Anyone can construct a drone from readily available parts, following online instructions. With minimal care, tracing a drone back to its creator would be extremely difficult. We now face a world where anyone can be an attacker for reasons ranging from ‘I wonder what would happen if…” to deliberate military attacks.
Iraqi PM Safe After Drone Attack on Residence, Military Says
… Six members of Kadhimi's personal protection force stationed outside his residence in the Green Zone were wounded, security sources told Reuters.
Three drones were used in the attack, including two that were intercepted and downed by security forces while a third drone hit the residence, state news agency INA quoted a spokesman for the interior ministry as saying.
(Related)
https://www.wired.com/story/drone-attack-power-substation-threat/
A Drone Tried to Disrupt the Power Grid. It Won't Be the Last
IN JULY OF last year, a DJI Mavic 2 drone approached a Pennsylvania power substation. Two 4-foot nylon ropes dangled from its rotors, a thick copper wire connected to the ends with electrical tape. The device had been stripped of any identifiable markings, as well as its onboard camera and memory card, in an apparent effort by its owner to avoid detection. Its likely goal, according to a joint security bulletin released by DHS, the FBI, and the National Counterterrorism Center, was to “disrupt operations by creating a short circuit.”
For anyone with enough time to plan ahead…
What's next in Congress for cybersecurity after enactment of the infrastructure bill
… Aside from these significant pieces of legislation, Congress has been busy on various cybersecurity bills since our last Congressional update. Altogether, since the current 117th Congress began in January, 321 bills that deal in whole or part with cybersecurity have been introduced.
It’s a surveillance world, get used to it.
https://www.zdnet.com/article/microsoft-will-now-snitch-on-you-at-work-like-never-before/
Microsoft will now snitch on you at work like never before
… Microsoft is preparing a couple of little updates that may curb employee rulebreaking enthusiasm.
Yes, this news again comes courtesy of Microsoft's roadmap service, where Redmond prepares you for the joys to come.
This time, there are a couple of joys.
The first is headlined: "Microsoft 365 compliance center: Insider risk management -- Increased visibility on browsers."
It all sounded wonderful until you those last four words, didn't it? For this is the roadmap for administrators. And when you give a kindly administrator "increased visibility on browsers," you can feel sure this means an elevated level of surveillance of what employees are typing into those browsers.
In this case, Microsoft is targeting "risky activity." Which, presumably, has some sort of definition. It offers a link to its compliance center, where the very first sentence has whistleblower built in: "Web browsers are often used by users to access both sensitive and non-sensitive files within an organization."
And what is the compliance center monitoring? Why, "files copied to personal cloud storage, files printed to local or network devices, files transferred or copied to a network share, files copied to USB devices."
Tools & Techniques.
https://www.bespacific.com/how-to-memorize-the-un-memorizable/
How to Memorize the Un-Memorizable
LitHub: “Marcus du Sautoy Offers Tips and Tricks for Building a Better “Memory Palace”… But how does [Ed Cooke, a Grand Master of Memory and founder of a new venture for learning languages called Memrise] use this cast of characters to remember a 1000-digit number? The key is to put those characters in space: “If you want to make very, very long chains of information of things, you need a backbone on which to project our images, and it so happens that we have an extraordinary potency of memory for space. Mammals developed an incredible capacity to navigate and remember an incredible repertoire of spaces. Even if we don’t think so, we’re all really good at this. Just after wandering around an elaborate building for a few minutes we can memorize its layout. So we can use this powerful skill as a shortcut to piggyback our images representing our numbers. This is called building a memory palace.”
No comments:
Post a Comment