Information warfare is ongoing, intensifying and global. This is not new, but it is newly relevant because the Internet (and associated technologies) fully democratize the weapons. While we are fighting an asymmetrical physical war, the information war being fought on a much more level playing field. Or is it?
How were the terrorists in Paris communicating? Shelly Palmer talks about it with Juliet Huddy and Teresa Priolo on Fox 5. Original Airdate: November 17, 2015
The Arabic hashtag #stab is something I'd rather not see on a social media post. Israel's UN ambassador, Danny Danon, recently showed a version of the instructional graphic that accompanied that hashtag to the UN Security Council with the English-language title, "How to Stab a Jew." Mr. Danon was making a point – but also describing a form of warfare so new it does not yet have a name.
A homemade digital clock and a homemade bomb might share several component parts. Both devices might include a timing circuit, a display, a power supply, some switches, a radio (WiFi, Bluetooth or RF), a bunch of wires and some kind of housing or case. There are, however, some nontrivial differences. As a rule, homemade digital clocks do not contain detonators or explosives. That said, a time bomb needs a timer, and a homemade digital clock would do that job nicely. So could you tell the difference between the two devices? Could you tell a clock from a bomb?
If former Secretary of State Hillary Clinton did delete emails from her private email system (that she should not have deleted) will forensic computer technicians find them? It's about the most popular question I get asked these days. So – for your reading pleasure – a primer on email deletion, data destruction and hard drive erasing.