Operational Mission Needs and IT Security Reviews For Operational Systems

Any warfighter that has ever tried to implement an innovative IT solution to a real world problem has run up against the seemingly endless requirements imposed on solutions in the name of security.  Of course, we understand the necessity of this, but it can often be quite frustrating when a solution seems so close at […]

Cities and States Not Prepared for Cyber Attacks, FBI Surveillance Backdoors, and More

Here is today’s federal cybersecurity and information technology news: The State Department’s Bureau of International Narcotics and Law Enforcement Affairs plans to provide the Mexican Public Security Secretariat with the Mexico Technical Surveillance System to intercept and analyze communications. More here. In the National Preparedness Report  released by the Federal Emergency Management Agency found that cities and states are least prepared to […]

Why I dropped Verizon for Straight Talk and Google Voice (No, seriously)

A few weeks ago I wrote about just moving to Google Voice and VoIP for voice calls. It worked a bit, but not perfectly. So I went back to the drawing board and came up with a new plan – Straight Talk’s AT&T service coupled with full Google Voice implementation. I know you are confused, […]

It's time for me to make the move to Google Voice + VoIP

After picking up the Galaxy Note, I realized that I am tired of being tethered to one device. While I have some of the best Android devices on the market (Galaxy Nexus, Galaxy Note and Transformer Prime), I can only phone and text on one device (the Nexus). To combat this, I have been researching […]

SS8: Lawful Interception and Communication Forensics

SS8’s lawful interception and communication forensics products dissect information within complex networks, intercept a variety of communications traffic (wired, cellular, satellite, WiFi, broadband data) and deliver analytical results to law enforcement agencies. Intercepting communications networks is a highly specialized field requiring specific domain knowledge, cutting edge tools and most importantly products designed specifically for intercepting […]