2)
►
February
(1)
►
January
(1)
Powered by
Blogger
.
About Me
Unknown
View my complete profile
0 comments:
Post a Comment