Edit-for-Cash at Wikipedia
Sarah Stierch, a senior staffer at Wikipedia, was fired for taking cash for edits to the popular encyclopedia site. Stierch offered her services as a “long time Wikipedian, curator, researcher and...
View ArticleThe Individual First Aid Kit (IFAK)
Recent involvement in investigations into industrial accidents and incidents involving security officers caused me to look into the state of first-aid training. I have some concerns that...
View ArticleChrome is Listening
So you want to use Chrome as your browser. Are you aware that it has recently been reported that a Chrome Bug Allows Sites to Listen to Your Private Conversations? The best way to avoid this threat is...
View ArticleNormalcy Versus Risk
Feral Dogs In the past I have written about the risks associated with feral dogs. Currently, the town of Kenora Ontario is experiencing some difficulties with feral dogs. Having a pack of feral dogs...
View ArticleSurviving a Calamity
I sometimes hear someone argue that specialization has weakened society as individuals now have fewer skills with which to survive a calamity. This argument presupposes a sudden reversion to a rude...
View ArticleMicrosoft’s Ban on Guns & the Investigator
Since 2009 Microsoft’s Code of Conduct has been applied to more and more of their online services. Under this Code of Conduct, users are prohibited from using it in “any way that promotes or...
View ArticleSafe Recharging with a USB Condom
The mobile phone adaptor USB cable is a combination power-and-data connection that can expose your device to manipulation by some very unsavory characters. This practice is called Juicejacking and I...
View ArticleMurder starts with your Mouth
The excellent book The Dark Side Of Man reports that David Luckenbill studied all of the murderers in a California county over a 10-year period and asked them why they killed their victims. All the...
View ArticlePreparedness, Business Continuity, and Risk
A recent study indicates that a two day interruption of key business functions could cost your business $3M. As most businesses are in urban areas, you could face much worse. One of my clients is...
View ArticleOperational Security for Security Intelligence
The first of my 6 articles about maintaining operational security for the security intelligence function in the private sector is now online at Canadian Security Magazine.
View ArticleDisk Encryption
TrueCrypt, the ultimate encryption freeware, abruptly announced that the software is no longer secure after Microsoft ended support for Windows XP. It was the most popular application of its type and...
View ArticleOperational Security Part 2: Commercial Self-Defence
Over at Canadian Security Magazine, my first article explained the nature of security intelligence (SI) and its OPSEC challenges. This second article explains the OPSEC challenges facing security...
View ArticleWhen the Security Guard’s Job Stops
The fifth annual Horizon Scan Report published by the Business Continuity Institute, in association with BSI illustrates that physical security and related issues are growing concerns amongst business...
View ArticleThe Mac & Malware
Like many Mac users, I’m not too concerned about malware. Traditionally, the vast majority of these were directed at Microsoft OS platforms. But recent headlines prompted me to consider two pieces of...
View Article