article thumbnail

The US Military Buys Commercial Location Data

Schneier on Security

Vice has a long article about how the US military buys commercial location data worldwide. military is buying the granular movement data of people around the world, harvested from innocuous-seeming apps, Motherboard has learned. location data purchases have extended from law enforcement to military agencies.

Military 109
article thumbnail

Have You Considered Tone of Voice?

ARMA International

As an example, the term “messages” once referred to voice messages left on an answering machine, to short notes about telephone calls scrawled on little pink slips of paper, and to basic instant messaging services sent through local area networks. View the PDF version of this article. Legislation, too, is written in a neutral tone.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Gen. Nakasone on US CyberCommand

Schneier on Security

Really interesting article by and interview with Paul M. He talks about the evolving role of US CyberCommand, and it's new posture of "persistent engagement" using a "cyber-presistant force": From the article: We must "defend forward" in cyberspace, as we do in the physical domains. Nakasone (Commander of U.S.

article thumbnail

Information Disaster Plan

The Texas Record

This article will promote critical thinking and provide some guidance for developing your office’s information management disaster plan. When reviewing this article and establishing your plan, keep in mind the impact of losing information is not always immediately apparent.

Paper 98
article thumbnail

Spotlight: Learning More About Female Firefighters From Universal News Production Files

Unwritten Record

Among the footage of military invasions, coronations, and Olympics it is possible to find footage of lesser known citizens who also made their mark on history. The Universal Newsreel collection is just one example of a series in NARA’s moving image holdings that is enhanced by information in production files.

article thumbnail

Stark Industries Solutions: An Iron Hammer in the Cloud

Krebs on Security

Correctiv notes the notorious hacker group Sandworm — an advanced persistent threat (APT) group operated by a cyberwarfare unit of Russia’s military intelligence service — was identified by Ukrainian government authorities as responsible for that attack. PEACE HOSTING? was responsible for hosting StopGeorgia[.]ru

Cloud 271
article thumbnail

The Film Frontier: Using Films and Videos in Your National History Day Project

Unwritten Record

For a performance on women trailblazers in the military and during wartime, you could look at moving images from World War I ( NAID 24720 ), World War II ( NAID 16214 ), the Vietnam era ( NAID 4523809 ), and Desert Storm ( NAID 4524847 ) to learn how uniforms, duties, and expectations of military women have changed over time.