Impersonating someone online can take many forms. In some cases, the impersonation may constitute a criminal offense, such as when one individual pretends to be another for financial gain. In other instances, the impersonation does not reach that level. Regardless of whether the impersonation is or is not a crime, the victim of the impersonation feels violated and vulnerable. Depending …
State of the State: North Carolina Intelligence Community
Think of security as a three-legged stool. If you remove any of the legs the stool will not stand. The legs of the security stool are a motivated opportunist, access to an asset, and the perception by the opportunist that they have a “good” chance of being successful in gaining the asset. As a security consulting firm, Risk Management Associates, …
Don’t Click that Link!
NCMS (National Classification Management Society) is a society that provides training and guidance to private sector firms who are industrial contractors to the federal government on classified contracts. As a member of the national organization and the Carolinas Chapter, RMA has access to some excellent and timely training. “Don’t Click That Link!” came from another member and is a good …
FBI says hackers hit key services in three US cities
Everybody is preoccupied with chemical, biological, radiological, and nuclear devices (CBRNE) and vehicle-borne improvised explosive devices (VBIED) while the hackers are practicing to really take us down hard. In our opinion, this is the new “front line” in security and counterterrorism. How do we get the great unwashed to understand that passwords are not just there as a nuisance? Gives …
‘Dirty Dozen’ Unsecured Smartphones
On November 21, 2011, Bit9 released its ‘Dirty Dozen’ of unsecured smartphones for 2011. The following is an excerpt of that news release: New Report on Most Vulnerable Mobile Platforms Reveals Orphaned Android Phones Pose Serious Risk to Privacy and Security… 11.21.11 – Waltham, Mass. – Bit9, the market leader in advanced threat protection and server security software, today published …
Protecting Competitive Intelligence
As the holiday season approaches, Hollywood will begin to bombard us with movies that depict good looking men, beautiful women, and fancy cars or other electronics in romantic stories of intrigue and espionage. As Americans, we love these stories where the main characters wear beautiful clothes and against all odds, often times with cutting edge electronics or personality, save the …
Loose Lips Sink Ships
The security manager receives a call from the front desk receptionist. She tells him that during lunch, the fill-in receptionist received a call from an individual who identified himself as a volunteer for Good Charity. The volunteer wanted to send an invitation for their annual fundraiser to the vice president, but he didn’t have the home address. He also asked …




