The Blog

Predator: Convicted Rapist, Texas Prison System Every predator utilizes surveillance, intelligence collection and strategy prior to executing a crime – whether they know it or not. Crimes of rage tend to skip all these steps and predators inevitably get caught. It's human nature to observe, collect...

Free Wi-Fi can be an alluring perk for workers on the road. Business travel tends to bring long hours, and anytime there’s downtime to check in with what’s going on in the world or the office or send out that long-overdue email is tempting....

Predator: Cullen TenEyk: Joint Special Operator, Global Shooter of Bad Guys and extremely professional predator of all enemies to the United States. Discussion: I agree with Joshua Keating’s comments in his September 2013 Slate Magazine article, “Why Shopping Malls are Attractive Targets for Terrorists.” Keating suggests that...

Do you have a cell phone or laptop? Do you use them in airports? Guess what, that's the worst place to use your personal electronic devices! Here's why: Because of the mass use of mobile devices within airports, communication companies have installed "mini-towers" within airport terminals...

Predator: Cecilia A., Subject Matter Expert OSINT/Cybercrime's, Department of Defense, and US Government Agencies (especially those with 3-letters) Topic: How to Counter Data Collection Objectives Identify how privacy is compromised within the cyberspace. Identify how to prevent third parties from collecting personal data. Reduce online vulnerabilities through...

It’s probably easy for you to identify people who could gain physical access to your computer, tablets, phones, and other digital devices. It could be family members, roommates, co-workers, members of a cleaning crew, and others. But identifying the people who could gain remote access to...