Technical Threats

Predator: Helen M., Catfish, Somewhere online Discussion: What you see isn’t always what you get. Take the sweet young thing who hit me up a few months ago. A fan of my best-selling book, 100 Deadly Skills, she asked for security tips. From there it got intense quick. But as a retired Navy SEAL, my Spidey-sense was tingling pretty much from the first.

Predator:  Phil K. - Special Agent, Secret Service  Discussion: Personal home defense against unmanned aerial vehicles (UAVs), or recreational drones. Small remote-control aircraft can pose a powerful threat to regular air traffic and also to your personal privacy. For less than $200, anyone can purchase a flying camera that can roam over your property and peek in your windows. Don’t worry about the Amazon Prime Air drone that will someday delivery your package, it’s the drone purchased from Amazon you need to worry about – today.

Predator: Secret Service Special Agent Discussion: How to protect your professional identity via LinkedIn Our government network serves as a great vetting process to ensure we are delivering the latest information to better secure whats important to you. The last cheat sheet in our Social Media Security...

Predator: Secret Service Special Agent Discussion: Securing My Googlable Identity Continuing with our goal, providing you with knowledge from both good guys and bad guys - here is the recommended cheat sheet for securing your google identity or otherwise known as Google+ (Plus). Just like all social...

Predator: Secret Service Special Agent Discussion: The Definitive Answer to Keeping My Facebook Account Secure Facebook, 1 billion and growing, is the most targeted social media platform by nefarious individuals. They want to impersonate you, stalk you, collect your personal data and bully you. There are ways...

Predator: Secret Service Special Agent Discussion: Best means of securing my Twitter Identity In recent discussions with former military and current Secret Service agents - they recommend the Twitter Smart Card to ensure your personal security in tweet world. It is easy to use  - print it, keep it...

Our Top 5 Must Have Security Apps These are, for now, great apps to promote security and privacy in your professional and personal life. If you use all five, you will be able to secure text, secure voice calls, determine tampering of your environment, unlock your...

Predator: Chris C. - State Department Information Security Specialist Subject: Mobile Device Security TLO: Terminal Learning Objective is the specific message a lesson conveys to the student. 1. Introduction to Mobile Device Security a. TLO: Familiarize the member with threats that impact intellectual property, security and safety. b. Laptops,...