From Michael Yon: Insurgents Used Cell Phone Geotags to Destroy AH-64s in Iraq. You can read the Army's full press release here, and you can read the Army's excellent presentation on the security dangers of geotagging and social networking here, also hosted by Michael Yon.
Technology is a great thing, but every new development in social networking makes it all the more critical for users to approach its use with security in mind.
Friday, March 16, 2012
Friday, March 9, 2012
Welcome to the JTS Blog
Welcome to Joshua Tree Security's blog. We're currently in the process of developing our strategic plan and defining our business model. Over the course of the next few months, we'll be posting about topics such as:
future U.S. Navy force structure;
U.S. government processes and documents pertaining to strategic planning;
podcasts pertaining to security and other related topics; and
foreign language study.
Be sure to check in every few days, as we begin to discuss security topics of general interest, as well as items that may have a specific impact on you.
Be sure to check in every few days, as we begin to discuss security topics of general interest, as well as items that may have a specific impact on you.
Subscribe to:
Posts (Atom)