John Walker, Navy spy for the KGB, is dead
“It couldn’t have happened to a nicer guy.” —Retired FBI agent Robert Hunter, lead investigator on the case (ABC-13, Virginia Beach) The man who masterminded what’s been called the biggest
“It couldn’t have happened to a nicer guy.” —Retired FBI agent Robert Hunter, lead investigator on the case (ABC-13, Virginia Beach) The man who masterminded what’s been called the biggest
Read this investigation and see how many bells go off in your mind re security indicators. (ProPublica) Intelligence Gap: How a Chinese National Gained Access to Arizona’s Terror Center The un-vetted computer
The Defense Security Service has published its 2014 Targeting US Technologies: A Trend Analysis of Cleared Industry Reporting (pdf) Executive Summary Fiscal year 2013 (FY13) saw a continuation of the past
(Miami Herald) For 16 years, Ana Belen Montes spied for Cuba from increasingly responsible positions at the Defense Intelligence Agency. If Havana has ever run a higher level or more valuable mole
Kentucky Man Convicted of Theft of Trade Secrets Sentenced in Yakima Federal Court . . . . Ward was arrested on November 11, 2011, in Floyds Knobs, Indiana, following his transfer
Recent cases security officers should know about: Embezzlement/Theft Woman Sentenced for Defrauding Former Employer of More Than $440,000 while working as the bookkeeper and accountant for Telsar Laboratories, Inc. (TLI),
(Courthouse News) An engineer convicted of selling stealth technology to China failed to convince the 9th Circuit that the statements he made to federal agents over a week of voluntary interrogations
Foreign intelligence services look for government employees and contractors in debt. This new report will make them realize the field is wide open for targeting. (CNN) About 83,000 Defense Department employees
This image shows a page of the flight test plan for the F-35, the world’s most advanced multi-role fighter aircraft, from an internal company document that Su Bin allegedly acquired
From Live-Tech. Here’s the list but read the rest for more details. Google Glass for snatching passwords Attack against the virtual desktops Abusing Microsoft Kerberos Remote car network attacks Data
(Computing) For many, Google Glass and other wearable devices might appear to be the latest overhyped fad. However, when smartphones first arrived, few would have suspected they’d become such an integral
Listening devices found at Ford HQ; recently fired engineer investigated (Detroit News) The FBI searched Ford Motor Co.’s world headquarters while investigating one of the automaker’s engineers and seized listening devices,
Security Educator
Public Speaker
Motivator
National Security Expert
“On a scale of 1 to 10, this DICE briefing was a 20!”–Corporate CEO
You must be logged in to post a comment.